Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Software Sets the Course for New System Solutions

By Cynthia Freschi
April 1, 2009


There are many reasons for the industry transition to IP-based digital video surveillance systems, but one of the most compelling is the management and control of an integrated system through the use of software-driven solutions. Moreover, many of these software-based management and control programs can be deployed in hybrid video surveillance systems.

Analog cameras are still commonly used in video surveillance systems due to their lower cost, wide range of choices and high quality imaging capabilities. As a result, video management software solutions that address this fact are growing in number. Implementation of such a system can help protect the end-user’s hardware investment. Additionally, analog system technology has steadily been adding improvements to close the gap between analog and digital systems. For instance, today’s DVRs (digital video recorders) offer many of the same features and benefits as an NVR (network video recorder), including IP camera support, remote access and scalability. These kinds of enhancements will support the continued use of analog cameras, and potentially the overall life of analog/hybrid systems.


IP Influence on Management Solutions

However, the advent of new H.264 megapixel IP video surveillance cameras is having a dramatic influence on the utilization of software-based management solutions and the overall manner in which video surveillance systems are configured, managed and recorded. The high efficiency of the megapixel chip allows for more advanced video analytics and push technology, as well as other advanced capabilities that are only possible on a networked platform.

Video captured by H.264 megapixel cameras offers outstanding images for live viewing as well as the ability to view extremely fine detail when using digital zoom. In addition, the improved picture quality and image analysis delivered by megapixel cameras can take better advantage of the newer VGA and XGA display devices.

In addition to megapixel technology, current IP camera technology features upgraded processing power in the camera chips to include faster digital signal processors (DSPs), field-programmable gate arrays (FPGAs) and application-specific integrated circuits (ASICs), all of which support software management solutions.

When considering all of these aspects in designing an integrated video surveillance system, it is obvious that there is no cookie cutter method to follow. Each project must be approached from the viewpoint of what issue/problem does the customer want resolved and what system design will best achieve that goal without making any sacrifices on overall system design or performance.


Video Management, PSIM Software Convenience

Whether the answer is an IP-based digital solution or a hybrid solution will depend on a number of factors; but ultimately the end result must, at a minimum, provide intelligent solutions for delivering, storing and managing the video and data and, on a more sophisticated level, tie together and manage other physical security and safety applications.

Today’s video management software offerings and the more complex and advanced physical security information management (PSIM) software are designed to do just that. Both video management software and PSIM software are dedicated applications designed to bring the technology infrastructure together onto a single platform. With these kinds of software-driven solutions, the video, analytics (i.e. event forensic as well as license plate recognition and people counting), building management, access control and business applications such as POS can all be integrated.

Further, the video and data information can be incorporated with policies and procedures to provide operators with all required information for intelligent response, such as alarm verification and rule-based, predefined actions determined by events.

And while this may appear to be a complicated activity, the software manufacturers have paid particular attention to the design of the interface so that the functionality is easier and more convenient to manage.

Examples of this include touch-screen technology and map-based interfaces which allow for powerful investigation tools to effectively and automatically identify incidents, notify and inform corporate security personnel on and off site, and manage the response to a security breach or incident.

Backward compatibility and advanced management and control of integrated systems are certainly driving forces behind the adoption IP-based security systems, but the additional benefits of reduced costs and operational/workflow efficiencies are proving to be equally as important in value. Combined, they provide sound reasoning for designers and system integrators to implement software-based solutions as part of an intelligent system blueprint.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cynthia Freschi is president of North American Video, with fully staffed offices located in five states. Her firm is an SDM Magazine Top Systems Integrator.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Software Solutions Drive Convergence

    See More
  • Spec Sheets as Foundation for System Design

    See More
  • The Finishing Touch: Choosing Displays To Complement Your System

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing