This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » What Is Needed To Make A Surveillance SOA?
Security Enterprise Services

What Is Needed To Make A Surveillance SOA?

Laptop with picture of clouds
November 1, 2011
Bob Cutting
KEYWORDS ONVIF (Open Network Video Interface Forum) / PSIA / security standards / service-oriented architecture
Reprints
No Comments

Perhaps one of the more overused buzzwords of the last decade is “convergence.” While its origins lie in the foundational achievement of the convergence of networking and routing using a common Internet Protocol (IP), telecommunication companies and cable operators have brought this terminology mainstream to describe the passing of voice, data and digital media, such as video, over some common network infrastructure. This noble notion that convergence simply enables the passing of all types of data over a common system perhaps explains the loose and vague manner in which convergence is discussed within the security and surveillance industry. Often, people talk about convergence to represent the merger of physical security with the corporate IT network security. Others further condense the focus on the transition of surveillance video to IP networks. In short, “convergence” is ill-defined.

True convergence is more than just the coexistence of multiple media and content types on a shared network, or the migration of a technology to IP. Convergence demands that these multiple technologies are constructed as synergistic resources that are made interoperable through a prescribed communication protocol. From a software programming and integration perspective, this implies the construction of a service-oriented architecture (SOA) to achieve convergence. A convergent service-oriented strategy for the security industry – a Surveillance SOA – results in the ‘emergence’ of more streamlined interoperability alongside entirely new applications that leverage existing surveillance assets for security and non-security uses.

  

Where Do We Stand Today?

In the surveillance industry, much of our attention on convergence is drawn to the transition of video transmission to IP networks, including the market switchover to IP cameras. This focused attention is not a surprise; after all, we could say IP-based video has been the most over-anticipated, yet highly difficult transition that the security industry has been waiting for. Video is certainly an important technology migration, but it represents only one aspect of recognizing the full value of security system convergence.

While cameras may use standard methods to connect to a video management system (VMS), they are often utilized to simply pass video to that central location. The cameras themselves, each a platform performing the discrete service of generating frames of video, are not aware of each other, and typically require the VMS to bridge any communications. This, in turn, makes applications such as automated two-camera PTZ operation, camera stitching and camera handoff cumbersome and susceptible to re-inventions from one implementation to the next.

We need to stop thinking of convergence as adding one technology, such as video or access control, to a widely accepted network infrastructure. Instead, we need to look at convergence as how we optimally and generically make all those technologies available to each other and to the end user. This is where the concept of a Surveillance SOA comes in. A Surveillance SOA extends communication by and between each individual service on the network. Rather than relying on centralized applications like a VMS or physical security information management (PSIM) to handle multiple open application programming interfaces (APIs) of cameras, analytics software and access control systems, we can look to those systems themselves as more optimized service brokers for the end customer, who can then build their own applications to bridge security and non-security web services to accomplish new tasks.

  

What Is A SOA?

Somewhat of a misnomer, SOA is not just concerned with high-level architecture. SOA derives from a software engineering concept where applications and solutions are built from a set of interoperable components that speak together via a set of well-understood standards and enable many-to-many interactions among services. SOA also reflects a software development methodology to make all software operations on the network self-running services that can be published, discovered and used in a standard way. To that end, SOA extends beyond technology to include the policies and practices to deliver a framework by which the right services are readily available.

  

Role of Standards

Security interoperability standards is an obvious and often-discussed requirement for the security industry to move further down the path of convergence. Interestingly, the two most recognized standards movements, ONVIF and PSIA, are both taking a service-oriented mindset in the creation of their respective specifications and frameworks; ONVIF is adopting a Simple Object Access Protocol (SOAP) for the creation of security system web services, and PSIA is implementing a Representational State Transfer (REST) framework for services to exchange HTTP requests over an IP network. We should remind ourselves that there is more than just a “standards war” going on with competing specifications about how to transfer video and common message formats. Both these organizations are making significantly important strides towards creating a foundation for a service-oriented architecture for our industry, and thus enabling a simple way for each resource in a security system to rely on one another to request and respond to specific functions.

 

Adopting A Surveillance SOA

A Surveillance SOA, one that delivers a managed interface through which all devices, platforms or applications on a network can exist and communicate as compatible services, benefits our security industry. By lowering implementation costs, a Surveillance SOA enables more direct service-to-service communications and realizes the advantages of more open interaction with non-security applications. Specifically, we can look at the benefits as follows:

Interconnectivity: This represents the notion that standard components of a surveillance system, once registered, will automatically understand how to communicate and share data through published guidelines. This also implies a sense of “pluggability,” where the same system or function from different vendors could be interchanged in any system design while keeping the underlying service communication the same.

“Many-To-Many”: Each service on a network can be called upon to function by multiple other services, applications, or endpoints. This removes point-to-point integrations between system components (e.g., an alarm panel with access control, or an IP camera with a VMS). Additionally, it enables the individual components, each hosting one or more services, to invoke and broker functions on their own rather than relying on central proprietary policies managed by VMS or PSIM applications.

More Open Access: A solution to enable better remote access to video assets has been found in cloud-based services. However, a cloud-based approach to stream video may be no more than forcing the same video surveillance paradigm through remote servers. The success of such an operation hinges upon how easily it enables any person, from any device, at any time to access the visual insight they need to accomplish a task. A Surveillance SOA approach could enable a more flexible, lightweight manner to validate user credentials and establish a generic connection for any device and/or application in the hands of the user. A service-oriented approach would enable, say, a marketing professional to formulate a simple request and receive detailed, comprehensive feedback. 

Better Interaction Among Video-Related Applications: Retail and casinos present numerous case studies for aggregating surveillance data with a variety of business systems to deliver high value solutions to monitor and continuously improve daily operations. The collaboration between video cameras, simple video analytics, point-of-sale (POS) systems, and loss prevention systems to deliver a common solution to employee theft at the POS is hampered by numerous point-to-point integrations between these systems. The emergence of a Surveillance SOA would make each of these systems nothing more than a shared service on a network, each with published function calls and data output formats. All the data exists for a retailer to better understand their business, and the ability to deliver immediate, real-time insights and understanding is facilitated by the services approach.

New Opportunities for Applications: Companies all over the world are looking for ways to leverage their heavy investment into video surveillance and its underlying network infrastructure across multiple business units. In other words, how can an enterprise of any size leverage a video surveillance system for more than just surveillance? There’s strong value in internally sharing assets such as visualizations available from security systems across the enterprise. Retailers can fine-tune merchandising efforts by having access to visualizations that show traffic over time in response to display positioning or product shifts within the store, and compare that resulting traffic data with transaction data from the POS to measure effectiveness. Casinos have the opportunity to continuously monitor congestion around restaurants – and even share that with its customers – to effectively distribute traffic, reduce wait times, and make for an overall better experience for its patrons. The ability to continuously monitor and share these visual insights requires a surveillance system that is set up to serve imagery and data visualizations in real-time to any authorized consumer, whether it be an internal staffing system, a digital signage system, or a mobile phone in the hands of an “on-the-floor” employee – or even a customer. 

Convergence really implies that the physical security and IT worlds stand equally ready to integrate and interact. Despite the progress of industry standards and development of more service-oriented interfaces, we are not quite there yet. What we are looking for is our collective world of physical security to drive the ‘emergence’ of approaches and architectures that will enable converged applications for businesses to see and understand their operation beyond the context of security, and easily share those findings along with the underlying video and data across the enterprise.

Conceivably, video will be a significant component to realize the full rewards of security system convergence – it’s just that the technology needed to deliver this convergence is still being implemented. In the meanwhile, it’s time now to plan for the future by focusing on standards, interconnectivity and modularity to deliver service-oriented frameworks for security and surveillance. 

Subscribe to Security Magazine

Sec1111-cloud-inbody-150px

Bob Cutting is the vice president of product management at Prism Skylabs, a San Francisco technology company that brings physical spaces online. He was formerly the vice president of product management at ObjectVideo.

Related Articles

Why Reputational Risk is a Security Risk and What to Do About It

How to Make Informed Risk Management Decisions about What to Store in the Cloud

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing