Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo SurveillanceEnterprise Services

Effective video collaboration: What you need to consider before investing in a system

Jon Litt, Senior Manager, Government Solutions (US) at Christie shares his five key considerations to ensuring an impactful, efficient professional video collaboration solution.

By Jon Litt
video collaboration

Mobile Police Department uses its Joint Operations Center to collect and share information in real-time. Image courtesy of Christie 

February 22, 2021

Having a secure and efficient video collaboration system has evolved from a ‘useful to have’ technology to an indispensable capability in 2020, allowing teams to feel more connected to remote locations and distributed team members. With travel restrictions and social distancing limiting in-person meetings, remote face-to-face video communication is more imperative than ever in security environments. Systems integrators around the globe have been upgrading technologies to support the mission of operators. Before you work with an integrator to either upgrade an existing video collaboration system or invest in a new one, there are a host of considerations. Below are the key ones that will help you with your conversations with the systems integrator.

The Goal

First and foremost, define your expectations of the experience with the system?  Is it enough to just be able to ‘see’ and ‘hear’ someone, or would you rather have a truly engaging communication tool that can bring you closer together and allow for the most effective dialogue with each other?  Who is using the system and where is it being used? What are you using it for? These are all pertinent questions to ask before a system is designed. 

To me, and most of my customers, we want as life-like and natural of an experience as possible. I want them to feel as if they are having a natural conversation as part of an engaging experience, and are not conscious to the technology used to enable that remote conversation.

Display Technology

There are a range of high-performance display solutions that are well suited to video collaboration and control room environments, be it projection systems, flat panel displays or video wall systems.  Each technology has its own set of advantages and disadvantages for specific video collaboration applications.  One is not better than the other in all applications, and a good integrator or partner will be able to provide agnostic advice to suit your environment.

A sampling of the visual factors to consider would include the size of the display, viewer distance to the display, aspect ratio of the display, viewing angles, ambient lighting within the space, coloring of the walls around the display, coloring of the walls behind the participants, effect of windows in the space at given times of the day, and much more.  There are many factors that can have a significant impact on the overall performance of one display over that of another, which go beyond mere technical information on a product datasheet, and the phrase ‘you get what you pay for’ often applies.

Content Management & Processing

There is much more to a system than just the physical display. We need to get the content from a source to the display without compromise. We need to focus on the content, or signal management that is in front of the display and the processing of different sources of different resolutions and/or formats on a single display or multiple displays.

A video extension, video switcher or video processor device delivers the content to the display.  And the quality of the stream of content to the display is vital for the display to look as it should.  A processor that is intuitive and specifically suited to a security, control room or command and control environment, should offer end users a large amount of flexibility.

Sources

It is the content that makes the video collaboration system truly useful and aids in providing the overall experience.  We need content from the sources themselves and without a strong source, the outcome will always be a disappointment.

Network Connectivity

To connect one location to another remote location, or multiple locations, you must have a good network to make this happen. Quality system components, reliable infrastructure with sufficient bandwidth, security considerations and efficient network architecture and management must work hand in hand to deliver the user experience they expect.  Without it, you will suffer from the all-too-common latency issues that many of us have experienced before unfortunately, and it will again pull us out of the immersive, vivid, lifelike experience.

It is now more important than ever to have an effective video collaboration solution in our organizations to conduct business and achieve our missions.

My advice is to think of the system as being only as strong as its weakest link. If you compromise on any one aspect along the signal path (be that display, processor, source), it will significantly degrade the impact of the entire system, pulling the user away from the illusion that they are in the room together. Manufacturers producing an end-to-end range of display and processing products know that they can maintain the quality throughout the signal path, sending the highest quality signal to the display and delivering an immersive, effective video collaboration solution.

 

KEYWORDS: remote location security security integrators security technology video surveilllance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

J litt formal web color 002

Jon Litt is Senior Manager of Government Solutions (US) at Christie.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cannabis

    From Seed-to-Sale: What Cannabis Operators Need to Know Before They Grow

    See More
  • Florida PD to use real-time video surveillance

    Ocoee Police Department investing in real-time video system to view and rewind live surveillance

    See More
  • mobile

    Mobile Credentials: Why Should You Adopt Them and What You Need to Know

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • effective.jpg

    Effective Physical Security, 5th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing