Designing Security Monitoring Stations

Author: John Grocke, Published on Apr 19, 2012

Our Security Monitoring Station Guide is an introduction to selecting the right surveillance monitoring console furniture. In it, a number of people commented on challenges in using design software to lay out furniture.

In this note, we delve deeper into surveillance furniture design using downloadable design software provided by vendors in this space, including Middle Atlantic’s “Designer” and Winsted’s “WELS”.

The short intro video below overviews our approach:

Both Middle Atlantic’s and Winsted’s console furniture design software will allow the consultant or integrator to:

  • Layout a custom console in a 3-dimensional environment and include accessories such as monitor mounts, internal racks and shelving, lighting and chairs.
  • Export the layout as a *.jpg image or export it for use with CAD software in an AutoCAD *.dxf format.
  • Prepare a complete bill of materials with MSRP pricing.
  • Produce a CSI specification for the console furniture.

Inside, we provide two video screencast tutorials on how to best use these applications.

*** ******** ********** ******* ***** ** ** ************ ** ********* *** ***** ************ ********** ******* furniture. ** **, * ****** ** ****** ********* ** ********** in ***** ****** ******** ** *** *** *********.

** **** ****, ** ***** ****** **** ************ ********* ****** using ************ ****** ******** ******** ** ******* ** **** *****, including ****** ********’* “********”**********’* “****”.

*** ***** ***** ***** ***** ********* *** ********:

**** ****** ********’* *** *******’* ******* ********* ****** ******** **** allow *** ********** ** ********** **:

  • ****** * ****** ******* ** * *-*********** *********** *** ******* accessories **** ** ******* ******, ******** ***** *** ********, ******** and ******.
  • ****** *** ****** ** * *.*** ***** ** ****** ** for *** **** *** ******** ** ** ******* *.*** ******.
  • ******* * ******** **** ** ********* **** **** *******.
  • ******* * *** ************* *** *** ******* *********.

******, ** ******* *** ***** ********** ********* ** *** ** best *** ***** ************.

[***************]

Middle ******** “********”

*** ***** ***** ******* *** ** ****** ********'* ******** ***********:

****:

  • **** ** ********** ***** *** ** *********** ** *** ****.
  • *** ***, **** ** ****** ***** ******.
  • ********* **** **** ***** ***** **** *** ** ********* ** the *********** **** ** *** *******, ** **** ** **** beforehand **** ***** ****” *******.
  • ******* ** *** *****, *****, ***** ******* *** ***** ****** items *** * ******** ******** ****.
  • ******** ***** *** ************ ********* ** ***** *******.

****

  • ******* ******* *********, **** **** **” & **” ******* ******** and *** *****.
  • ** *** *** ****-******** ********* *****, *** **** ** *** a ******** “*********” ****** ******** *******.

Winsted “****”

**** ***** ******* ******** **** ***********:

****:

  • **** ***** ** ******* ********* ****** *********.
  • ******* ******* ** *********** *** ******* ******.
  • **** ******** *** ** **** ** *** *** **” ****-******** equipment *****
  • *** *********** ******** ****** ** ********** ********* **** ** ***’* and ********.
  • ******* ******* ********* ** ***** *******. *** *** ******** * design ******* ** **** *** **** *** **** ****** ** as ******, ****** **** ******** **** *******.

****

  • *********, *******, ******** *** ****** ********* ******** *** *********** *** as ****-********.
  • ******** ******** ** **** ********* ** ***** ***** **** **** together.
  • ******** *** ** ***** ** ********.

**********

**** ***** **** ************ ****** *****, **** ******** *** * little ********, * ********** ** ********** *** ************** *** *** a ************ *********, ****** *** ****** ** ** ***** ** import ** **** * *** ******, ********* *** **** ** estimate * ******, *** ******* *** ******* ************** ** **** their ******** ********’* ************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Imperial Capital Security Investor Conference Review on Dec 08, 2017
Investment bank Imperial Capital holds an annual Security Investor Conference where 60+ companies present, including this year: IPVM bought a...
'Catastrophic Problem' For Videofied App on Dec 06, 2017
Less than 2 months after closing their DIY division DragonFly, Videofied has been hit with a problem the company calls 'catastrophic'. Now the...
Favorite Surveillance Monitors Statistics on Nov 29, 2017
What monitors are most commonly used for video surveillance? Are they more typically consumer or professional? Are there specific brands that...
Nest Secure Alarm System Tested on Nov 16, 2017
Google's expansion continues, this time into home security with their Nest subsidiary's move into alarm systems. They paid more than a...
Milestone XProtect Essential+ Free VMS Tested on Nov 09, 2017
Milestone continues to expand its aggressive free and low-cost offerings, with this year, Milestone releasing XProtect Essential+, part of their...
Honeywell Indiegogo-Funded DIY Intrusion System Examined on Nov 02, 2017
Honeywell did $39 Billion dollars in revenue last year, but they are asking the public for $50,000 (.0001% of revenue) to fund their Indiegogo...
Search More Important Than Live Monitoring - Statistics on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.  The key themes found in integrator...
Exacq M Series Low Cost NVR Tested on Oct 12, 2017
With recent cyber security issues hitting NVRs and cameras from low cost leaders Dahua and Hikvision, users are increasingly seeking alternatives...
Surveillance Systems Remote Access Usage Statistics on Oct 11, 2017
Remote access is a major benefit and risk for video surveillance. It is a benefit because it allows users to manage security or review...
Honeywell Discontinuing DragonFly on Oct 05, 2017
DIY is a big trend in the intrusion market and threat to incumbents. However, Honeywell is discontinuing their DragonFly DIY video-verified...

Most Recent Industry Reports

Imperial Capital Security Investor Conference Review on Dec 08, 2017
Investment bank Imperial Capital holds an annual Security Investor Conference where 60+ companies present, including this year: IPVM bought a...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...
Hikvision NA Biggest Sale of 2017 on Dec 07, 2017
Hikvision North America has been relatively disciplined the past 5 months, reducing the number of sales and the breadth of what is on sale. No...
Security Integrator IT Expertise Statistics on Dec 07, 2017
20 years ago, putting physical security systems on IP networks was just emerging. Today, almost every system is networked in some way, IP cameras...
Lighthouse Deep Learning Camera Tested on Dec 07, 2017
A Silicon Valley startup, Lighthouse, with a Stanford PhD CTO, has released a deep learning AI camera with 3D sensors for just $300. The company...
Access Control Course Winter 2018 on Dec 07, 2017
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
'Catastrophic Problem' For Videofied App on Dec 06, 2017
Less than 2 months after closing their DIY division DragonFly, Videofied has been hit with a problem the company calls 'catastrophic'. Now the...
ASIS Dumps 'ASIS' For Show on Dec 06, 2017
After 60+ years, ASIS is dumping its eponymous show name and replacing it with 'GSX'. This is a classic marketing mistake. For a show struggling...
Risks Of Managing End User Passwords (Statistics) on Dec 05, 2017
Integrators know admin passwords for nearly all end-user systems, according to IPVM statistics. But how do they manage them? How do they ensure...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact