Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Making the Best System from Best of Breed Technology

By John Grabowski
video
October 28, 2014

The integration of formerly disparate technologies surely represents a change in the landscape for enterprise level systems design and deployment. The truth is that no one manufacturer offers the best of everything – from video surveillance technology to laptops to clock radios. This is a true integration challenge in designing video surveillance systems where skilled systems integrators can select the best solutions available to deliver customized solutions based on each specific customer’s needs.

In some instances, much of the product can be sourced from a single manufacturer but efficiencies gained may be compromised by fewer features or functionality. Additionally, items in the technology portfolio from single source vendors may have been acquired through mergers and acquisitions rather than being developed in-house.

By selecting a best of breed solution where every component is purpose engineered, integrators can more easily contrast and compare products to make the best selection. To further up the ante, selections can also be made based on those manufacturers who have stayed focused on core technologies. For example, video surveillance cameras have evolved into highly sophisticated devices that deliver the ideal balance of image quality, intelligent features, reliability and cost efficiency. End users and integrators alike depend on these characteristics, and when weighed against single vendor solutions, the best of breed camera will often win out.

Further examination shows why these four qualities are so important to video surveillance in applications such as medical facilities or educational campuses.

Image Quality– Observation and identification are crucial in video surveillance applications, making image quality a key factor in the solution. With this in mind, it is always an intelligent decision to consider the core competencies of the provider and make a choice for video surveillance systems with technology that’s born from broadcast. When the earliest security video providers leveraged their core strengths to build surveillance cameras, they contributed a vital element to the foundation of the security industry using proven imaging technologies from their broadcast and professional video product lineup. Their cameras offered smoother pan and tilt motion, sharper auto focus and other qualities that had previously been found more often in broadcast cameras than surveillance cameras. As a result of this genealogy, today’s video surveillance camera technology provides higher resolution, fast frame rates and color fidelity all under varying lighting conditions to ensure exceptional video quality at all times.

Intelligent Features– In some cases, features may be the icing on the cake but their true value is evident when linked to operational benefits. Features such as true day/night, on-board optical and digital zoom, audio communication, motion detection, backlight compensation and on-board SD recording have all helped to provide better security while reducing costs. For example, new cameras can deliver color images from low light situations without the need for illuminators or extra lighting. Not only does the color provide detail for identification purposes, but they can now be deployed in areas with variable lighting conditions – in some cases even in virtual darkness.Cameras with embedded video analytics can analyze images at the point of capture and eliminate the need to send all video data to a central server for analysis which minimizes bandwidth and recording requirements while reducing overall costs. Cameras coupled with external pan/tilt mechanisms have all but been made obsolete by all-in-one pan-tilt-zoom cameras are available in a wide selection of unitized, environmental and/or vandal resistant models.  

Reliability – Today’s video surveillance components use highly advanced technology, making the evaluation process even more difficult. While impartial testing of video surveillance equipment on oscilloscopes and wave form monitors, shoot-outs or other side-by-side comparisons can help bring clarity to the evaluations, another way to judge reliability is through MTBF (mean time before failure) figures or failure rate (FR) data. These figures can help provide a clear guide for product lifetime expectations. Although most companies tend to build products to specific price points, the best companies engineer their video surveillance products with conservative designs that will last longer and address the specific needs and conditions of the surveillance market.

Cost Efficiency –Tight or decreasing budgets have forced end users to look closely at the TCO (total cost of ownership) and ROI (return on investment) when making security system purchases. To meet these criteria, solutions must have forward value (i.e. scalable) and be free from any type of lock-in. For instance, legacy and new security technology can work together effectively when products are best-of-breed and designed for backward compatibility. Hybrid solutions further help preserve existing investments in infrastructure by deferring or eliminating the need to rip and replace systems that are still useful and functional. While industry standards help to minimize integration challenges, it is important to choose a provider who engineers products for integration, and to work with an integrator who has a fundamental understanding of IP-based systems.

Well-designed video surveillance systems bring peace of mind through added safety and security, and can be more readily achieved by adhering to choices that reflect quality, intelligent features, reliability and cost considerations.

KEYWORDS: integrated surveillance security system integration security technology security video

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Grabowski, National Sales and Marketing Manager, JVC Security Division

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Doorway

    The Best of Three

    See More
  • The Corner Office - july 2018

    The Best Technology Ever Created

    See More
  • executive

    Defense is Your Best Offense: Understanding the Fundamentals of Risk-Based Security

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing