Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

7 tips: Buying Digital Video

July 1, 2004

Due diligence. It’s a term used frequently in real estate and business dealings, and also applies to organizations buying security equipment for the first time.

Technology leaders and security specialists seeking to purchase video surveillance systems and digital video recorders are becoming well versed in the precepts of due diligence, the key outfitting their buildings with the most efficient and cost effective equipment.

From understanding encrypted data to migrating from analog to digital systems, there are several specific considerations that government agencies need to make before embarking on a purchasing venture.

 

1. Does the data have to be encrypted?

Data, in this case, refers to video surveillance; encryption refers to the process of converting that data into a form that can’t be readily understood by unauthorized people. If an organization does not require data to be encrypted, then no extra steps are required. However, if the application does require encryption, end users can view a checklist of manufacturer options to determine if there is an existing infrastructure to handle it. Agencies that require encryption need to do business with a manufacturer that provides that service. While the encryption must meet government standards, in some cases, end user organizations may prefer to use their own encryption.
 

2. Interoperability of new and old equipment

Companies consistently ask themselves how much of the legacy equipment can they use if they purchase a new digital video system. The propositions can get trickier: Can the organization buy a digital video recorder from Company X if its cameras were purchased from Company Y? Can the organization use its existing keyboards to control the new equipment?

The answers lie with the manufacturers, most of whom publish data sheets that will describe the compatibility of each product and application to guide the end user through the system design. In many cases, an end user will hire systems integrators or consultants to go through checklists to determine which products are compatible. And in most cases, the integrators or consultants are savvy enough to ask the right questions.

The bottom line is simple; if the equipment is not interoperable, the cost of replacing it will be exorbitant. Labor costs alone can very often be more expensive than the cost of the new equipment.
 

3. Migrating from analog to digital

Many organizations are converting from using traditional analog VCRs and multiplexers to digital video recorders, benefiting from the technology’s immediate access to important data. Users can play back an event in a split second after it happens, while the digital videos can be transported via CDs, network or thumb drives, ensuring a solid chain of evidence in court.
 

4. Who’s in charge of administering/ maintaining once migration takes place?

Once the migration to digital video takes place, it is vital that someone with PC experience take charge of the process. Some companies have been able to use or convert their existing IT manager, others have found the hiring of a professional DVR security manager more beneficial. Either way, someone needs to take ownership of that function.

As is true for most companies, a security group usually has to meet with finance officials to justify the cost of hiring a new administrator. Additionally, a decision needs to be made whether the agency will use one network or two. While running e-mail functions and digital video functions on one network can be less expensive, some operations just don’t want to put the physical security component on the same network as e-mail.
 

5. A question of price

Issues of storage, bandwidth and picture quality all factor into the pricing. If pricing is critical and the operation needs to record just certain events, then the price will be lower. However, companies that foresee themselves requiring a lot of storage should buy from a manufacturer that offers the best compression technology for digital video. Compression technology refers to the manner in which video frames are compared and analyzed.

Specifically, companies with no restrictions on bandwidth can invest in premier digital video technology, in which compression is targeted to the highest picture quality. If, however, bandwidth needs are limited and specific image detail is not a concern, customers can select a manufacturer with a compression technology that uses less bandwidth.

For perspective, casinos require high image detail because security personnel need to see specific details occurring at card tables and other locations throughout their facilities.
 

6. Is accessibility a key factor?

Many operations need to determine how accessible the data – or video surveillance – needs to be. Accessibility to video does not occur in the same manner as civilian security. For example, if a bank is robbed, an FBI agent will go to the bank’s security room and download a video clip from a DVD or VCR. The investigation is done at the point of the crime.

In many organizations, though, the investigation occurs in a monitoring center via remote means where the data – or video surveillance – is centrally stored. Ultimately, organizations should seek manufacturers that provide remote access for data.
 

7. Network deployment considerations

Network deployment and network topology are very important considerations in the realm of buying decisions. If surveillance is spread over a local area network, then bandwidth is not an issue. But if the security is spread over a wide area network – with varying high and low speed access points – the security operation needs to work with a manufacturer that provides the proper equipment.

These considerations should serve security executives well as they embark on buying security equipment for the first time.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0421-Edu-FEAT_MAIN_1170x878px

    7 top tips for buying the best video analytics software for your business

    See More
  • supply chain images

    7 Strategies to Defend Against Supply Chain Risks in the Digital Era

    See More
  • business resilience teamwork

    7 tips for organizational resilience all year round

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing