Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

How to Make Unreliable Video Reliable

At any given time, 30 percent of an IP video network does not work properly.

By Diane Ritchey
Viakoo

Todd C. Vigneault, CPP, Sr. Manager, Enterprise Security Systems, for Symantec Corporation, recently tested the Viakoo product in conjunction with surveillance in three global locations. Photo courtesty of Symantec

Viakoo

At Drexel, having reliable video is especially important, as in addition to students feeling safe on campus, the Philadelphia Police Department may often ask for video feeds as part of investigations. Photo courtesy of Drexel University

Viakoo

Ceccanecchio and Joe Spera, director of operations for Drexel Public Safety, use the Viakoo system to monitor the university’s video system and to proactively identify and correct network issues. Photo courtesy of Drexel University.

Viakoo
Viakoo
Viakoo
June 1, 2014

You just implemented an expensive IP video surveillance system. And when it goes offline, awareness is down. Important evidence is lost.

That’s exactly what Drexel University in Philadelphia, is trying to avoid. The urban campus has more than 500 security cameras across its 74-acre University Center campus – half IP and half analog with all video being recorded to an IP network. Internal and external cameras secure very large public spaces. In addition, says Domenic Ceccanecchio, M.S., CPP, Vice President for Public Safety, the cameras assist security personnel to conduct virtual video patrols of the campus within the campus security communication center. “The staff there is constantly taking calls, dispatching police or security officers, looking for suspicious activity – looking for anything that might necessitate a public safety response. We have a strong relationship with the Philadelphia police department; they rely on our video and assistance when something happens on or near our footprint. So the case is clearly made that we have a heavy reliance on security video as part of our comprehensive security and safety program.”

Ceccanecchio and Joe Spera, director of operations for Drexel Public Safety, use Viakoo to monitor its video to proactively identify and correct network issues. “It’s a unique product,” Ceccanecchio says. “We were trying to find solutions that address the reliability problems that we were having. Looking at the business case, we can see an immediate return on investment as the product provides for a better, more efficient use of our administration time. In addition, it gives us a better comfort level that our video surveillance system is up and operating properly.” 

“What we don’t want to happen is a security event on campus, we go to the video and the video is not there,” Spera says. “This system will tell us which server or storage or camera is down so that when we do call the technicians, they know right where to go. It limits the amount of time they are spending on maintenance. There are a lot of stakeholders that are relying on us to have accurate and reliable video.”

 

What Causes Video to Fail?

At any given time, 30 percent of an IP video network does not work properly. While physical video applications work with frames, IT networks communicate in packets. There are many components along the video stream path that experience problems and cause video system failure.

IP security video networks consist of cameras from the edges, through complex computing software and networking infrastructure, to the recording hard disks at the core. There are lots of variables that create the intrinsic technical vulnerabilities that lead to missing video and video downtime. In spite of good people and technology, you still have missing video.

As problems go undetected, your costs and risks rise as situational awareness falls.

Simply, video is complicated. And that complexity leads to increased cost and risk when it is not available. There are added expenses to your security program such as service hours, inefficient routine maintenance contracts, monetary damages and the guesswork involved finding the cause. And you face increased risk in terms of regulatory compliance violations, impeded investigations and brand equity damage.

Viakoo detects and alerts customers to anything that threatens, degrades or stops a video stream from the camera across the network to the recording disks; every 20- minutes. It also points to the probable cause and what corrective action should be taken. Viakoo alerts customers to video performance issues that they would otherwise be unaware of. 

Todd C. Vigneault, CPP, Sr. Manager, Enterprise Security Systems, for Symantec Corporation, found this aspect particularly helpful, given that he used the product in conjunction with surveillance in three geographic regions around the globe.

Part of Vigneault’s role is leading a team that not only implements security technology, but ensures that users understand the technologies and leverage them to their fullest capabilities, then supports the solutions throughout their lifecycle to protect Symantec assets.

“I liked how it gives you the capability to show problems on your video network that otherwise you’d have to find through manual efforts,” Vigneault says. He used the product in three Symantec locations – across the globe Latin America, North America and Asia. Two locations were ones where he knew that he had existing video issues.

“With users of IP video, when you have a large network, you have people do manual audits or you have your VMS demonstrate when your video is offline in an alarm format,” Vigneault says. “The first scenario is the one that leaves gap or an exposure of time between audits. That’s what we were experiencing. The Viakoo product allows users to automate processes to close the gaps that exist with manual efforts.”   

KEYWORDS: network monitoring video evidence video surveillance investments

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Alarm

    How Monitored Video Alarms Deliver Insurance Discounts

    See More
  • Wried or Wireless?

    Adopting Wireless Video to Tackle Covert Surveillance Operations

    See More
  • SEC0419-cover-feat-slide1_900px

    What Salary Does a Security Executive Make?

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×
Todd C. Vigneault, CPP, Sr. Manager, Enterprise Security Systems, for Symantec Corporation, recently tested the Viakoo product in conjunction with surveillance in three global locations. Photo courtesty of Symantec
At Drexel, having reliable video is especially important, as in addition to students feeling safe on campus, the Philadelphia Police Department may often ask for video feeds as part of investigations. Photo courtesy of Drexel University
Ceccanecchio and Joe Spera, director of operations for Drexel Public Safety, use the Viakoo system to monitor the university’s video system and to proactively identify and correct network issues. Photo courtesy of Drexel University.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!