Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Business Case for Image Quality

By Keven Marier
November 1, 2011

The security industry has adopted some bad habits from the IT industry. These habits are most noticeable in systems that can be described as “over built” and “under delivered.”  The trend of building overly complex systems creates challenges for systems integrators, and is a huge strain on end user’s security budget. This problem exists due to a lack of knowledge and experience with the complex surveillance technologies used in today’s networked video world. The following illustrates the most common over/under design issues in surveillance systems, which continue to get worse.

 

Over Pixelated, Under Displayed

One of the biggest problems with most system designs today is a camera and display resolution mismatch. These design flaws waste system processing, networking and budgetary resources. Camera resolutionshave always followed the display standards: VGA, D1, 4CIF, and HD, which are standards that describe both a camera and display resolution. With analog video it is easy to match four CIF resolution cameras into a 4CIF display. With  HD and megapixel cameras and multiple image aspect ratios (4:3, 16:9, 9:16), cameras are generating larger images with more pixels than the video display technologies can display without discarding pixels.

Demand for HD and megapixel cameras continues to increase these problems. One major benefit of megapixel cameras has been to increase the pixels per foot calculation used to quantify image quality. A second benefit is the ability to digitally zoom into the image while retaining identifying detail. However, the realities are that megapixel resolutions are being displayed in 16+plus camera views on monitors running less than 1920x1080 resolution, which is 2.1 million pixels. So the resulting situation is 16, 2.1 megapixel HD cameras, (which combined, equals 33.6 megapixels of resolution) on a single display that will discard (33.6 Mp minus 2.1 Mp) 31.5 million (94 percent) pixels of camera resolution. However, the network will still have to carry the traffic, and the workstation will have to decode and process all 33.6 million pixels of data, only to have the display throw it away. This creates a display environment that cannot use the high-resolution camera capabilities without digitally zooming. So in a live view it makes no sense to use high-resolution cameras. A better option is to dual stream a much lower live view resolution, with a megapixel resolution recorded where the digital zoom feature can be used for investigation.

 

Over Complex, Under Serviced

Another common issue is with overly complicated network design used by the physical security systems integrators who lack expertise with advanced networking technologies. It has become a common practice to design systems that use multicast network designs for live video streams because of the theoretical bandwidth limitations that may exist within a segment of the network. Most systems integrators and IT departments can’t actually service, troubleshoot or support multicast networks because they don’t have the necessary competency.  When networks are over complicated they require more service and expertise. Further complicating the problem is the practice of sharing the networking hardware between a customer’s IT department and the security integrators without sharing administration software access to the networking hardware. This makes it impossible for systems integrators to troubleshoot without the IT department, which leads to extended service outages and insecure buildings.

 

Over Priced, Under Used

Storage and server systems being specified today for surveillance systems are often heavily over priced and under utilized because they were designed for IT data centers and not surveillance systems. The results are security departments that over invest in server and storage technologies that don’t improve the security of the organization, and take budget away from more cameras and better video management software. Many hardware manufacturers who make storage systems are not providing accurate design and engineering requirements, which confuses the industry. The simple fact is that you can add more storage and servers any time after the initial design with little to no disruption to the production surveillance environment.

 

The Over/Under Lessons

If the industry continues over building and under delivering surveillance systems, the overall market growth will slow down until design competency of consultants, A&E’s, systems integrators and IT departments can catch up. This will only happen when common, standards based design fundamentals are created and adopted by the industry. 

KEYWORDS: design of surveillance systems high-resolution camera network design security information storage

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The “16x Growth” Business of Ultra High-Definition Surveillance

    See More
  • The H.264 Bit Rate “Balancing Act”

    See More
  • Platforms for the Future

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing