Great Systems Start with Great Planning

Great Systems Start with Great Planning

To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages

The sophistication of today’s video surveillance and security systems technology has delivered significant gains to end users tasked with ensuring the safety and security of people, property and assets. A prime example of this evolution is with management and control platforms with open architecture enabling numerous integrations that result in improved situational awareness and operational ease.

Simultaneously, the complexity and ongoing evolution of integrated systems has also created new challenges for system designers. To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages. Clearly identifying surveillance and security objectives, priorities, budget parameters, potential installation/construction issues and future expansion plans are critical considerations. By taking the time at the start of the project to address these questions clearly – and gain agreement – users and/or integrators will be better ensured of developing and implementing a more innovative and comprehensive solution.

The Fundamentals

What are the operational goals of the system?

While this question may appear to have a simple, straightforward answer the reality is often different. Cameras can be used for reactive (i.e. audited, prosecution, etc.) recording purposes or for proactive (intelligent analysis capability) real-time surveillance. Determining the camera’s purpose and the problem to be solved leads to asking additional questions that will help clarify the situational needs. Some of these may include: How much resolution is needed? How long will records need to be retained? What areas need to be covered and when?

How will the system be staffed?

This is an important question because the answer will have a bearing on camera and video management system selection. For example, casinos require 24/7 live monitoring of the system while perimeter or parking lot surveillance may be unattended. Automation and analytics may also play a role in the solution. Analytics are now available that can support a wide range of recognizable events, including License Plate Recognition (LPR), heat mapping, simple motion vectors, as well as some very advanced demographic recognition functions such as gender, ethnicity, approximate age, and clothing colors. In unstaffed situations, analytics can even alert staff that events may need to be reviewed.

What are the environmental conditions?

Conditions such as extreme heat, cold, humidity, corrosion, and high dust levels will play a part in determining what equipment can be considered for the installation. Other environmental factors also can play an important role, such as ambient light levels, the availability and reliability of existing power and network infrastructure.

The Specifics

Based on answers to the above questions, the conversation can move on to determining more specific details of the system. These might include the number and type of cameras needed; data storage requirements; existing infrastructure capability and training needs. With these answers in hand, more advanced considerations can be addressed, including:

Integration Needs. The most common example is access control. Most current systems have an IP-based interface that can easily be integrated into VMS systems but it is important to know any limitations and to work with an integrator and a manufacturer that support a wide range of 3rd party integrations.

Redundancy. For the vast majority of systems, simple RAID5 or RAID6 redundancy in storage is sufficient. Planners should also consider budgeting for “Failover” recorders and other server hardware on the VMS back-end, as well as spare cameras.

System Security. Cybersecurity is a critical issue in a network environment and smart planning now can help eliminate some of the risk. Any network-connected software or device in the security system could potentially serve as an open door for an attacker to access networks and sensitive information. By ensuring at this stage that system contains hardened architecture, software and devices, the vulnerability can be reduced.

Licensing. Today, most VMS systems have licensing requirements as well as Software Upgrade Plans (SUP) or Service Level Agreements (SLA) to cover everything from higher tiers of support to future upgrades. It’s an important aspect of the design stage because if allowed to expire, out-of-date software can become a significant expense to bring the system back into compliance or to obtain the required support.

Support. Beyond the capabilities of the end-user to support its installations, how is support escalated? Does the installer have personnel that are trained and able to support the planned installation? If support issues exceed the installer’s capabilities, what are the manufacturer’s responsibilities for resolution?

The Pitfalls

It’s easy to get caught up in the lure of the technology. Specification creep and glossy brochures can distract from core planning discussions. Integrators and manufacturers who take the time to understand the application, its assets and limitations, and who have a history of providing a solution that meets the end-user’s needs, don’t need to indulge in these embellishments. Rather, by probing what is needed, what the challenges are and what problems the customer is trying to solve, many pitfalls can be avoided.

Having these discussions at the start of the project, and considering the full range of factors, will help to ensure the final result is a successful project.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.