Where to Install Headend Equipment

Author: Ethan Ace, Published on Mar 14, 2012

Installing surveillance headend equipment in the wrong location can lead to increased failure rates or tampering. Often little thought is given to this decision, since security systems are frequently considered only after a facility is designed and built. In this update, we will look at the three most common locations where equipment is mounted and the advantages and disadvantages or each. Finally, we give our recommendations on how to best protect equipment that must be located "anywhere it fits".

Arbitrary Placement

****** *** **** ****** ******** *** ********* ** ***** ************ is "******** *****'* ****". **** ***** ******* ** ******** ********* on ** ***** * ****, ** *** ** ******** ** other *********, ** ** * **** *****. ** ********* *** trusted, *** *** ******** ** *** ** **** ** *** public, **** ** ***** *** * *******. *******, ** *** lead ** ********** ************* ** *** ********** *********:

  • ********: **** *****, **** ****** ********* ** *********** ******, ** ******** measures *** ***** ** ******* ****** ** **. **** ***** it ****** *** ******** ** ** ******* *** *** ******* disabled. ** ********* ** ******* ** * ****** ******* ********, criminals *** ****** ****** ** ******* *** ********, *********** ******** of ***** ***** ** *** *******.
  • ***********: ***** ********* *** ****** ****** **** ************* ** ************* ********. This ***** ********** ** **** *** ****** ******** ********* ****, or ******** ************ ***** ***** *********** ********* ****** *** ******** periods ** ****. ** ** ********* ***** **** ***** ******* **********, ***** *** *** **** ****** ******* *** **** ***** failure, ********** *** *********** **** ******** ***** **** ** *********** when ******.
  • ******: ******* *** ********* ** ** *** ** *** *** ******** may ******** ****** ** ** **** ** ** ******. **** may ** * *******, *** *******, ** *** ******** **** be ******** ******** ** ******** *****. ********** *** ******** ** a ******* *** ***** ****** ****** ******** ********** **** *******, at ***** ********, *** ********* ** ***** ********* ** ****** for *********, *** **** "*** ** *****, *** ** ****" philosophy *** **** ** *** ****** ******* **** *********. 

With ********** *********

** **** *******, ***** ****** ** ***** ********* ** ********* monitoring *********, ** * ******* ********** ******* ******. ***** ******** are ***** **** **** **** ***** *****-**. **** ********* **** not ****** **** *** **** ******** ** ************* ****** ** arbitrary *********, ** *** ******** ** ********* ******, *** ******* much ** *** ***, ** **/*. ******** ********* ** ********* does **** *** *** ******:

  • ***********: ***** ********** ********* *** **** **** **** *****, ** is *** ******** ** **** * ****'* ***** ** ********* installed ** **. *****, ** ** *** ******** ********** ** handle **** **** *****.
  • *****: *** ***** **** ********* *** ****** * ******** ** monitoring *****. *** *******, ***** ********* *** ***** ***-**-**** ****** load, *** ** ********** ****.

** ****** ** ***** *** ****** *** ****** ** *** monitoring ********, ********* ****** ** ***** ** * ******** ******* rack, ***** ******** ****** ******* **********, *** ******* ***** ****** near *****.

IT *****

** ********** ***** ***** ** *********, ****** ** ******** *****, or ***, ********* ****** ** **** *******. ******* ********* ** dedicated ****** ********** ****** ** ******, ************* *******, *****, *** security, ** ** *** **** *****, ***** ***** ****** ** manage, ***** *** ***** ** *** **** *** ***** ********.

** ****** ****** **** ******* ** *********, ****** ** ******** access ** ******** ********* *** *****. ***** ** ********** * dedicated ******* ******* *** *** *********, ***** ** ****** **** can ** ****.******* ********** ********* *********, ***** *** ******* ****** ** *********** *** ***** switches ** **** *****, *** ****** ** ***** ***** *** patch ****** *** ** ********** ** ********** *******.

***************

********* ********, ********* ****** ** ****-******* ******** ********, ** ********* IT *****. ******* ****, ** * ********** ******* ******, ******** placing ********* *****. **-*** ********* ****** ** ********** ** * last ******, **** ** ** ***** ***** *** ** ****.

** ********* ********** **** ** ****** ***********, *** ************** *** contribute ******* ** *** ******'* *********:

  • **********: ** ******* ******** *** ***** **** ********** **** **** and ******, ********* ** ******* ********* ****** ** ********* ** some **** ** *********. ********* *** ***** ****-***** ******** *** available *** ** ****** ** $** ******, *** *** ******* ****** ** ************ *******.
  • ******* ******: ** ********* **** ** ******** ******** ** ******* and ****** *****, ** ****** ** ******* ** * ******* height ** ** **** **** ************* **". **** ** *** system ** *******-*********, *** ***** ********** *** ** ********* ********, this ****** ** * **** ****, ** **** ********* *** routine *********** ******.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Alarm.com Tested on Jul 13, 2017
Alarm.com has become the dominant force in smart home / remote service platform, with ~70% market share, combining their own traditional offering...
Genetec Mission Control Tested on Jul 13, 2017
Genetec continues to move up market with their Mission Control, "Decision Support System", bringing PSIM-like procedures and incident management to...
Convergint Total Recall CrimeEye Product Profile on Jul 11, 2017
Deploying video surveillance in metropolitan areas often brings challenges, including lack of infrastructure or excessive costs to extend...
Batteries For Alarm Systems Tutorial on Jul 11, 2017
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
Smoke Detectors Guide on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
H.265 / HEVC Codec Tutorial 2017 on Jun 30, 2017
For years, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
ESX 2017 Final Show Report on Jun 16, 2017
The ESX (Electronic Security Expo) day 3 / Thursday is done and the exhibits are over. IPVM was in Nashville covering it in-depth. Below covers...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
Security Yard Signs and Stickers Guide on Jun 05, 2017
Many security integrators use signs or stickers with their company name and logo. Posting these in front the homes of residential customers...

Most Recent Industry Reports

Competing Against ADT on Jul 20, 2017
ADT is one of the biggest players in the security industry, with ~$4 billion revenue. In 2017, they were acquired / merged with Protection...
Hikvision Launching Deep Learning Recorders on Jul 20, 2017
Hikvision has become a common choice for super low cost NVRs. Now, Hikvision is aiming to move up market, with deep learning NVRs that claim far...
PR Campaign Exploiting Manufacturer Cybersecurity on Jul 20, 2017
Manufacturers increasingly have a bulls-eye on their back. As cyber security solutions providers grow, they realize a great way to get publicity...
Axis Door Station Tested (A8105-E) on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations. We bought and tested...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It covers our 20 manufacturer favorability rankings and 20 manufacturer...
$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Knightscope Laughs off Robot Drowning on Jul 18, 2017
A day after a Knightscope robot drowned, Knightscope has issued an 'official statement' making fun of the issue: The implied message is that...
Microsoft Video AI Cloud Services Examined on Jul 18, 2017
Microsoft has released one of the most amazing video analytics marketing videos ever. In it, they detect oil spills, track individual people giving...
Hikvision USA Head of Cybersecurity Exits on Jul 18, 2017
Hikvision USA's Head of Cybersecurity has exited the company. In this note, we review the move, share Hikvision's feedback and examine the...
'Suicidal' Knightscope Robot Drowns on Jul 17, 2017
Knightscope continues its hyper growth, at least when it comes to controversy, this time with a 'suicidal' robot in Washington DC. And here is...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact