On Guard

Security directors looking for best-in-class solutions, with flexibility included

Multi-campus users want a new model for security and safety that offers customization today while providing easy migration or upgrades in the future. They want their next security system to be flexible, adaptable and scalable. The solution must provide the right products for their specific applications now and in the future. Users look forward to eventually incorporating emergency lockdown, Wi-Fi, network on a card, mesh networks, video analytics and other new technologies without complications.

And, although such systems can become complex, multi-campus users want the system to appear seamless. New tools should be simplified, made easy to use and install. Such attributes aren’t important only to the end users. After all, these decisions are now being made in conjunction with IT and finance managers who have different sets of measurable goals and objectives.

Seeking Scalability

On the access control side, many users often hold off on implementing a new security platform because they are worried it will be obsolete within a few years. They want flexible and adaptable solutions that are scalable, protecting their investment for years to come.

“At some time in the future, we may turn to a contactless card, most likely smart credentials,” said Gary Conlry, facilities and systems engineer for the Office of Business Operations at the University of Virginia in Charlotttesville. “Switching over is not a small undertaking when one considers there is a universe of 20,000 cardholders, nearly 1,400 access control points and an active program to add additional access control points as funds become available. In fact, it’s painful.”

The need for flexibility and scalability in access control systems also is a requirement for surveillance systems. For instance, financial managers do not want to write off equipment that is not fully depreciated. They will often block a request for upgrades, such as moving from an analog to digital surveillance system.

“There are several reasons why it is important that we begin to migrate to an IP solution,” said Nate Rice, the University of South Florida’s engineer for video surveillance. “First of all, we must reduce costs. We have more than 200 buildings on campus. Any one of them may request surveillance coverage and, when they do, our team visits them, analyzes their needs and designs a system.

“In too many cases, we end up with a need for only one camera, with no way to connect it to another head-in running fiber. That means we need to include a dedicated DVR, which is very expensive. With an IP camera, we can simply plug it into the network and allocate storage for that camera. Thus, the cost is dramatically less than a single camera connected to a multi-port DVR.”

The State of Security
Let’s review the typical security system in use today. In many cases, it was installed in stages. As a result, it is comprised of different brands and disparate products, many of which do not integrate into the same system or talk with each other.

Too often, the hardware and software systems are proprietary, making it difficult to mix and match best-of-breed components or customize the solution to specific needs. The system requires too many separate databases and a plethora of software interfaces that creates confusion, lowers the level of security within the facility and decrease staff productivity.

Contrarily, with an open-architecture, modular locking solution, multicampuses can much more easily adapt to evolving security plans and processes while better managing cost reduction strategies. They can control disruptions during installation by deploying the wireless networking option. Control and audit access to security sensitive information, assets and departments can be ensured by providing varying levels of access control at different openings.

A common credential strategy can be implemented throughout the various campuses and facilities.

Instead of locating components such as the credential reader or requestto- exit around the door, as has been traditionally done, new integrated lock designs, such as the Schlage AD-Series locks used at the University of Virginia, incorporate these components into the lock itself. In addition, these electronic locks provide seamless integration with their existing software. The lock hardware and software are easy to upgrade.

The lock itself provides a migration path to future technology needs, not only protecting the facility but also protecting its investment. Users can upgrade their locks without taking them off the door, saving installation costs. With interchangeable reader modules, they switch from one credential reader to another quickly, easily and affordably.

The same is true for interchangeable network modules, going from standalone, offline locking to a networked access control system with yet another switchover, to provide instant lockdowns throughout the facility when needed and change access rights. Wireless is used when cost is a factor or if the application is cumbersome. Hardwired is used when it is most cost effective, all under one system and one database.

The IP Approach
Surveillance users recognize that IP security video is inevitable -- and a good thing. IP provides better images from IP cameras, and the introduction of megapixel and high-definition cameras demands an IP approach. In addition, storage has moved to digital. Video analytics, whether as simple as motion detection or as complex as alerting to certain types of human behavior, depends on IP video. In the command center, it is a software world where integration is the password and joysticks are being eased out, thanks to easy-touse computer mice, drop-down menus and touchscreens.

Coaxial, shielded twisted pair and unshielded twisted pair cable, fiber optics and -- to a lesser degree -- a variety of wireless approaches carry most security video. The difference and business advantage of the various transmission schemes are in cost of installation and maintenance.

Security managers are interested in IP cameras that eliminate longdistance analog cabling. One strategy to handle both analog and digital networks is to transmit all the signals over a single fiber-optic cable that is secure and immune to electrical and environmental interference. Installation is dramatically simplified by eliminating the need for multiple fibers, transmitters and receivers. Following a co-existence plan, power supplies that are multitap, addressable and programmable have advantages.

Other considerations include the increased bandwidth impact on the enterprise’s network. This is a tricky assignment, and IT can help. Newer types of compression, decompression or codec, such as H.264, reduce bandwidth traffic load, but will costs increase due to more storage and command center processing needs? Can the budget afford the increased transmission and storage associated with megapixel cameras?

One of the most challenging dilemmas Rice and his team face is the question of when and how to take the leap from an analog to an IP/digital video system. They want to move to IP surveillance in a cost-managed way that extends the life of existing equipment.

For most sites, this migration will take place gradually and, during the process, analog and IP solutions will have to coexist, in some cases, for many years.

To keep using their legacy cameras, a multi-campus facility could add encoders to all their cameras and replace the analog control room with a fully digital system. For a lower initial expense, in a coexistence solution, the existing analog equipment -- including cameras, the control room, a video wall and cabling -- can remain untouched while special VMS software integrates with the present keyboard, sitting on top of the system to manage the IP equipment using the already-installed analog control system.

Free to Move Boldly
True security systems integration is the goal of most security operations. Beyond relays and interfaces, seamless integration of security video with electronic access control, intrusion, perimeter and identification systems is a beneficial endpoint of any operation.

Buyers simply want a solid return on investment and a lower total cost of ownership. They want to buy now with minimal risk to themselves and their organization, and be able to show their budget oversight committees that a given solution provides the best security for their facility.

Take the instance of the Abu Dhabi National Exhibition Centre, the largest exhibition venue in the Middle East. ADNEC hosts more than 60 high-profile exhibitions each year, from largescale public shows such as the Abu Dhabi Book Fair to international trade exhibitions such as IDEX and ADIPEC. ADNEC recently completed an expansion to increase their exhibition floor space, which required expanding the security system as well.

The security system for the original halls was based on analog technology but, for the new extension, ADNEC chose an IP video surveillance solution.

They needed to protect the original investment. Using coexistence network video management software, the security staff at ADNEC can manage both the existing analog system and the new IP solution.

Existing analog equipment, including the cameras, control room, video wall and cabling, remains untouched while the Infinova V2216 software integrates with the present keyboard, sitting on top of the system to manage the IP equipment using the already-installed analog control system. Since the analog side of the equipment is not affected by the coexistence system, their security staff can continue to use their present, familiar video wall, system keyboards and joysticks to manage both the analog and digital equipment.

The VMS also provides ADNEC with the scalability of a built-in DVR and access control module to manage contacts and alarms from access control equipment. For door access control, the VMS displays card-swipe information and live video of the door area.

Today, the upgraded video surveillance system throughout ADNEC includes more than 500 Infinova IP cameras and monitors, matrix switchers and fiber-optic transceivers. System components are distributed over subcontrol rooms to provide local monitoring for each exhibition hall. Control rooms are connected by a fiber-optic network to a centralized archiving system, where recorded video is stored for one month.

At the perimeter, Infinova fiberoptic Ethernet transceivers enable the security operations staff to secure every mile of the outskirts of the center from the central control room. Special fiber-optic cable provides additional protection by preventing intruders from breaching ADNEC’s Ethernettransmitted security system.

On the access control side, knowing that users will ultimately be using smart cards, they might suggest installing multi-technology readers to read today’s proximity cards, magnetic-stripe cards or PINs, but also can read smart credentials once the cross-over begins.

They can show the financial committee that a solid video plan is one in which both analog and IP cameras can coexist.

Such coexistence increases security’s overall situational and domain awareness, improves its operational effectiveness and efficiencies, and provides a growth plan that extends the life of existing equipment. In both access control and video surveillance, they want to show their planned systems are affordable and easy to manage.

This article originally appeared in the issue of .

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3