Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Savings, Efficiency, Local Control Among Business Incentives

June 5, 2006
Orlando Regional Healthcare was considering a gradual transition to IP video. But when considering adding video at two garage facilities, John Hackett saw the new installation as the starting point for a new IP system.


IP video, in turns out, is a business decision, not a technology decision. The attraction goes beyond the lure of new technology or even its smoother connection into IT and existing infrastructure.

Enterprise security executives interviewed for this special Security Magazine report on IP video agree that they have been motivated to purchase or upgrade to IP because of the “significant cost savings” over conventional video surveillance, operational efficiencies, equipment reliability and the balance of better control over the total system with the ability to scale down to individual building and application needs.

John Hackett, director of protective services for Orlando Regional Healthcare (ORH), first thought “stepped upgrade” of his analog camera setup but then “ended by rethinking our entire system.” The private, not-for-profit healthcare network with 1,572-beds spread over eight hospitals is now migrating from analog video security to an IP-based system, using Sony IPELA MiniDome network cameras in what will grow, according to hospital officials, to be a 500-plus IP camera installation in the next three years

Low cost and return on investment were business reasons driving South Australia’s Department of Transport to recognize the value of IP-networked video. An example is video protecting the South Eastern Freeway Tunnel project.

IP all the way

At Delaware State University, Chief of Police James Overton aimed at cost savings and efficiencies with smooth integration of security video and access controls. With the new system, each campus entity would be able to manage its own building while Overton could still control the overall systems’ approach.

For Bob Carter, senior technical officer, South Australia’s Department of Transportation, traffic monitoring by IP-networked video met his business need for “picture quality, feature set and flexibility to control other equipment.”

Hackett noted that once senior ORH officials saw that a capital investment in an IP-based system would deliver significant savings, initial plans for a gradual phase-in of IP were passed over for a broader, immediate implementation with 34 Sony network cameras installed in two garages, and 68 legacy analog cameras carried over into the system through encoders.

Even with the enormous effort invested in upgrades over the years, quality of the analog imaging remained sub-par and unreliable. Also, accessing it was problematic. “The DVR’s image quality was low,” Hackett said.

These challenges came to a head, he said, at two garage facilities. This required another standalone DVR, and there was no room in the security office to fit an additional unit. So instead, according to Hackett, this new installation would serve as the starting point for a new IP system. IT immediately grasped the IP security concept because they already had IP cameras installed in network closets to keep an eye on equipment throughout the system.

IT buy-in

“Obtaining the IT department’s buy-in was crucial. They requested that a parallel network built on a separate fiber optic cable be installed so that this could scale to an enterprise-wide IP security system supporting hundreds of cameras,” said Diane Savikas, project coordinator for biomedical/electronics for ORH.

According to Savikas, many of the buildings were designed with network architecture in mind. Data closets conveniently located throughout facilitated a Power Over Ethernet (POE) installation of cameras with Cisco 3750 POE switches. Power and data are carried over the single cable, saving the need for connecting cameras to electrical outlets, she said.

Low cost and return on investment were business reasons driving South Australia’s Department of Transport to recognize the value of IP-networked video. This is why they turned to IndigoVision to provide a migration path. According to Bob Carter, senior technical officer, “Picture quality, feature set and the flexibility to control other equipment made the choice easy.”

The South Eastern Freeway Tunnel project, specified by Rexel Video, was a good example of how IP video technology can be deployed. The existing security video cameras in the tunnel were connected to IndigoVision’s 10-way transmitter/receiver racks. These converted the analog video to MPEG-4, 25fps 4CIF hi-quality digital video for transmission over a newly installed fiber-based network.

By integrating cameras and digital video recorders into the system, Delaware State University security is armed with powerful information from close to 200 cameras around the campus. An integrated design allows security to use handheld scanners in the field.

Video part of integrated approach

For Delaware State University (DSU) in Dover, Del., it uses safety as a business differential in recruiting students. So Chief of Police James Overton turned to systems integrator Advantech Inc. of Dover to provide a solution. Advantech, in turn, selected Honeywell as their partner of choice.

Advantech President Eric Schaeffer chose the Pro-Watch Security Management System, a multi-tiered client server architecture, as a multi-campus solution for integration of the university’s building and vehicle access control, security video, ID badging, intrusion detection, asset detection and fire alarm systems. With the system, each campus entity would be able to manage its own building. The university’s Department of Public Safety, acting as overall system administrator, was given access to all locations to provide security for the entire campus.

To streamline the registration process, the companies worked to integrate the system with DSU’s student accounts/HR, dining and library systems. Now when a student registers, a cardholder record is automatically created within the system and dormitory access rights are assigned. To complete the registration process, the student simply walks into the ID Badging Center where his picture is taken and signature is electronically captured.

In response to a need from Public Safety to provide its officers in the field with the ability to verify the status of students and also to confirm if they are eligible for admission to events, the integrators brought in Beacon Technologies to provide a mobile solution that leveraged the companies’ system. Working together, they developed a system of mobile hand-held scanners that would maintain cardholder databases synced with Pro-Watch and also function as ticket writers.

By integrating Honeywell cameras and digital video recorders into the system, DSU security was armed with powerful information from close to 200 cameras around the campus. A unique feature of the system was the ability to provide a verification window for the security officers, displaying badge information and live video of the activity. For example, when someone uses the card reader at the point of entry, the badge photo comes up on screen at the dispatch center, as well as live video of the event. With this information, the security officer was given the ability verify that the person entering the door was the same person on the photo badge.

The benefits

The integration of the system with the student accounts structure saved the university thousands of hours per year in data entry and wasted time. “Instead of running multiple independent systems, the card holder record only has to be entered once,” said Schaeffer. “Not only does this save time, but it dramatically increases accuracy since it ensures the card holder’s record is identical throughout all the systems.”

The integration also provided an increased security level. Once an entry was made in the Student Account/HR system, that individual’s access rights could be automatically cancelled within the system, quite useful in cases of student expulsion or the retirement of a staff member. “In the past, a cancellation was contingent on an administrator remembering to call Public Safety to cancel the individual’s access rights. If it was forgotten, then that person could have access rights indefinitely,” said Chief Overton.

The handheld scanners also helped save time in the field. For example, during a campus event, Public Safety could set up admission points anywhere on the perimeter of an event and quickly admit authorized students.

With video surveillance in place, campus police were able to make several arrests of students who were caught breaking into the residence halls. “We were able to capture the event on video and make a CD of it,” said Overton. “Knowing most of the students, my officers were able to identify them right away – that’s how clear the video was. We made an arrest within hours and were able to show the video to parents during orientation to demonstrate how we are protecting their children.” v

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber remote work

    5 ways IT departments can build trust among their business partners

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing