Whether you were hired to breathe new life into a stagnant security program or if your security system is just in desperate need of an overhaul, a retrofit is likely in your future. However, a high-impact retrofit doesn’t necessarily mean a high-cost system. Sometimes, the return on your investment can come from one lost key.
It’s an ongoing and inevitable conundrum for security systems managers: not all end users are experts.
May 1, 2014
The Town of Addison, Texas, is also seeing a return on its surveillance investment through easier-to-manage VMS. After a routine camera filter-and-replace, the Town’s IT department replaced cameras at three locations throughout the community: a 150,000 square-foot Athletic Club , a 44,000 square-foot Conference and Theatre Centre , and the 20-acre Addison Circle Park.
Among organizations currently using video surveillance technology, 91 percent indicate that IT manages or supports these deployments, compared to just 52 percent three years ago, according to the 2013 IT and Video Surveillance Market Study from IT market research firm Enterprise Strategy Group and Axis Communications.
Most security executives clearly understand cyber security is in a class by itself, and the risks associated with ignoring it are immeasurable. They are surrounding themselves with IT and technical security professionals instead of traditional security staffing and former law enforcement personnel.
Globally, the Siemens brand plays in many spaces. In security, Siemens is known for its integrated approach to security, with product applications demonstrating how different system configurations can be utilized in a given environment. Its success has given it a number two position on sister publication SDM’s 2013 Top Integrator Report.
Many within the surveillance industry are deploying IP video surveillance cameras and networked recorders using the same design and engineering strategies used for building analog CCTV camera and DVR-based systems. On the surface this makes sense: surveillance is surveillance; the fundamental optics and geometry remains the same regardless of the medium. What isn’t the same is how the IP systems operate under day and night conditions.
For the next generation of enterprise security leaders, is there a clear path forward to success? Enterprise security leaders discuss mentorships, education, certifications and the skills new CSOs and CISOs will need to succeed in their evolving roles and bring value to the business. But the problem is: with existing security leadership roles varying so widely, is the development of a uniform skill set even possible?