Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Visions: PoE Impacting the Industry

June 1, 2009


Alan Forman, President of Altronix Corporation, understands that the security executive is looking for ease-of-use, system flexibility, while keeping the budget under control. Security Magazine had the opportunity to discuss some industry trends with Forman.


Security Magazine: Where do you see the security industry going in the next 5-10 years?
     
Forman: Our industry is increasingly deploying networked systems, which is a technology trend that is just now really taking hold and will continue to grow over the next several years. It has taken time, but the inherent benefits of networked systems have finally migrated to security applications as a result of technology influencers from both business- and consumer-driven technologies.
     
Initial network applications in the access control space were easiest and fastest to implement as bandwidth requirements for access data were not really an issue impacting network infrastructure – unlike bandwidth-hungry high-resolution streaming video. However, as a result of today’s improved video compression like MPEG-4 and now H.264 and vastly expanded bandwidth pipelines, the security industry is rapidly changing its mindset relative to IP video.
     
When evaluating the overall benefits of moving video from an analog to network platform, there are several attributes that immediately come to mind – with scalability, flexibility, high performance and cost-efficiency being those most commonly cited across industry lines.
     
One of the core technologies driving the networking trend is the ability to transmit video, control and data signals along with Power over Ethernet (PoE). Although every integrated video and security system is in some way unique, the ability to modify a system’s configuration along any point on the network by simply plugging in an edge device has tremendous advantages.
     
There have been issues with PoE delivery systems to date – perhaps the biggest being the lack of a viable solution designed to accommodate network IP video camera systems that are not PoE compliant. Two other significant PoE issues are the development of a PoE solution for power hungry PTZ cameras and for delivering reliable power over long distances.


Security Magazine: What do you see as the next industry product or technology trend?
     
Forman: Networked systems lend themselves to a whole new range of edge devices, middleware and management software to capitalize on the platform’s numerous operational benefits. Like in midspan PoE devices, we can expect to see new developments in network based products that further improve performance and efficiency. Megapixel cameras and IP management software are two good examples of categories that are specifically network related where the industry will continue to see new developments driving systems technology.


Security Magazine: How do you see PoE impacting future installations?
     
Forman
: PoE is a core technology for networked security systems. With the ability to deliver power efficiently and pass data signals over extended distances using a single Ethernet cable, the ability to scale, alter and enhance these systems is now a reality. Additionally, the ability to centralize power and data distribution provides substantial cost-efficiency versus having to install dedicated power supplies at each edge device site – whether it is IP video or access control related.


Security Magazine: Many security executives have to tighten the budget and do more with less: Do you have any tips on defending ROI (return on investment) and/or the business case for security during tough economic times?
     
Forman
: There are many business practices both from a technology and financial perspective that businesses can adopt to help make them more profitable during these tough economic times. When specifically addressing security, there are new products that can help provide more at lower costs. Each system requirement is different and integrating these technologies on a common platform can provide cost efficiencies.
     
PoE is definitely one solution that can help offset costs, which…represents a significant breakthrough, especially for those users who jumped on the IP video platform early with non-PoE compliant IP video cameras. Now they can centralize their power distribution for all their IP cameras – existing and new – and significantly reduce equipment and installation costs.


Security Magazine: Who is your best and brightest customer? What are they doing well?
     
Forman: Altronix works with top systems integrators and high-profile end-users around the world. We have customers in the Middle East, for example, that are leading the way in the deployment of networked systems for the financial industry.
     
We work with Fortune 500 companies that rely on consistent power to keep their systems up and running 24/7. And there are numerous other customers working on state-of-the-art, integrated mission-critical security solutions in areas ranging from government to gaming and education to healthcare.
     
The key to delivering and maintaining tight controls is proper system planning from end-to-end using equipment from proven suppliers who stand behind their products and provide best-in-breed support.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Visions: Intelligent Video Beyond the Talk

    See More
  • Visions: Remember the Three Rs

    See More
  • 1.Extended-PoE_Image

    Extending the Reach of PoE Powered Devices: 100 meters is No Longer the Limit

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing