Software Sets the Course for New System Solutions



There are many reasons for the industry transition to IP-based digital video surveillance systems, but one of the most compelling is the management and control of an integrated system through the use of software-driven solutions. Moreover, many of these software-based management and control programs can be deployed in hybrid video surveillance systems.

Analog cameras are still commonly used in video surveillance systems due to their lower cost, wide range of choices and high quality imaging capabilities. As a result, video management software solutions that address this fact are growing in number. Implementation of such a system can help protect the end-user’s hardware investment. Additionally, analog system technology has steadily been adding improvements to close the gap between analog and digital systems. For instance, today’s DVRs (digital video recorders) offer many of the same features and benefits as an NVR (network video recorder), including IP camera support, remote access and scalability. These kinds of enhancements will support the continued use of analog cameras, and potentially the overall life of analog/hybrid systems.


IP Influence on Management Solutions

However, the advent of new H.264 megapixel IP video surveillance cameras is having a dramatic influence on the utilization of software-based management solutions and the overall manner in which video surveillance systems are configured, managed and recorded. The high efficiency of the megapixel chip allows for more advanced video analytics and push technology, as well as other advanced capabilities that are only possible on a networked platform.

Video captured by H.264 megapixel cameras offers outstanding images for live viewing as well as the ability to view extremely fine detail when using digital zoom. In addition, the improved picture quality and image analysis delivered by megapixel cameras can take better advantage of the newer VGA and XGA display devices.

In addition to megapixel technology, current IP camera technology features upgraded processing power in the camera chips to include faster digital signal processors (DSPs), field-programmable gate arrays (FPGAs) and application-specific integrated circuits (ASICs), all of which support software management solutions.

When considering all of these aspects in designing an integrated video surveillance system, it is obvious that there is no cookie cutter method to follow. Each project must be approached from the viewpoint of what issue/problem does the customer want resolved and what system design will best achieve that goal without making any sacrifices on overall system design or performance.


Video Management, PSIM Software Convenience

Whether the answer is an IP-based digital solution or a hybrid solution will depend on a number of factors; but ultimately the end result must, at a minimum, provide intelligent solutions for delivering, storing and managing the video and data and, on a more sophisticated level, tie together and manage other physical security and safety applications.

Today’s video management software offerings and the more complex and advanced physical security information management (PSIM) software are designed to do just that. Both video management software and PSIM software are dedicated applications designed to bring the technology infrastructure together onto a single platform. With these kinds of software-driven solutions, the video, analytics (i.e. event forensic as well as license plate recognition and people counting), building management, access control and business applications such as POS can all be integrated.

Further, the video and data information can be incorporated with policies and procedures to provide operators with all required information for intelligent response, such as alarm verification and rule-based, predefined actions determined by events.

And while this may appear to be a complicated activity, the software manufacturers have paid particular attention to the design of the interface so that the functionality is easier and more convenient to manage.

Examples of this include touch-screen technology and map-based interfaces which allow for powerful investigation tools to effectively and automatically identify incidents, notify and inform corporate security personnel on and off site, and manage the response to a security breach or incident.

Backward compatibility and advanced management and control of integrated systems are certainly driving forces behind the adoption IP-based security systems, but the additional benefits of reduced costs and operational/workflow efficiencies are proving to be equally as important in value. Combined, they provide sound reasoning for designers and system integrators to implement software-based solutions as part of an intelligent system blueprint.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Cynthia Freschi

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

April 2015 security magazine cover

2015 April

In this April 2015 issue of Security, find out how to keep your enterprise resilient after a disaster in 2015. Also discover how to strike a balance between design basis threats and active shooter threats and see what's in store for the 2015 RSA Conference.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.