Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

10 Factors for Choosing a New VMS Solution

By Ken LaMarca
Surveillance, video wall
September 10, 2016

Video surveillance technology is a very powerful tool that can not only help prevent criminal activity and catch criminals, but it can also be used as a very effective management tool to document and track the actions of employees, including adherence to company policies, improving customer service, identifying the best retail merchandising plans, managing vehicular traffic, and much, much more.

As a result, surveillance and security system designers spend considerable time and effort determining the best possible cameras to use to provide maximum video coverage and analytics data for the variety of applications installed at customer locations. Managing this potentially vast amount of data is the key function of a Video Management System (VMS).

VMS effectiveness is measured in many ways and performance is dictated by several factors. VMS systems can succeed or fail in their ability to support specific applications. Moreover, as surveillance systems age, they often become more complex than when they were initially installed, as the technology associated with them continues to move at a rapid pace, irrespective of whether or not the VMS keeps up. Cameras may be upgraded, new requirements such as License Plate Recognition, Access Control, advanced analytics and others may come into play, further complicating the VMS solution. Choosing the right VMS provider capable of addressing these and other potential requirements and challenges is a complex – but critically important – step. Choosing the right VMS solution helps to ensure that the implemented system will continue to be efficient and effective now and into the future, and that it will deliver the video and data you need when you need it most. Sustained and continued VMS relevancy is paramount.

There are a number of important criteria to consider during the VMS selection process. Below is a checklist of criteria to help you choose the best VMS solution to support both your immediate and longer-term security and operational objectives.

Competitive Licensing: By nature, all software must be registered and licensed, which also holds true for VMS software. One important factor for consideration is whether a solution allows you to mix and match licenses to maximize the system’s effectiveness and keep costs under control. Additionally, look for solutions that offer full backward compatibility and the ability to add licenses as fast, easy and cost-effectively as possible to allow for system expansion or alterations as your organization’s needs change. Also, it is important to note that some VMS providers have very complicated Software Upgrade Plans (SUP) that tie post sale support, bug fixes and patches to it. Consider a VMS that offers a simple and low restriction SUP plan.

Hardware Efficiencies and Scalability: Hardware costs can significantly inflate the overall price tag of any security installation, which poses problems if you’re dealing with an established budget. Look for a VMS solution that allows more cameras to be connected to each server, provides for the use of low cost SATA hard drives and allows for direct network attached storage (NAS) recording that can reside remotely, anywhere on the network. All of these add up to lower overall hardware costs for any size installation.

Ease of Installation: In addition to hardware, another big contributor to up-front system expenditures is the cost of installation. The more labor-intensive the installation, the more time it requires, and the more it will cost. To reduce these expenses and make a system more cost-effective, choose a VMS that does not require time-consuming and labor-intensive manual configuration. Look for VMS solutions that don’t require MAC addressing, do not require cameras to be mapped to hard drives, and that include a fast and easy way to use camera locating tools. Shortening installation time is a big cost saver!

Network and Video Security: Users should choose a VMS that takes network and video security as seriously as they do. Pick a VMS that supports full encryption between clients and server and supports HTTPS between the cameras and servers. This will assure end-to-end encryption of all data. Additionally, look for a VMS that randomizes the recorded video database, so that recorded information cannot be manipulated and reinserted by anyone, including IT personnel.

Smart Camera Drivers: Chose a VMS that provides the technology necessary to immediately use newly introduced cameras from most major manufacturers without having to wait for individual camera drivers to be written. This allows for quicker deployments of new camera features and benefits to further enhance the VMS solution.

Remote Troubleshooting: Like installation, maintenance costs can vary depending on the amount of time required for a technician to address an issue. Many problems that arise with software can be quickly and easily fixed by someone who understands the solution well. Often there is a minimum charge associated with on-site maintenance, so if a technician has to be physically be on the premises to address a problem, even the simplest fix can be expensive. Thankfully, advanced VMS solutions offer the ability for technicians to remotely access systems to diagnose or even fix an issue without the need to visit your site. Should the problem be significant enough to require a site visit, a technician can be dispatched to a location knowing exactly what is wrong and how to fix it before they arrive.

Automatic Updates and Upgrades: Software providers continuously develop and deliver updates, upgrades and patches to ensure the stability, performance and security of their solution. The same holds true for VMS solutions. Integrators are often responsible for making sure software updates are installed, but the cost of performing site visits can be substantial, especially if you have recording servers in multiple locations that need to be updated individually. Look for a VMS that includes capabilities that enable automatic patching and updating of software, including camera drivers that later eliminate the need for costly server-by-server updating.

Free Technical Support: A VMS provider should offer free technical support through multiple channels, including phone, web and apps. In addition, technical support should be available to all customers, without the purchase of a care package or service agreement.

Enterprise Level Integration: Increasingly, VMS solutions are functioning as a main platform for integrated security systems, connecting and collecting data from video, access control, time and attendance and other security and non-security systems. Open architecture is the foundation for integrated systems allowing event fusion, combining video data from other alarm generating systems to generate meaningful alerts that heighten security and deliver added value, including the ability to dramatically minimize false alarms, improve the value and effectiveness of an operator and improve compliance and other operational functions.

Ability to Evolve: The security landscape is constantly changing with new products and technologies continually coming to market, including HD and UHD cameras, advanced video analytics and networked access control solutions. Users need to select a VMS provider that offers the flexibility and agility to quickly and easily accommodate new solutions. This helps ensure that users get the most up-to-date solutions possible with greater value.

Careful evaluation of a VMS provider using these simple references will help you to choose the best solution for your specific video application and needs – one that will provide benefits for security and overall operations. While this process may initially be exhaustive, the benefits are well worth the extra up-front effort to ensure you make the best choice when selecting a VMS solution. 

KEYWORDS: video management video surveillance strategy video surveillance system VMS

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ken lamarca
Ken LaMarca, Vice President of Sales, Qognify.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Choosing the Right Video Management Solution

    Choosing the Right Video Management Solution

    See More
  • Red cloud service

    Choosing Your Business’s Best Cloud Solution

    See More
  • k12webinar

    Creating New Benefits for K-12 Schools Through Advanced Surveillance and VMS

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367667887.jpg

    Surveillance, Privacy and Security

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!