Getting A Hold On The Bandwith

More than a decade ago, it was all about analog cameras. My, how times have changed. By 2010, IP-based cameras were taking over the security duties, and doing a good job, but there were challenges.

Among concerns was protecting the network from remote hackers from anywhere in the world. With the right knowledge, the right person (I mean the wrong person) could access the system. A robust network means security software is constantly being updated to protect against new threats all the time. Another concern is bandwidth capacity.

Our cover story in this issue is from Brian Simmons, Berk-Tek, who writes that as image storage and increased resolution of cameras grow, more bandwidth is consumed to meet demands. Simmons writes about what new HD and UHD technologies have been incorporated into video surveillance.

Simmons writes about several factors that can affect bandwidth requirements, such as resolution, frame rate, streaming mode, compression and network protocols. Finally, Simmons writes about structured cabling recommendations. There is a ton of information packed into this story.

Andrew Deen, a freelance writer based in San Diego, writes about seven ways criminals are making money from cybercrime. Believe it or not, cybercrime comes in a variety for shapes and sizes. This includes data breaches, selling illegal goods, Bitcoin and the dark web, tax fraud, identity theft and using counterfeit money. Oh, and cyber criminals are not limiting fraud to coins and bills; it also comes in the form of medical, personal or financial information.

Are we completely immune to cyber-criminal activity? No. There is no way to be completely protected, but be careful what’s on the network.Be smart.

This article originally appeared in the November 2017 issue of Security Today.

About the Author

Ralph C. Jensen is the Publisher/Editor in chief of Security Today magazine.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities