Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Adding Surveillance Video to the IT Network

By Rick Geiger
February 1, 2007
Encoders networks enable analog video, so employees can view and search live and recorded video from anywhere on the corporate IP network.

Security personnel are increasingly interested in moving traditional analog surveillance video systems onto corporate networks. By extending access to live and recorded video surveillance throughout the organization by authorized personnel, they can enhance the safety of employees and guests as well as the security of the organization’s assets.

In addition, by transforming surveillance from a system to a networked application, security operations can focus on safety and security while reducing costs. IT networks can lower costs, in part because the processes and resources already established by the IT department can be applied to the surveillance function. Among these are procedures for automatic equipment software updates, continuous monitoring and maintenance of storage and edge devices status, including connectivity.

Application availability can be improved with existing redundant system designs for disaster recovery and business continuity. The key for organizations to realize these benefits will be to unify IP-based video surveillance with infrastructure security. Achieving this integration requires the physical security group to partner with IT in addressing security issues holistically, allowing each group to focus on what it does best; in the case of physical security operations, that is ensuring the safety and security of people and assets.

When involved in such a convergence project, it is possible to run into some resistance from IT. After all, IT is understandably concerned about the performance, cost and information security implications of suddenly adding volumes of video content to the network, servers and storage systems.
 

Why the Interest?

With network-based surveillance, security personnel can view live and recorded video from any network-attached device throughout the organization. This keeps them on top of what’s happening in multiple places; officers are no longer physically restricted to viewing video from a limited number of monitors hardwired to a coax video system in a security control center. A network technology called multicast, along with advances in image compression algorithms, minimizes the impact of additional video on network bandwidth. Multicast essentially is a subscription-based broadcast to all authorized requesting parties. Rather than sending multiple copies of the same camera video through the network, which consumes additional bandwidth, multicast facilitates transmission of a single copy of the video through the network thereby reducing bandwidth usage.

With a fixed number of ports, matrix switches are limited in how many cameras they can support, and expanding them requires additional equipment and cabling. This has resulted in multiple surveillance “silos” throughout large organizations. By contrast, network-enabled cameras and recording/storage servers can easily plug into scalable and efficient IT network switches. With a packet/frame-based protocol, such as Ethernet, multiple camera streams can be aggregated at the edge of the network, which can then leverage the same single connection (port) for most of their transport over the IP network.

Network-based video also heightens security because it makes it possible to correlate information from other systems. For example, point-of-sale (POS) data can be linked to networked video so that the footage can be tagged and then scanned for transactions, such as refunds or “no sale” operations when cash register drawers are open. In other words, investigations can be conducted more quickly with event-tagged video.

It becomes unnecessary to replace existing coax-based surveillance gear with the ability to send video from any camera to an encoder connected to the network. The encoder will digitize the analog video and network-enable it, even with old video control keyboards. Thus, you now have the ability to integrate different vendors’ proprietary surveillance systems so that they interoperate, using the IP network as the unifying platform (see figure).
 

Conclusion

It’s clear that the future of video is networked. The reasons are compelling: access to live and stored video at any time from any place and potentially lower capital and equipment maintenance costs. The transformation of video from a visual archive to an information resource means video can be integrated with the data mining and warehousing tools required by today’s security professionals. Making all this happen requires collaboration between the physical and IT security teams. A number of organizations have already begun walking the collaboration path.
 

SIDEBAR: Addressing IT Concerns

Concern ONE -- Security implications of video surveillance equipment on the network. While well designed IT networks and network devices (switches, routers, etc.) are highly secure, the IT team will want to understand the security capabilities of the surveillance equipment itself--cameras, encoders and storage systems. After all, these new network devices might be a target, or launching point, for worms, viruses or other malware that could impact network performance and deny service to corporate users. The IT group generally has policies that specify which systems can connect to the network and the level of security they need to meet.

In this case, it is important that the equipment has network security features that can pass IT’s vulnerability tests. If the supplier can demonstrate these capabilities, it will ease colleagues’ concerns about viruses and new attacks affecting the network.

Concern TWO --Storage requirements and associated cost could surge. Managing storage costs requires creating policies for necessary video storage and length of time the video is stored. Associating video with events will build rules for saving certain video based on correlations among the various events. This can significantly reduce storage requirements and associated expenses. Also, having storage managed by the IT group and leveraging their existing storage processes reduces overall storage equipment and management costs.

Concern THREE -- The amount of bandwidth, or network space, the video will consume. A single surveillance camera can generate 30-35 Mbps of raw (color, full-motion and uncompressed) video content. Adding video surveillance from hundreds of cameras to the network could overwhelm it. The added load could degrade network performance, create new management challenges for IT and require investments in additional network capacity.

There are a couple of solutions. First, conduct a threat assessment and situational analysis to determine the frame-per-second (fps) rate and resolution that needed for each camera. Second, choose an encoder or IP camera that will permit the frame rate and resolution to be set on a per-camera basis and one that will change either variable when a triggering event, such as “door forced” or “panic button pressed,” occurs. This will allow, for example, low-resolution 1 fps footage to switch to broadcast-quality 30 fps.

The right encoder will also allow a variety of video compression algorithms or codecs to be selected. The codec determines how the raw video is compressed (and decompressed) so that it uses less network bandwidth. Video encoders and decoders can use a high-quality MPEG-4 video compression technology that allows video streams to be switched over the IP network at up to full D1 resolution, and up to 30 fps, while consuming low bandwidth. Newer codecs, such as H.264, may provide additional capabilities for limiting bandwidth consumption.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rick Geiger is the director of engineering for the Converged Secure Infrastructure Business Unit at Cisco. Rick has also held senior management positions at GE Security, Interlogix and Itron. E-mail him at rggeiger@cisco.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!