Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Keeping Track Saves Money: IP Covers Everywhere

September 11, 2008
IP cameras controlled by the sophisticated video surveillance control and management solution deter vandalism, according to Greg Schumacher, senior network and programming administrator for the Beaumont School District.


Access and control of cameras deployed at ten schools in the Beaumont School District use a video surveillance control and management solution with map overlays of the city that display all the school locations.

It started out as analog for maintenance security but soon developed into a sophisticated IP-based security video design on a software platform that will, one day, handle over 900 cameras and a dozen remote sites.
     
With over thirty K-12 schools housing nearly 20,000 students and several administration buildings, the Beaumont Independent School District was looking for the most cost-efficient means to keep track of activities during and after school hours. Additionally, like most districts in the country, officials were looking to implement a strong presence as a deterrent to possible criminal activity while insuring the safety and security of all their pupils and staff.
     
Greg Schumacher, senior network and programming administrator for the district, working with security systems integrator Micro Integration, investigated several video surveillance options to address immediate areas of concern with an eye on expanding whichever system they selected to cover all of the district’s facilities.



The IP-based video surveillance system consists of a series of satellite systems installed at each location, each using the software platform.

START WITH MAINTENANCE

 The project, which started approximately three years ago, began by investigating different means of implementing a video surveillance system for the maintenance department. Initially, the district decided to go with black and white analog cameras in various locations with the intent of moving them from location to location to address specific issues. According to Schumacher, this proved to be a laborious task that was difficult to maintain. With guidance from Tommy Glenn of Micro Integration, Schumacher switched to a basic IP video system using Web browsers to access and control a small array of cameras.

   
The system proved its value quickly by helping school officials and the police department quickly identify and apprehend suspects. Mort importantly, incidents at the maintenance department quickly subsided once the word got out that the premises were under constant video surveillance.

   
Schumacher then looked to apply the same design to the three high schools. This required a more elaborate video surveillance control and management platform to tie the satellite video surveillance systems together from the three remote locations. To start the process, Schumacher and his team provided a wish list of capabilities and functionality to the systems integrator. The integrator recommended a comprehensive video control and management software solution from OnSSI that integrates camera control functions, NVR, virtual matrix, intelligent video delivery and content analysis all in one. 

   
“When we first started looking at various IP video surveillance control solutions on the market, it was quite overwhelming,” said Glenn. “Now we have templates and standards built using the software solution that we use on various projects. Our installation times are shorter and the customer receives a premier solution with open architecture so they are not locked into any manufacturers’ cameras.”
 



Captured video images can be exported and sent to anywhere on the network.

IMMEDIATE RESULTS

Once the new IP video system was installed, Schumacher said the results were almost immediate per his previous experience, and the number of disciplinary actions at the high schools dropped dramatically. Cameras were then placed in middle schools with similar results. A total of 600 IP cameras have been added to the system to date at ten schools with the goal of installing up to 900 cameras once construction on new facilities is completed.
     
To facilitate monitoring operations, staff accesses cameras with map overlays of the city that display all the schools’ locations. The system is hosted on multiple servers custom built by the integrator at multiple sites and integrated. The IP video surveillance system shares a centralized network backbone with the district’s IT system but is partitioned to assure uninterrupted operation and added network security. The cameras streaming to the servers require significant bandwidth on the district’s 1Gbps Ethernet network, so each of the satellite systems run independently on their own backbones and are then tied together on a WAN that feeds into the software platform. This distributed architecture greatly helps conserve bandwidth use.
     
The satellite systems integrate so they can be viewed from various locations including principals’ offices and directly at the police department. Principals can only see their own schools while the police have access to every camera in the system. Schumacher and the IT staff have control over all system programming and functions along with the integrator.
     
The bottom line: The solution is reducing incidents, improving surveillance and response, and saving the school district real dollars. Concluded Schumacher. “It’s very efficient and easy to use, as are the control functions for PTZ cameras, allowing even novices to operate them. As we continue to expand the video surveillance system here at the Beaumont Independent School District, the video control and management solution continues to exceed our expectations.”


SIDEBAR: Bringing Megapixels Down to Size

There’s a major problem slowing down the acceptance of megapixel cameras its high image resolution.  Even when compressed to about 5-10 percent of its original size using standard MJPEG compression, the video stream consumes large disk storage space and significant network bandwidth. So there’s compromise in video quality, archival frame rate or both in order to reduce overall system cost.  For the same reason, remote viewing over the Internet, wireless networks and busy corporate networks has been limited to slow frame rates due to insufficient bandwidth capacity.
     
A superior video compression technology, known as MPEG, has been available in low-resolution cameras for years.  The latest version of MPEG known as H.264 or MPEG-4 (part 10) or AVC was finalized by standards’ bodies.  It offers a significant stream reduction over MJPEG, as well as MPEG-2 and MPEG-4 (part 2) by as much as 20 times with no sacrifice in video quality.
     
However, the significant benefits of H.264 come at a cost: a multi-fold increase in computational complexity of the H.264 encoder. Numerous vendors now offer or have standardized on H.264, especially since the technology's big splash last year. One example, Arecont Vision's developed a fully proprietary H.264 encoder which supports their megapixel IP cameras across a full range of video formats, frame rates and resolutions.  In addition, the H.264 encoder had to support MJPEG as an option and support multi-streaming: a simultaneous transmission of several H.264 video streams at different video formats, frame rates, and/or resolutions. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Generic Image for Access Management

    5 Ways to Save Money with IP-Based Card Readers

    See More
  • MegaView 2 from Arecont Vision

    Saves Bandwidth by Adjusting Hallway Surveillance

    See More
  • Security blog default

    Coronavirus: Keeping Business Moving While Supporting Staff on the Road

    See More

Related Products

See More Products
  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing