Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Is the Recession your Ticket to IP?

By Mark McCourt
May 1, 2010
Martin Gren, co-founder and board of director member for Axis Communications, says that surveillance video technology will continue to move toward consumer and IT standards such as H.264 and HD, giving security professionals the look and feel of high-end home entertainment systems and mobile devices. 


Jade Morris, CEO of QuickNets Communications, believes that changes in technology’s value to the customer ultimately drove its adoption and has helped Nevada Energy to do more with less. 

For years, IP video has clung to about 15 to 20 percent of the video market, with analog holding steady as the mainstay. Despite the added features and functionality of IP-based systems, sales growth has been slowed by higher cost and the lack of technical knowledge among the design, installation and service companies. 

Now, though, it appears that the recession is part of a perfect storm that increased IP sales in 2009 while analog video systems declined. Is this the year that you and your organization make IP video the standard system specification instead of the exception?

What is driving the continued growth of IP as a percent of video surveillance systems sold and installed? First, look at what you are being asked to do as a result of the recession: more with less. And the reality of that request is a heavy reliance on surveillance systems to be your remote eyes and ears, thereby empowering fewer security officers to be more effective and efficient. And the more surveillance you employ the more video you create and the less that your officers can actually observe.

That means that your video surveillance system needs more functionality to be an effective solution. That demand for functionality is driving analog systems toward economic obsolescence because 1) the ongoing cost of operating a legacy system meets or exceeds any additional investment in a new IP system and 2) the functionality of the legacy system restricts performance and your ability to provide security as consistently and constantly as you need to achieve your goals.

In the late 1980s, Sun Microsystems co-Founder and CEO Scott McNealy proclaimed, “The network is the computer” as distributed computing was allowing us to do amazing new things like send a word document from one person’s PC to another person’s. Today’s growth of network video and the rise in cloud computing are clear signs that your next upgrade will be based on IP technology, which is being based on consumer standards that mean broad manufacturing applications and open systems which in turn, reduces the cost.

Network video forecasts never seem to change; we just push the years out on the Y-axis when the forecasts do not come true. But this time it is different. In 2009, it appears that analogue camera sales declined 15 percent, while IP or network camera sales increased about 15 percent. IP did not enjoy the prior 40-percent plus year over year growth it had, but when you compare it to analog, its growth is impressive. Based on 2009 results, the forecast is that IP will pass analog camera sales in 2013.

Why is this important to your organization? While you never want to be on the bleeding edge of technology, you do need to understand and adopt technologies that drive security performance and reduce costs. Again, it’s about doing more with less.

Here are a few trends for your consideration when reviewing your current video surveillance system in alignment with your security program objectives.


Dan Tullis of Nevada Energy spoke about the challenges of convincing management at the utility that technology upgrades can be a cost-effective investment. 

Functionality

There is nothing wrong with my turntable, except that it is not mobile, doesn’t play my iPod songs and I cannot download songs to it. And the albums available to play on my turntable are scarce, at best. It works great with low functionality. That, in a nutshell, is the driver for IP over analog. 

Jade Morris, CEO of QuickNets Communications, a leading systems integrator based in Ventura, Calif., presented “Game Changers” at the recent Axis A&E Conference. His discussion of the IP phone, mobile phones, the iPod and ultimately, IP security outlined how significant changes in technology’s value to the customer ultimately drove its adoption. Specifically, he related these changes to his recent project with Nevada Energy and its system-wide security upgrade to use IP networks and surveillance systems to “do more with less.”

Dan Tullis of Nevada Energy spoke candidly about the challenges of working the upgrade through general management at the company. “There was a perception that Ethernet is in some way, ‘bad’ and that Digital was ‘good.’ So we had to stop writing and saying Ethernet and make sure that we talked, ‘Digital.’ Specifically, we talked about its benefits being cost effective and that it has an economy of scale, which we needed to utilize for this project.”

“Second, we focused on functionality and the quality of the security program. We did a lot of internal communicating to move the discussion toward the quality of the security program as a result of this investment and moved the focus of the discussion away from the cost of the investment.”

Today, the Nevada Energy security team uses touch screens, not joy sticks. But the new system didn’t require significant training. The technology improved functionality without adding complexity. Noted Morris, “The application of technology is key; not the technology itself. In some cases, less is more.”


The demand for functionality is forcing analog video systems toward obsolescence while increasing sales and installations of IP systems. 

What about the Technology?

Security video technology is strongly tracking consumer standards such as H.264. Officers can have the beneficial experience of watching consumer TV quality images versus traditionally poor quality analog images. Plus, networked video is mobile and easily distributed to handheld devices. Simply looking back at how digital cameras quickly supplanted film cameras gives you a solid example of what is anticipated in our market (see chart on following page). Technology that offers convenience, reduced cost, functionality, portability, content sharing, storage, instant availability and simple query search made the additional cost of a digital camera worth the investment to the consumer (Similarly, the iPhone is among the most expensive mobile phones sold as a result of consumer perceived value). And many of the features digital consumer cameras offer include the functions that you need in your surveillance system. 

What are the technology keys to the fast IP adoption growth as a result of the recession?

The H.264 compression standard has leveled the cost of the playing field. In a recent exercise, Kevin Marier, president of Security Consultants International (and publisher of IPVS Magazine), sent an RFP on a surveillance system in both analog and IP to several design and installation companies. The analog solution required eight terabytes of storage (8TB) and the IP system required two terabytes of storage. The bottom line? The IP system bids averaged 9-percent less (about $13,000 on a $140,000 project) than the analog pricing. While the pricing could be close enough to be called a technical ‘tie,’ the functionality and future flexibility of an IP system cannot be overlooked.

H.264 compresses the video data and eliminates time and cost related to transmission. Second, analytics combined with H.264 ramp up the economic model for you. Analytics in the camera identify if the picture (data) has changed or not. And it only transmits or sends new video to the monitoring center as necessary. And because something has changed and is new, the system can alert the officer to ‘look at this,’ which adds more economy of scale and value.

As cloud computing and software as a service emerge as real-world solutions for your security platform (if you have a monitoring contract, you are already using cloud computing), the investment in Capital and Operations budgets will be less of an issue. This is another example of the IT-izing of security, but via the Finance department. With a cloud-computing model, you can lease your security system and budget a fixed cost/fixed maintenance program. And like a leased car, you can give it back and replace it with next-generation technology when the lease ends. 

Power over Ethernet is another key trend driving value. PoE simply provides the power to run the security device over the network connection instead of requiring a separate power source. PoE means you can have a lot of technology on a camera or card reader that was not available before. It enables more functionality at a lower cost through an IP system. With the new PoE+, PTZ cameras as well as outdoor cameras can be powered over the Ethernet, further reducing the IP system cost.

HDTV is another consumer standard that is working its way into the business world. High Definition gives your officers and your archive the consumer experience you enjoy at home or a local sports bar. As HD becomes the next consumer standard and ultimately makes its way to the business world, quality images will enable greater response and improved security performance.

Storage, typically, is a substantial cost of your video surveillance system. But in the research done by Marier, an eight terabyte storage specification was reduced to two terabytes. How did this happen? The correct answer is, “all of the above.” It involved greater compression and the use of analytics. Add to that the cost savings provided by the application of PoE and cloud computing and you start to understand why the shift to IP is accelerating

Technology transfer, the amount of time and energy it takes we humans to learn, adopt and utilize new technologies and systems, have slowed IP adoption. The Axis A&E Conference is an investment in the future of the market, bringing experts and colleagues together to learn, touch and discuss network video systems and applications. As more channel companies understand the economics and technology around IP, the more it will be specified and adopted. After all, a turntable will never have the functionality of an iPod.
KEYWORDS: Security systems video

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • physical security technology systems migration to the cloud

    Now is the time to move your physical security to the cloud

    See More
  • communications-freepik1170x658.jpg

    Now is the time to prioritize your organization’s security communications strategy

    See More
  • What Your CEO Thinks: As Recession Recedes, Security Execs Feel C-Suite Spotlight

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!