Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Inside Security Integration

By John Mesenbrink
January 20, 2003
SECURITY talks with systems integrator, North American Video, Brick, N.J., about the essentials of systems integration. The following is a Q & A session with Cynthia Freschi, president of North American Video.

Q: What types of standards, platforms and protocols do you recommend for your customer?

A: At North American Video, our system design parameters are dedicated by the user’s specific needs and applications. Every customer has different needs that are based on a number of factors, which are limited to current CCTV equipment and specified platforms required by the IT departments. Today, network compatibility and available bandwidth are increasingly recurring concerns as users are starting to look at IP-based systems. This is the direction that the security industry seems to be headed in at this current time.

Q: Similarly, what type of camera equipment and compression schemes do you recommend? Or does each particular application demand a unique setup specific to that project?

A: Every installation North American Video is awarded is approached as a unique installation. There are very few instances where the same system installation may apply in two different locations. A perfect example is the over 175 post office facilities where we’ve installed CCTV systems in the New York tri-state area. The system parameters are basically identical, but each system had its own nuances. Factors such as lighting, building construction and physical layout called for each system to be modified to best meet the specific location. Casinos also have similar needs, but the system we’ve designed and installed for the Tropicana is very different from the system we are presently installing in the new Borgata Hotel & Casino in Atlantic City. At this level, no two systems are ever quite the same. Each application demands its own particular specs.

Q: With digital being the most dominant factor in CCTV, how

do you avoid bandwidth or network space allotment problems?

What do you recommend here?

A: Networked IP-based video surveillance systems are the wave of the future. Several of the leading manufacturers are heavily promoting their IP video systems capabilities, but in reality, this technology is still a few years away from replacing more conventional and proven forms of transmission for core systems operations. To run a large CCTV system, most mid to large systems will require a dedicated 1GB Ethernet network. Without such bandwidth and speed, the concept of adding a security system onto an existing data network is simply not practical. For most situations, we still recommend fiber optics transmission systems with integrated Ethernet integration for specialized remote monitoring applications. We believe this is the most effective combination of transmission technologies based on the hundreds of systems we’ve installed to date.

Q: Take us through the process of integrating video with access control. Is it a seamless transition or is it more complicated than that?

A: Video surveillance systems manufacturers have realized that there is a distinct need to interface alarm, access control and CCTV systems together. Today’s advanced matrix systems have software driven capabilities that allow them to detect and react when an alarm has been triggered or an access/entry site has been compromised. There are also several different software control programs with hardware emulation that are making it easier and more efficient to integrate alarm, access control and CCTV systems. North American Video’s ability to integrate security systems has been instrumental in securing some of the industry’s largest security systems contracts.

Q: Please explain the complexities of retrofitting. How do you balance the old technology with the new? Are systems then open to scalability?

A: Technology is changing so fast that CCTV systems installed just a few years ago are paled by comparison to today’s new devices. Cameras, digital recorders and computer driven swtichers are the primary factors for the improved performance capabilities. However, no one likes to discard equipment after a few years when it seems to be functioning well. We try to incorporate as much of a user’s existing systems as possible unless we feel the existing equipment compromises the integrity of the facility’s security. Older cameras can be positioned in secondary locations where activity is more crucial to detect than identification; recorders can be reassigned and so on. The condition and performance of the existing systems need to be evaluated on a case-by-case basis before any retrofitting can be seriously considered. As a result, retrofitting is often more difficult and equally expensive as installing new systems components. With new dome cameras, for example, one camera may replace two or three units because of its superior coverage capabilities and sensitivity.

Q: Do you recommend or offer offsite management? The ability for a manager to monitor his or her site remotely is important to some. How do you integrate video with the Web, PDAs and wireless?

A: We recommend what we believe best meets our clients’ needs. North American Video provides offsite remote viewing solutions when and where they are appropriate, but we do not provide monitoring services in-house. With today’s Broadband connections we are able to send video and control signals via the Internet, which allows the user to access their security system from any PC. Interfacing video with the Internet is no longer a mystery with the vast assortment of interfaces and software available. There are even new networking solutions available that allow images and system data to be transmitted directly to wireless PDAs and cell phones.

Q: How can the final security package result in a security management system? Briefly explain how that works.

A: By clearly defining a user’s security objectives at the onset of a project, we have a clear-cut idea of how the system will look, feel and perform before installation takes place. Given the high level of integration between CCTV, access control and alarm systems technologies, most of the systems we design are security management systems since they incorporate all of the essential security elements.

Q: Do you offer training for end users? Please explain.

A: North American Video provides on-site training with unlimited technical support for our customers. This is a critical stage for users when implementing a new security system, or even when upgrading a system. They need to know how to get the most out of their system from day one.

Q: How important are customer service and support?

A: When a customer knows he/she can depend on you to keep their security operation up and running, especially if a problem arises, you’ve probably made a customer for life. This business is all about reliability—a security system is useless if it is not functioning 100 percent. That’s why customer service and support are top priorities at North American Video—there’s nothing more important. It is one of key reasons why North American Video has grown exponentially over the years.

Q: Which video companies do you work with and what is the significance of teaming with these companies?

A: We work with every major manufacturer in the security industry. This gives us access to all the latest new products and technologies for each specific design and installation. It also provides access to specialized equipment that is often needed from installation to installation for specific application requirements.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Beyond the Camera

    See More
  • Digital Video Storage and Retrieval

    See More
  • The View is Better from up Here

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing