Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

VIDEOSurveillance: IP:Leverage Your Existing Infrastructure

May 6, 2006
Multi-factor alarm architecture leverages multiple components in a security infrastructure for more proactive event response. A rules engine helps the enterprise take its security policies and makes them into automatically executable processes and alarms. Photo courtesy: Verint Systems, Denver, Colo.


The world of IP came into sharper focus at the recent International Security Conference in Las Vegas where, it seems, every other booth was displaying IP-based security video, access controls, security management and monitoring.

Powerful, IP-based platforms empower enterprises, their security operations and the bottom line performance of the organization. On the image side, standards-based and IT-friendly platforms provide interoperability with other security and enterprise assets with the goal of simplifying the management of large-scale, distributed video operations.

To promote the most effective use of existing security resources and enable an organization to rapidly respond to security events, IP-based video management platforms must distill large volumes of video, audio, access control and sensor data into actionable intelligence – timely, mission-critical security information that can be readily understood and acted upon, according to Mariann McDonagh, Verint Systems, Denver, Colo.

Multi-factor alarm architecture

Leveraging multiple components in a security infrastructure for more proactive event response is commonly referred to as multi-factor alarm architecture (MFAA).

For most organizations, the challenge is not how to capture information but how to distill the most timely and important data captured by a broad array of security systems. MFAA bridges hardware, software and IT systems to transform structured and unstructured data into the intelligence that equips organizations to effectively respond to threats and breaches.

MFAA combines security system and sensor data with mission-critical video and powerful analytics to pinpoint significant events, images and data. Then the intelligence is sent to the right people, wherever they are located: to consoles and Web browsers, physical security systems, video walls, mobile phones and even PDAs.

Today’s security systems generate vast amounts of data from a variety of sources in diverse formats. Digital video and recorded audio can be analyzed at the network edge and transmitted over wire-line and wireless networks, where it is stored in data repositories. Sophisticated security sensors and access control devices equipped with chemical, biometric and other screening technologies are taking the place of manned security checkpoints and guard stations, said McDonagh. Even traditional fire alarms have been upgraded to allow communication with automated fire suppression systems.

Security device standards continue to evolve, but integration technologies now can translate the diverse output formats of these devices and communicate in a universal language.

Software development kits

Multi-factor alarm architecture ensures the long-term investment protection of the systems that comprise a security network by harnessing their aggregate power and the resulting actionable intelligence to enhance the overall enforcement of security procedures.

In order to facilitate the information mobility required by an MFAA, an IP-based platform must include a robust software development kit (SDK). It facilitates integration of complementary security, business and information technologies such as access control systems, cameras, analytic solutions, point-of-sale applications, etc. A comprehensive SDK should include pre-defined integrations to most major vendor solutions, advised McDonagh. This increases the flexibility of an MFAA and allows an organization to select the video, business and security solutions that best fit their needs.

Once the devices in an MFAA are able to communicate with each other, an organization must establish rules to define how they interact. IP-based security video platforms from leading vendors provide sophisticated rules-based engines that incorporate data from various security devices along with video analytics to provide automatic event notification, video distribution and process activation in response to events and behaviors.

Automated event detection and response is a key advantage provided by an MFAA. It enables an organization to proactively address potential threats and promote optimal response to emergency situations.

In this regard, IP-based video management platforms support MFAA with sophisticated analytical tools that actively identify threats before they escalate. Video analytics combine information from access control devices and perimeter sensors with video footage of people or vehicles crossing virtual perimeters or entering restricted areas. This comprehensive view of a security threat helps to eliminate false alarms and ensures that an appropriate and proactive response is initiated.

In addition, IP-based video platforms provide the capability to distribute surveillance video to multiple disparate agencies in order to reduce response time and effectively manage critical scenarios. An MFAA can deliver a wide array of responses to operations centers and law enforcement command posts.

IP-based video management platforms are ushering in a new era of complex, automated security methodologies. MFAAs are empowering organizations to use combine existing security resources for more advanced processes that effectively respond to dynamic security threats.

So What Does a Rules Engine Do?

Rules engines allow an organization to easily convert security policies into executable processes.

Here is an example of how rules would define an MFAA process:

Detect all instances of subjects triggering specific access controlled door and entering secure area between 10:00 pm and 5:00 am.

Commence recording on all passive cameras in proximity once access door is breached to provide a 360? view of the area.

Send alarm notification to wireless device of security personnel in closest proximity for further investigation.

Push video feeds of subject entering secure area to video wall in centralized command center.

This example from Mariann McDonagh of Verint Systems illustrates how the data from multiple access control and video surveillance cameras is collected, distilled and transformed into actionable intelligence in an MFAA.

IP’s ISC Takeoff

Zalud’s Blog (go to http://blog.securitymag.com for updated content) at last month’s International Security Conference reported on numerous technology event. An important one was the first ever meeting of the IP UserGroup USA, an independent security technology forum dedicated to networked security and building management solutions. Security Magazine’s reporter mostly saw vendors and researchers at the meeting and who have identified with IP security video – indicating the evolution to IP driven by technologies and suppliers at first. Pictured here: Kevin Fagen, Director, IP Security Events and Media Limited, and Paul Hennings, Editor, IPFocus Director, who flew in from England to arrange the event.

The IP UserGroup community of 10,000 mostly UK members is dedicated to understanding and promoting IP networked technology and its use in security, surveillance and building management solutions. Some of the activities and benefits the IP UserGroup offers current members and its new members in the US: IP-in-Action LIVE educational forums where members and guests come together for seminars, master classes, workshops and hands-on technology demonstrations and for discussion and networking; a constant stream of education and information sharing in the IP UserGroup “virtual community” through e-letters and technical bulletins.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding

Epstein File Data Security Update: Raw Code Found in Emails

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • District Wide Security System Leverages Existing IP Network Infrastructure

    See More
  • Think Hybrid and Save Money: How to Maximize Your Existing Video Surveillance Assets

    See More
  • VIDEOSurveillance: Wireless Mesh Networks

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • September 19, 2012

    Oil & Gas Critical Infrastructure & Asset Security Forum 2012

    The Forum will cover security issues related to both offshore and onshore oil and gas arising out of civil unrest, terrorist activities, and a competitive global market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing