Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Bandwidth Bottom Line

July 1, 2007
“There is a widespread misconception that HDDs and digital signal processing have solved the woes we all once experienced when analog video recorders were the preferred recording media,” observed Jack Fernandes, president and CEO of American Fibertek.


This month, Security Magazine asked Jack Fernandes, president and CEO of American Fibertek, to participate in VISIONS, a monthly forum in which top security industry executives comment – from their perspective -- on current and future developments.

Security Magazine: What are some of the major considerations in the security industry’s rapid conversion from analog to digital?

Fernendes: There are two primary factors affecting the industry – specifically the transmission segment of the industry, which has been our core area of expertise for many years.

The first factor is that signal transmission continues to migrate from point-to-point cable to a networked platform. In doing so, the traditional network devices traditionally responsible for trafficking signals over a network do not offer the functionality required specifically for video surveillance and security applications. For example, a conventional network switch will indicate if there’s a valid network connection and if data is present. This is not adequate for networked video surveillance systems. Video streaming requires consistent signal transmission; without that, complete, fluid images cannot be transmitted, viewed and/or recorded. A conventional network switch will not tell you if you are consistently transmitting a D1 quality signal at real-time video rates. There are also other considerations such as input alarms, auxiliary outputs and the ability to handle other forms of communications.

The second factor is that digital security systems store their information predominantly on hard disk drives (HDDs).

Unfortunately, there is a widespread misconception in the security industry that HDDs and digital signal processing have solved the woes we all once experienced when analog video recorders were the preferred recording media in the industry. Although recording quality and performance have improved immensely with digital video recorders or DVRs, there are still serious issues at hand affecting security systems every day. The truth is that HDDs are very sensitive to environmental conditions, and have been in use by the computer industry for years without much attention to this all-important issue. The reason for this oversight is that HDDs were not developed to rotate non-stop 24/7 in computers as they now do when embedded in a DVR. The result is excessive heat. Combine DVRs in enclosed rack systems, and the problem escalates. Operating at the extreme limits of a DVR’s operating temperature range can reduce life expectancy by as much as 40 percent. In addition to dramatically increasing the total cost of ownership for DVRs, there’s the issue of lost, irreplaceable data if the HDD ceases to operate.

These two factors alone have provided the impetus for us to develop more advanced network transmission and environmental monitoring solutions specifically for video surveillance and security applications.

Security Magazine: What are the main considerations when planning or evaluating video surveillance and security network infrastructure?

Fernendes: Bandwidth is the most important single criterion when designing a networked video surveillance and security system.

There are generally two misconceptions our staff encounters frequently. The first is that the specified available port bandwidth of a network is completely available for trafficking video surveillance signals. In reality, only about 50 percent of the specified bandwidth is actually present after system overheads are accounted for. This problem is compounded as network recording and viewing operations and applications both require additional bandwidth further diminishing available bandwidth.

The second misconception is that this bandwidth is always available.

In many instances, IP video security system operations share a network with traditional IT operations. As a result, there will often be times when an individual camera may not be available for either viewing or recording from lack of “available” bandwidth as a result of network traffic. This is simply not an acceptable situation for video surveillance and security applications.

Security Magazine: Can IT and security coexist?

Fernendes: Given the continued migration to networked video surveillance and security systems, I believe we will see relationships between IT and security professionals also continue to grow. If only one backbone exists, there will inevitably be issues to be resolved as a result of using a shared network. The best way to achieve this is to divide functionality between IT and security personnel so that each maintains control over their respective functions without affecting the other.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • The Enhanced Video Alarm Meets the Bottom Line

    See More
  • mobile_enews

    Security and the Bottom Line: The ROI of Mobile Device Management

    See More
  • Taking Video to the Bottom Line

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products

Events

View AllSubmit An Event
  • December 5, 2011

    Wireless Bandwidth

    When designing a surveillance system, there are occasions when a wireless connection may make sense for reasons such as cost, time savings, ease of installation, capabilities, or aesthetics. But will there be enough throughout to successfully pass your video on a constant basis? None of the arguments stated here will cause you to utilize a wireless link if it’s going to prove detrimental to the overall solution. In this session, we’ll look at the options and their outcomes under various situations, to help you to make an educated judgment on whether or not to go wireless.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing