Key IT Concerns for Security Deployments

By: John Honovich, Published on Dec 14, 2009

A US integrator has published a list and explanation of key IT concerns [link no longer available] to consider when deploying security systems. While we think many of them make good sense, a few of them may be 'over-kill' or inapplicable to common security systems.

The key points on his list include:

  • Database Selection and Management
  • Bandwidth and Switch Utilization
  • Redundancy and Backup
  • Integration
  • Ports and Security
  • Compliance with Legal Requirements
The main two points we question are (A) database and (B) Redundancy/backup.
 
For most video surveillance systems, IT should not select or attempt to use 'common' RDMS systems set up for general IT applications. This is simply because the upside is minimal and the cost of integrating and maintaining this can be significant. It is generally 'good enough' to allow the RDMS be embedded into the VMS and transparent to all involved.
 
The integrator is critical of integrator's approach to redundancy/backup: "Most physical security people don’t think much about backup or redundancy – they just assume that things will work until they don’t." While many people may assume this, the relative low importance of redundancy/backup also reflects a historical price premium that video surveillance systems could not justify. As few as 5 years ago, a DVR with RAID was almost double the cost of a DVR without RAID, making storage redundancy a pricey option that few could afford. This is compounded in the reality that per bit, video surveillance data is much less valuable than financial or customer records.
 
One area, not mentioned, that we do believe is under-utilized is power backup and line-conditioning. While incurring modest up-front cost increases, minimizing power failures and voltage swings can extend the average life of surveillance equipment.
Comments : Members only. Login. or Join.

Related Reports

Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Top Problems For Integrator Project Management on Feb 13, 2018
Security projects routinely encounter issues that jeopardize deadlines, create confusion, and shrink profits. Unfortunately, there are common...
Top Video Surveillance Service Call Problems (Statistics) on Feb 28, 2018
In our most recent statistics series, over 150 integrators told IPVM the most common problem their customers have with their video systems....
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
Video Analytics 101 on Mar 16, 2020
This guide teaches the fundamentals of video surveillance analytics. Inside we cover: Why Use Video Analytics Video Analytics Warning Where...
Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
HID Product Configurator Examined on Nov 26, 2018
HID is widely used. However, figuring out all the different configurations of features for a final credential or reader part number can be a real...
Door Position Switches (DPS) For Access Control Tutorial on Mar 05, 2018
Door position switches do not get enough respect. They solve a major problem of access control systems yet are frequently ignored or...

Most Recent Industry Reports

Avigilon ACC Cloud Tested on Jul 08, 2020
Avigilon merged Blue and ACC, adding VSaaS features to its on-premise VMS, offering remote video and health monitoring that was previously limited...
The US Fight Over Facial Recognition Explained on Jul 08, 2020
The controversy around facial recognition has grown significantly in 2020, with Congress members and activists speaking out against it while video...
Sperry West / Alibaba Tablet Temperature Measurement Tested on Jul 07, 2020
In April, we ordered a ~$500 temperature tablet from Alibaba. We set it to the side while doing 18 other temperature screening tests but, after...
Facial Recognition: Weak Sales, Anti Regulation, No Favorite, Says Security Integrators on Jul 07, 2020
While facial recognition has gained greater prominence, a new IPVM study of security systems integrators shows weak sales, opposition to...
Video Surveillance 101 Book Released on Jul 07, 2020
IPVM's unique introduction to video surveillance series is now available as a 145-page eBook. Designed for managers, salespeople, and engineers new...
Startup Duranc Presents AI VSaaS on Jul 06, 2020
Duranc presented its system at the May 2020 IPVM Startups show. A 30-minute video from Duranc including IPVM Q&A Background on the...
Low Voltage Nation Wants to "Help You Carve Out A Fulfilling Career" Interviewed on Jul 06, 2020
It is difficult to make your way in this industry as there is little formal schooling. However, one person, Blake Urmos, the Founder of Low Voltage...
The Next Hot Fever Detection Trend - $100 Wall-Mounted Units on Jul 06, 2020
The first wave of the booming fever detecting market was $10,000+ cameras, now interest for ~$2,000 tablets is high and the next big thing may be...
Cisco Meraki Unlocks IP Cameras With RTSP Tested on Jul 06, 2020
Meraki opened up its cameras to 3rd party NVRs/VMSes by offering RTSP streaming because of "the need to solve a business problem". We tested...