Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

How to Make Unreliable Video Reliable

At any given time, 30 percent of an IP video network does not work properly.

By Diane Ritchey
June 1, 2014

You just implemented an expensive IP video surveillance system. And when it goes offline, awareness is down. Important evidence is lost.

That’s exactly what Drexel University in Philadelphia, is trying to avoid. The urban campus has more than 500 security cameras across its 74-acre University Center campus – half IP and half analog with all video being recorded to an IP network. Internal and external cameras secure very large public spaces. In addition, says Domenic Ceccanecchio, M.S., CPP, Vice President for Public Safety, the cameras assist security personnel to conduct virtual video patrols of the campus within the campus security communication center. “The staff there is constantly taking calls, dispatching police or security officers, looking for suspicious activity – looking for anything that might necessitate a public safety response. We have a strong relationship with the Philadelphia police department; they rely on our video and assistance when something happens on or near our footprint. So the case is clearly made that we have a heavy reliance on security video as part of our comprehensive security and safety program.”

Ceccanecchio and Joe Spera, director of operations for Drexel Public Safety, use Viakoo to monitor its video to proactively identify and correct network issues. “It’s a unique product,” Ceccanecchio says. “We were trying to find solutions that address the reliability problems that we were having. Looking at the business case, we can see an immediate return on investment as the product provides for a better, more efficient use of our administration time. In addition, it gives us a better comfort level that our video surveillance system is up and operating properly.” 

“What we don’t want to happen is a security event on campus, we go to the video and the video is not there,” Spera says. “This system will tell us which server or storage or camera is down so that when we do call the technicians, they know right where to go. It limits the amount of time they are spending on maintenance. There are a lot of stakeholders that are relying on us to have accurate and reliable video.”

 

What Causes Video to Fail?

At any given time, 30 percent of an IP video network does not work properly. While physical video applications work with frames, IT networks communicate in packets. There are many components along the video stream path that experience problems and cause video system failure.

IP security video networks consist of cameras from the edges, through complex computing software and networking infrastructure, to the recording hard disks at the core. There are lots of variables that create the intrinsic technical vulnerabilities that lead to missing video and video downtime. In spite of good people and technology, you still have missing video.

As problems go undetected, your costs and risks rise as situational awareness falls.

Simply, video is complicated. And that complexity leads to increased cost and risk when it is not available. There are added expenses to your security program such as service hours, inefficient routine maintenance contracts, monetary damages and the guesswork involved finding the cause. And you face increased risk in terms of regulatory compliance violations, impeded investigations and brand equity damage.

Viakoo detects and alerts customers to anything that threatens, degrades or stops a video stream from the camera across the network to the recording disks; every 20- minutes. It also points to the probable cause and what corrective action should be taken. Viakoo alerts customers to video performance issues that they would otherwise be unaware of. 

Todd C. Vigneault, CPP, Sr. Manager, Enterprise Security Systems, for Symantec Corporation, found this aspect particularly helpful, given that he used the product in conjunction with surveillance in three geographic regions around the globe.

Part of Vigneault’s role is leading a team that not only implements security technology, but ensures that users understand the technologies and leverage them to their fullest capabilities, then supports the solutions throughout their lifecycle to protect Symantec assets.

“I liked how it gives you the capability to show problems on your video network that otherwise you’d have to find through manual efforts,” Vigneault says. He used the product in three Symantec locations – across the globe Latin America, North America and Asia. Two locations were ones where he knew that he had existing video issues.

“With users of IP video, when you have a large network, you have people do manual audits or you have your VMS demonstrate when your video is offline in an alarm format,” Vigneault says. “The first scenario is the one that leaves gap or an exposure of time between audits. That’s what we were experiencing. The Viakoo product allows users to automate processes to close the gaps that exist with manual efforts.”   

KEYWORDS: network monitoring video evidence video surveillance investments

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How Monitored Video Alarms Deliver Insurance Discounts

    See More
  • Adopting Wireless Video to Tackle Covert Surveillance Operations

    See More
  • SEC0419-cover-feat-slide1_900px

    What Salary Does a Security Executive Make?

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing