Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What’s Hot, What’s Not in Video Surveillance

April 1, 2009
“One key advantage of IP-based video is also its Achilles’ heel, the ability to use present network infrastructure rather than coaxial cabling,” said Steve Walin.


Security Magazine recently interviewed Steve Walin, who is chief executive officer at SAMSUNG | GVI Security in Carrollton, Texas.

Security Magazine: What’s happening with IP cameras as compared to analog?
Walin: Several studies have shown that IP cameras sales will eclipse that of analog, but nobody can say for sure when this will happen. While it is true that analog camera sales will decrease over time, analog will never completely disappear. In fact, the trend may actually be slowing down somewhat as previously forecasted. Less than fifteen percent of video surveillance applications in the Americas are buying or using IP/digital video.

Security Magazine: Why?
Walin: There are several reasons.
  • Many analog video systems are installed running on coax and users are simply upgrading components. In other instances, security managers are leery of moving beyond what they already understand and works for them.
  • Many end-users and resellers, including dealers and integrators, are also uncomfortable with IP/digital surveillance. “What I don’t know, I’m not going to propose.”
  • One key advantage of IP-based video is also its Achilles’ heel, the ability to use present network infrastructure rather than coaxial cabling. Running bandwidth-intensive surveillance video over corporate data networks is a point of organizational contention, with its potential impact on network performance. Too often, it is easier to go the security department’s traditional way than to fight.
Therefore, support programs via manufacturers and their integrators become especially important for end-users in IP video solutions and sales. The key to helping integrators and end-users deploy IP video solutions is to take a combination of premium quality hardware and in-depth servicing, on both the front and back ends of the sale. This is especially imperative on big orders, such as the 14,000 cameras we now have working at Latin America’s largest bank or the immense system now going in at one of the world’s largest retailers, covering both Mexico and the United States.

Security Magazine: What are your strategies?
Walin: As a result, we are employing a variety of programs to serve our integrators and their customers, such as using inventory as a competitive tool so that we can deliver product quickly. Likewise, we continue the process of introducing and rolling out a series of IP products, including cameras, to meet the emerging technology shift to an IP focus.

Security Magazine: How do we build the foundation of tomorrow’s IP system with today’s analog system?
Walin: End-users want to make sure that their system choices provide an upgrade path that is forward-compatible with a future of fully digital IP/digital architecture. This can be done without throwing out perfectly good analog equipment. To maximize the customer’s technology choices at the camera, the transmission system and the head end, leading video systems suppliers and integrators are providing products that “connect the dots” between installed analog and digital equipment and between security- and IT-based perspectives.

Joining analog equipment to the digital future is facilitated by the adoption of unshielded twisted pair (UTP) as the transmission medium. Fortunately, there is a way to implement a cost effective UTP system that gives customers the product choices they need. A UTP-based solution supports today’s cost effective analog systems while providing the IP ready cabling infrastructure needed for when a switchover does occur.

For many, this is a simple solution. Almost all new construction projects include the laying of CAT 5 or CAT 5E cabling, the infrastructure wanted for IP/digital systems of any and all types, including video. Once CAT 5 or CAT 5E cable is available, the rest becomes easy. True IP-based digital surveillance employs cameras using signal processing to send video streams over the LAN through a CAT 5 or CAT 5E cable rather than a coax cable network, utilizing greater bandwidth and standard TCP/IP communication. With IP/digital-based video surveillance on CAT 5 or CAT 5E, a user can connect surveillance cameras to any network or wireless adapter, being extremely flexible in their placement of the camera itself.

The “middle of the road” of video surveillance is upgrading video surveillance by using a digital video recorder (DVR). A DVR system is not really fully IP-based, but is a step toward the more advanced IP technology. In actuality, a DVR system uses the same camera and structures for cabling as the older security video analog systems, but the old VCRs and multiplexers are replaced with DVR for storage of the data. The data is converted to digital so that it can be stored on hard disks, but the quality of the images captured remains analog since this is how it originated. In other words, analog signals are fed from the cameras to the DVR where they are converted into digital signals for storage and/or transmission over digital networks.

DVR sales will continue to grow. As an example, there has been a continued increase in the use of video to monitor customer and employee behavior, especially in the retail market. The retail store security market vertical is the largest single market vertical in the Americas security market and the accelerating transition from analog to IP video is rapidly making the DVR segment the largest and most important product category with annual sales growing past $1 Billion. The numbers of cameras are big as well. Per example, a nationwide retail pharmacy chain’s initial order for its 80 locations was 1300 cameras, over 16 cameras per location! In most cases, the entire cost of all the video equipment needed is beyond the scope of the security department’s budget.

That’s why security departments of multi-location retailers are already working with their counterparts in operations and marketing to amortize the cost of their digital video surveillance investment.

Security Magazine: Operating standards? Which operating standards?
Walin: The lack of proper operating standards prevents commoditization and innovation of some products. Therefore, users must select a partner that can support them now and into the future. A poor choice may force a user to replace product that they recently purchased or have an isolated system that can not communicate with their video management software.

Another problem that affects operating standards is a lack of a clear definition of terms. For example, “MPEG-4” everyone knows is an industry standard. However, upon closer examination, there are 20 different profiles of MPEG-4 compression, the latest being H.264, which is also known as MPEG-4 version 10. So, Samsung offers both MPEG-4 and MJPEG compression options in their new line of IP cameras.

More than ever – while the need for more security is recognized but the budgets are getting tighter – the world of video surveillance continues to be one of caveat emptor. Users need to know that their supplier can cover them for both the short- and long-run, from analog through IP.

Security Magazine: What is 2009 going to look like?
Walin: According to IMS 2009 Video Security Market Reports, video surveillance spending has already slowed down in North America, Europe and Japan, especially in the retail and banking markets. Thus, those in these sectors with budget to spend can expect some very good contract options this year. Since video surveillance is recognized as essential for protecting the public, government funding for transportation and government verticals still exists. Overall, the industry will gain only 4 percent in these areas in 2009, rebounding in the following years.

Growth of 20 percent, however, is expected in Latin America, Eastern Europe, including Russia, and the Middle East in 2009 with the combined sales in these areas approaching $2 billion in 2012. China will also provide high growth over the next couple years.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Interagency Security Committee -- What You May Not Know

    See More
  • No TSA Security Video in Newark Air Breach; But What about Amtrak? No Screening

    See More
  • video collaboration

    Effective video collaboration: What you need to consider before investing in a system

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s in europe.jpg

    Surveillance in Europe

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products

Events

View AllSubmit An Event
  • February 20, 2012

    What's New with AXIS Camera Station

    AXIS Camera Station One is a software solution for the simultaneous viewing and recording of high-quality H.264, MPEG-4 and Motion JPEG video from a single surveillance camera. AXIS Camera Station One is specially designed for use with Axis video products, and delivers superior results on a Windows PC, with no recording limitations in software. It helps you deter intruders, secure your garage or garden, or monitor your back door.
  • March 30, 2012

    What's New with AXIS Camera Station

    AXIS Camera Station One is a software solution for the simultaneous viewing and recording of high-quality H.264, MPEG-4 and Motion JPEG video from a single surveillance camera.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing