Your Best Project: Ten Security Design Tools You Must Try

SPONSORED

Your Best Project: Ten Security Design Tools You Must Try

Designing for the Customer; Creating with the Customer

“You can design and create, and build the most wonderful place in the world. But it takes people to make the dream a reality.”
-Walt Disney

Ask a single security designer for advice, and it's difficult to know whether we should solicit another opinion. Ask ten, though, and you'll see a clearer picture begin to coalesce.

Some may call that polling, learning diversity, or even the modern term crowdsourcing, but in any case it's one of the best ways to gather insight. No single perspective or process applied to a security use case can result in a flawless design.

Continuous Improvement in Design

The Japanese noun and verb “Kaizen,” includes some significant approaches to how design tools are used.

改 + 善 = “to change, alter or transform” + “good” = Kaizen:
An action taken to improve (n); a spontaneous change for the better (n); for something to improve on its own (v)

Place video surveillance cameras, intrusion sensors and a communications network around a physical or virtual protection path around the circumference of your soft target, and you have taken a first, important step towards perimeter defense. To verify the design integrity, the process should include improvement, formerly known as “value engineering,” today as value redesign (see figure).

Using Tools to Improve Your Design

Figure 1 Using Tools to Improve your Design

Get ready for Video Surveillance: AXIS Design Tool

One useful tool, the AXIS Design Tool estimates bandwidth and storage needs for a single or all the cameras in the surveillance project. For each camera, you can pick a scenario, and select viewing, recording and compression options to get bandwidth and storage estimates that match the surveillance situation. For example, our outdoor entry camera near the reception area, when viewing and recording at 18 frames per second (FPS), with event recording 20% of the time actually yields the same bandwidth and storage by lowering the frame rate to 10 FPS and increasing the event recoding estimation percentage to 50% (see figures).

Design Tool Figures

Figure 2 Design Tool Figures

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios. IT Managers want to keep resource utilization high and costs low. The resulting design might produce unacceptable service levels to the Security Manager when congested links and undersized routers cause too much delay or dropped packets. The best design may be a compromise that will efficiently use your network resources and effectively serve your users. Solution, accessory, device and network design tools can closely simulate the actual field practice.

With network-based security systems using a mix of applications, protocols, device technologies, traffic flows, and routing algorithms, there may hundreds of feasible configurations, each with different performance attributes and costs.

Challenge: do you have to sacrifice throughput and performance for high image quality?

In a word, no! Significantly more efficient implementation of AVC/h.264 video encoding, and purpose-built for surveillance applications, Zipstream analyzes and optimizes the video stream in real time to save bandwidth and storage while maintaining image quality.

A video clip contains 25 or more frames per second. Instead of sending the entire frame every time, a video codec can save a lot of data by only sending the differences between frames. The digital multimedia content (video, audio, metadata) carrying capacity of a network connection is commonly known as bitrate or bandwidth and is measured in megabits per second. A 4G mobile connection might be capable of carrying multiple megabits per second; a home broadband connection may support ten times that amount. To encode and stream video efficiently, the bitrate or bandwidth capacity of the network connection must be greater than the bitrate of the streaming media file.

Using networked video with Variable Bit Rate (VBR) allows the quality to adapt to scene content in real-time. Using Constant Bit Rate (CBR) as a storage reduction strategy is not recommended, since cameras delivering CBR video may have to discard important forensic details in critical situations due to the bit rate limit. Zipstream rendering preserves moving scene elements while static areas are rendered at a higher compression. Should movement enter the static areas, the scene rendering is adapted quickly to preserve details.

Will proposed changes in the network such as additional network cameras handle the anticipated traffic demand? Does the design require wireless links? These tools are not only suitable for presentations to customers, they can provide fast answers to “what if” questions?

Tools analyze (visually, mathematically, or by simulation) what is happening in the security network and simulate future behavior.

Some of these tools, like AXIS Site Designer and AXIS Camera Families can display results graphically, use during the course of the security solution simulation to highlight vulnerabilities, potential errors, missed surveillance coverage, imaging issues, network bottlenecks and traffic flows. In addition, the data from these tools may be used to provide comprehensive reports to Security and IT Management and summarize network congestion, load potential failure scenarios and network response times.

Who uses security network design tools?

The ideal network design tool can mean different things to different people. But whether you’re a security or network designer, security or IT manager or engineer, sales or marketing manager, there is a useful tool complete with intuitive graphical interfaces that resemble computer aided design tools.

As a designer, you not only specify and build new solutions and networks, but upgrade existing systems. Designs need to meet performance requirements without overbuilding. The ability to identify vulnerabilities, potential network bottlenecks and overloads are critical considerations. Designers need an extensive library of security technologies, devices, architectures, and protocols to build or upgrade the security solution and network and tools to accurately
predict performance.

Match the tool to you

Axis Tool Selection

Figure 3 Axis Tool Selection

Consider which features best support you, based on the type of user you are.

TOOL

Systems Integrator

Security/IT Manager

Security/IT Designer

AXIS Product Selector

X

X

X

AXIS Guide

X

X

X

AXIS Accessories Selector

X



AXIS Lens Calculator

X

X

X

AXIS Site Designer

X

X

X

AXIS Design Tool

X

X

X

AXIS Camera Extension for SketchUp®



X

AXIS Camera Families for Autodesk® Revit®



X

AXIS Coverage Shapes for Microsoft® Visio®

X

X


AXIS Camera Applications Platform

X



AXIS Site Designer

With AXIS Site Designer, you’ll be able to pick just the right cameras for any surveillance scenario. Adding accessories and picking a recording solution is quick and easy. When done designing your project, AXIS Site Designer prints a comprehensive bill of materials that includes​ everything you need to complete your installation. Learn more about the features of AXIS Site Designer below.

AXIS Site Designer is a web application that is easily accessible on axis.com form your tablet or PC with no additional software to download or install. Once you have started the application, it can be used even when off-line.

With AXIS Site Designer, you can keep track of multiple projects. Project templates provide a quick way to get new projects started. If you log in to axis.com using your MyAxis or partner login, your work will be saved on Axis’ servers, and you can access your projects from any browser.

The all new camera selector finds the right camera for your scenario. Set up your scenario and get a shortlist of cameras that fulfill your needs.​

AXIS Site Designer

Figure 4.1 AXIS Site Designer

​AXIS Site Designer knows which accessories work with your selected camera. This takes the effort out of finding the right mounts and other accessories for your needs.

AXIS Site Designer recommends the storage solutions that fit your project and video recording requirements. For maximum convenience, pick one of the AXIS Camera Station S10 Recorder Series models.

AXIS Site Designer

Figure 4.2 AXIS Site Designer

You can add any Axis product to you project, and enter your own selection of networking and other components to create a complete bill of materials that includes everything needed to complete the project.

Bill of Materials

Figure 5 Bill of Materials

Tools for Collaborative Security Design

Whether you're designing a new product, improving your site, or just seeing if more people like low light cameras than 360∞ cameras , your best bet is to collaborate. To do so, you'll need a framework to generate a unique and innovative design (see figure). As we have seen, many of these tools come from AXIS, are used by third parties, allow accurate technology matching and generation of bills of materials.

The Design Tools Framework

Figure 6 The Design Tools Framework

For Designers and First Responders in Law Enforcement, Fire, EMS, HAZMAT, Search and Rescue, Explosives and Communications disciplines, there are also tools within agencies to support these specialties. One such tool is the Digital Video Handbook by the US Dept Homeland Security Science and Technology Directorate.

A list of topics covered by the Digital Video Handbook are below:

Digital Video Quality Handbook

Figure 7 Digital Video Quality Handbook (Place to the right of the bullet points)

- Digital multimedia content analysis
- Entry screening queue line video analytic system
- Trends
- Technology expansion in public safety: IoT, sensors and analytics
- Case study: HD and network video: moving public safety and schools forward in security
- Navigating the security and public safety industry: from associations to standards
- UltraHD and the video surveillance industry
- UltraHD resolutions
- Next generation video codecs in action
- Tactical video and situation awareness advantages
- First responders and tactical video
- Crime fighting tactical video intelligence
- Encoding for the surveillance industry
- Bit rate reduction
- Comparison of HEVC bit rate savings over AVC
- Next gen codec design considerations
- IoT, sensors and analytics
- Cyber security of IoT sensors
- IoT and cyber security FAQ
- ASIS international security applied sciences facility model
- Forensic video program readiness
- Digital multimedia content — more than just video data
- Forensic review
- Video content analysis
- Digital multimedia evidence
- Checklist: preparing for digital forensics
- Checklist: implementing a forensic video readiness program
- Top technology considerations in forensic video
- Criminal pattern identification and security/video data
- Linking DMC to policy

It is a great challenge to tell a customer what they want. However, you may be able to approximate and even predict what they want before they realize they want it. When you think about it, IT and Physical Security Managers often have to predict their users’ needs even before they know what they need - they are in a reactive mode. Tools like the AXIS Design Tool and the Digital Video Handbook help our first responders get ahead of the threat.

 

Featured

  • Security Industry Association Unveils First-Ever U.S. Economic Impact Study

    The Security Industry Association (SIA) has unveiled the first-ever national economic impact study on the security industry, highlighting the positive impact the security industry has on jobs, wages and federal and state revenue in the United States. The study, conducted by Florida-based John Dunham & Associates, uses the most current methodology and data available from 2024. Read Now

  • 7 Reasons Why Governments Need to Regulate AI

    Recently, Elon Musk unveiled two remarkable AI applications. A humanoid robot named Optimus, with its remarkable human-like speech and movements, and a fully autonomous car, absent steering wheel and pedals, called Cybercab. While these examples represent a broad trend of AI integration across industries, they highlight technology’s transformative potential, prompting a need for regulation to ensure it is used responsibly, securely and ethically. Read Now

  • OR Code Phishing on the Rise According to New Report

    KnowBe4 recently released its Q3 2024 Phishing Report. This quarter's findings reveal the most frequently clicked email subjects in simulated phishing tests, demonstrating the continued efficacy of HR and IT-related phishing attempts. KnowBe4’s Q3 2024 Phishing Report reveals that HR and IT-related phishing emails claim a significant 48.6% share of top-clicked phishing types globally. Despite evolving techniques by bad actors, phishing emails remain among the most prevalent tools for executing cyberattacks. Read Now

  • United HealthCare CEO Killed in Targeted Attack in New York City

    United HealthCare CEO Brian Thompson was killed in a targeted attack early Wednesday in Manhattan Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3