Not a Sure Bet

A well-designed networked system requires planning and best-of-breed products

Digital video has become the buzzword for all modern surveillance systems, but networked, or IP, video is still anything but a sure bet—despite its numerous benefits. With the performance and flexibility of IP video surveillance systems comes tremendous technical complexity and a staggering array of products for security system designers, integrators and operators when compared with the mature and relatively simple analog CCTV systems of the past.

Anyone approaching the IP video surveillance market from a position of product selection and acquisition would do well to take a step back, understand the true requirements of a well-designed IP networked security system and choose best-of-breed components accordingly, rather than latching on to one-stop-shop, end-to-end IP surveillance vendors.

While digital video technologies have opened up new features and intelligent analysis capabilities not possible with analog video, many suffer from performance and scalability problems because of poor system architecture. For organizations to realize the full benefits of IP video surveillance, they must design and build a system that is capable of performing to current and future requirements.

Building to Fit
Many integrators have the experience to design sufficient network and storage infrastructure using relatively inexpensive commodity components. Then they install video devices and applications that quickly overwhelm the network because they do not intelligently manage those resources. These systems may perform acceptably at low camera counts, but performance drops as the system scales to higher camera counts.

A video surveillance system designed to actively manage network resources can guarantee video availability when it’s needed without stealing precious bandwidth from other mission-critical applications. A system that is network-aware and built to manage video infrastructure can isolate high-bandwidth video archiving from other segments of the network and only serve up video necessary to client applications.

A video surveillance system that takes a network appliance approach and manages video streams as part of this infrastructure also can balance its use of storage resources across multiple storage arrays to ensure data integrity and availability.

Next to scalability, the most underestimated and misunderstood aspect of an IP video surveillance system is its maintainability. Installers and integrators are experienced when it comes to analog system design and rollout, and surveillance operators are normally well-versed and experienced at keeping a system running or taking on light expansion. With IP video surveillance systems, the design and installation entails specialized networking and IT skills that only progressive integrators possess.

The majority of surveillance operators have little experience in maintaining or configuring an IP surveillance system after the network-savvy integrators have completed the install and left. After setup is complete, the operators do not have a great understanding of how to manage or expand a networked system, so they rely on integrator support services or internal IT departments. An IP video surveillance system must be designed for ease of configuration and adaptability so future needs may be met without reliance on expensive services.

A reliable IP system also must be designed for lights-off operation that does not require constant monitoring, patching, upgrading and equipmentswapping to keep it running. An IP video surveillance system essentially needs a video infrastructure that is reliable, scalable and future-proof.

Open Integration
Another important design consideration in an IP video surveillance system is the openness of individual components of the system. Most video surveillance vendors claim that their products are standardsbased and open to easy integration with components from other vendors, but the reality is that standards in video surveillance are loosely interpreted and integration capabilities are often oversold. For a true best-of-breed system that meets the needs of unique and complex video surveillance applications, each of the components must be designed for open interaction with other components from other manufacturers.

Vendors that assemble complete endto- end solutions normally take shortcuts in implementing interfaces between each building block of their solution, so you lose features, performance and reliability when you introduce a component from a specialist manufacturer.

It is possible to implement an IP video surveillance infrastructure that performs, scales to high numbers of cameras and is open to integration with best-of-breed components. However, a video surveillance infrastructure can only capture video, store it for safekeeping and send it to where it needs to go. As a system grows to numerous cameras, geographically distributed and with data integrations in place with nonvideo security systems like access control or identity management, a new class of applications distinct from the video infrastructure is needed to manage and make sense of all this converged data.

These applications—known as physical security information management— are based on the security information management systems in use in IT security environments to provide centralized visibility and control of the IT security posture of an organization. PSIM applications, which are ambitious in vision but relatively immature in implementation, are promising to present security video correlated with all types of physical security data and assets to give organizations a truly converged security management capability.

PSIM applications are likely to change the way security teams look at video—literally and figuratively—but they are only as good as the video that is captured, transported and stored by the video infrastructure.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.