Overall Security

Define the basic parameters for software and hardware classification

The physical security industry, and the technologies that drive it, continue to evolve and advance at a rapid pace. Much of the attention has been focused on new software products and applications that enable a host of intelligent video surveillance and security capabilities. These range from new imaging and biometrics to smart analytics and highly integrated and autonomous software platforms.

But what is the underlying driver behind these programming advancements? There are two opposing schools of thought when approaching this question: one being the decades-long developments in software and the other being the continued advancements of the physical hardware devices that provide the foundation for the software to run on. Before diving into this deeper, let’s establish some basic defined parameters for what classifies as software and hardware.

PROCESS AND PROCEDURE

Software is a rather general term used to describe a collection of programs, processes and procedures that perform given tasks on a computer or are embedded in products like IP cameras, video servers or access controllers.

Software is typically classified as being either system or application specific, such as video management or access control system platforms versus facial recognition or object identification applications. Hardware is essentially a physical device that you can see and/or touch, even if on the tiniest scale.

Software and hardware interact with one another with the software directing the hardware on which series of tasks it needs to execute and at the precise moment those tasks should be performed. While it is common to switch and/or enhance software or use multiple software applications at a time, hardware is less frequently changed. In most cases, software can be more easily created, changed or deleted than hardware products. Adjustments or replacements to hardware typically are more complex and expensive.

There is much to be said for the “hardware as a foundation” school of thought, as all software must use some form of hardware to operate. To get a better grasp of this concept, let’s look at three fundamental hardware classifications prevalent in the physical security industry: cameras and imaging devices, recording and storage products, and microprocessors.

It wasn’t that long ago that analog surveillance cameras, once referred to as “CCTV” cameras, and dominated the physical security landscape. The transition from tube cameras to imaging sensors to digital signal processing and on to megapixel sensors with 1080p and 4K resolution has transformed video from grainy black and white pictures to laser sharp color imagery that is viewable under even the most challenging lighting conditions. These and other hardware advancements enable today’s cameras to capture better images and deliver enhanced situational awareness.

Multi-sensor panoramic cameras are a perfect example of this advanced technology. They are capable of providing widearea HD surveillance with powerful processors driving versatile features and intelligence at the edge.

Although the performance benefits of today’s highly advanced surveillance cameras are quite obvious on the surface, their hidden advantage is the vast amounts of video data they produce to feed specific software applications. Identifying subtle facial details and characteristics, the precise color of an individual’s clothing or vehicle, license plate numbers on moving vehicles and more are capabilities that are totally reliant on the quality of the video.

The same holds true for most video analytics like motion detection, object detection, and direction indication built into today’s more advanced imaging edge devices. To put it simply, the higher the image resolution, frequency and density of information transfer, the more data is available for precise analysis.

Image storage is another hardware-dependent requirement driving advanced operations. Beyond pure storage capacity, the writing and access speeds of new storage technologies is paramount. Consider the evolution of storage media specifically for physical security operations ranging from celluloid film to videotape, to hard disk drives and now to solid state or chip-based storage media. Today’s digital storage systems enable software to run at incredibly fast speeds capable of processing millions of operations in miniscule amounts of time. These hardware devices enable AI-embedded features and functionality to run virtually in real time.

Microprocessor development is also a hardware-based technology that is co-dependent on software to the extent that without one the other could not exist. The development of single board computers and central processing units in the mid-seventies spawned a new era of processing devices that are now employed in a multitude of physical security solutions. Microprocessors control almost every function of every video, access control and fire/alarm security product available today, carrying out millions of operations every second.

Such accelerated processing speeds allow products and the systems where they are deployed to react to various inputs and triggers quickly and automatically.

This article originally appeared in the July / August 2021 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.