The Trends We are Seeing

The Trends We are Seeing

The themes for VMS product development can be summarized as bigger, better and faster. In 2015, look for capabilities that range from those which deliver more information to architectures that optimize VMS performance on purpose built hardware offerings. VMS development will be focused on system usability, total solution costs and true scalability.

Single interface: One trend driving VMS product development is the integration of multiple sets of security data. Combining information from several different but complimentary security systems together with video creates a powerful tool set for the security user.

This is a common occurrence in highend security operation centers. Video, access, intrusion, weather and risk awareness information are presented together helping security operators get the best picture of the situation at hand.

The trend can be seen with VMS products integrating more deeply with access control. Traditionally VMS and access control integration was relatively lightweight, and commonly presented in the access control software interface. Because of this, integrations didn’t always fit the needs of video-centric users. More video products today are providing a level of access control functionality in the VMS interface shifting the center point of the integration to the video systems.

Access control, point of sale and mass notification are all common targets of deeper integration which are driving VMS towards being the primary interface of the security system.

Scalability: VMS is a technology which for a long time has been deployed by large organizations but without true enterprise management capabilities. Features that allow for rapid deployment, centralized system management and the ability to perform actions across multiple network video recorders and clients simultaneously will be more widely adopted.

Larger and more distributed systems also need to take bandwidth consumption into account to make remote viewing and investigations practical. Bandwidth throttling, dual streaming and other techniques have been available but specialized techniques that better optimize transmission of video will be more frequently introduced. For example, bandwidth can be minimized without sacrificing quality by resizing the video resolution to the size of the target display area before transmitting video.

Cloud: Cloud based video recording, or VSaaS, continues to be an interesting yet emerging technology. There are some inherent benefits to cloud based recording which make it a clear direction for the market. Offsite recordings, lower upfront cost model, built-in system management are all attractive attributes of the VSaaS for consumers. For security system providers cloud offers a way to differentiate as well as add recurring revenue.

The main challenges with VSaaS are availability and scalability. Adoption may accelerate over the next few years as more companies look to provide a cloud offering. The scalability of a cloud recording deployment is limited by available bandwidth at the user’s site, meaning it will be most practical with residential and smaller camera count commercial deployments.

Total recording solutions: One of the most challenging aspects of designing a video security system is determining the minimum hardware requirements for the VMS. As the camera count, resolution, frame rate and other factors increase so do the CPU and storage requirements of the network video recorder.

To further complicate matters, the components of a server running VMS software are being used 24x7 and typically to their fullest capability. A network video recorder’s CPU is always used heavily, the hard drives are spinning all the time, the cooling system is being utilized constantly and so forth. As such, the best NVRs utilize 24x7 rated components, designed for long life span.

The risk of over specifying hardware or deploying an underperforming solution is driving many security integrators and consumers towards specially built NVR recording platforms. VMS providers have been following suit and will continue to expand hardware offerings. The trend for 2015 will be towards more specialized appliance products incorporating wireless, PoE and other connection modules providing all-in-one devices that combine software, hardware and connection infrastructure. Specialized form factors will also be in demand for space constrained and other unique installation scenarios.

Hardware optimized products: Because more VMS providers are now offering NVRs, the total recording solution cost is starting to take focus. If a VMS can run a recording configuration on fewer and less expensive NVRs, the system may be more competitive than alternative offerings, even if the software license cost is higher.

This trend can be seen in part by the push for processing to the edge, like when using camera based motion detection or video analytics. More advanced techniques may become the norm such as offloading processing from the NVRs CPU to the video card’s GPU. Such a design would result in lower total hardware cost for the consumer.

Another driver for this trend will be H.265 cameras becoming more widely available. Without processing-optimized VMS products, adoption of H.265 based may be slow to take off due to higher processing requirements.

This article originally appeared in the February 2015 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.