Where to Install Headend Equipment

By: Ethan Ace, Published on Mar 14, 2012

Installing surveillance headend equipment in the wrong location can lead to increased failure rates or tampering. Often little thought is given to this decision, since security systems are frequently considered only after a facility is designed and built. In this update, we will look at the three most common locations where equipment is mounted and the advantages and disadvantages or each. Finally, we give our recommendations on how to best protect equipment that must be located "anywhere it fits".

Arbitrary Placement

Likely the most common location for equipment in small installation is "wherever there's room". This often amounts to locating equipment on or under a desk, on top of cabinets or other furniture, or on a wall shelf. If employees are trusted, and the location is not in view of the public, this is often not a problem. However, it may lead to unforeseen complications if not considered carefully:

  • Security: Most often, when system equipment is arbitrarily placed, no security measures are taken to prevent access to it. This makes it easier for settings to be changed and the systems disabled. If equipment is located in a highly visible location, criminals may easily remove or destroy the recorder, eliminating evidence of their crime in the process.
  • Environment: These locations are rarely chosen with consideration of environmental controls. This could contribute to dust and debris entering equipment fans, or internal temperatures being above recommended operating levels for extended periods of time. As we discussed in our hard drive failure statistics, these are the most common reasons for hard drive failure, increasing the probability that archived video will be unavailable when needed.
  • Access: Placing the equipment in an out of the way location may obstruct access to it when it is needed. This may be a problem, for example, if the recorder must be directly accessed to retrieve video. Connecting the recorder to a network and using remote client software alleviates this problem, at least somewhat, but equipment is still difficult to access for servicing, and this "out of sight, out of mind" philosophy may lead to the system falling into disrepair. 

With Monitoring Equipment

In some systems, users prefer to mount equipment in dedicated monitoring furniture, if a central monitoring console exists. These consoles are often made with rack space built-in. This furniture does not suffer from the same security or accessibility issues of arbitrary placement, as the location is generally secure, and staffed much of the day, or 24/7. Locating equipment in furniture does have its own issues:

  • Environment: While monitoring furniture may ship with rack space, it is not intended to have a rack's worth of equipment installed in it. Often, it is not properly ventilated to handle high heat loads.
  • Noise: Fan noise from equipment may become a nuisance to monitoring staff. VMS servers, which routinely are under mid-to-high server load, may be especially loud.

If either of these two points are issues at the monitoring location, equipment should be moved to a remotely located rack, which provides better thermal management, and reduces noise levels near users.

IT Racks

In facilities where space is available, either in existing racks, or new, equipment should be rack mounted. Placing equipment in dedicated spaces alleviates issues of access, environmental control, noise, and security, or at the very least, makes these easier to manage, since the space is not used for other purposes.

In spaces shared with general IT equipment, issues of physical access to security equipment may arise. Short of installing a dedicated locking cabinet for all equipment, there is little that can be done. Locking plexiglass covers are available, which can prevent access to connections and power switches in some cases, but access to power cords and patch cables may be impossible to completely prevent.

Recommendations

Generally speaking, equipment should be rack-mounted whenever possible, in dedicated IT racks. Failing this, if a monitoring station exists, consider placing equipment there. Ad-hoc placement should be considered as a last resort, only if no other space can be made.

If equipment absolutely must be placed arbitrarily, two considerations may contribute greatly to the system's usability:

  • Enclosures: To improve security and offer some protection from dust and debris, equipment in exposed locations should be installed in some sort of enclosure. Lockboxes and small wall-mount cabinets are available for as little as $50 online, and can prevent access by unauthorized parties.
  • Working height: If equipment must be directly accessed to operate and export video, it should be mounted at a working height of no more than approximately 48". Even if the system is network-connected, and these operations can be performed remotely, this height is a good idea, to make servicing and routine maintenance easier.
Comments : PRO Members only. Login. or Join.

Related Reports

Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
"New" Arecont Fixes Failures "Without A Fight" on Jun 05, 2019
The "old" Arecont was infamous not only for its camera failures but for making their "partners" fight to get them fixed. IPVM drew the ire of...
IndigoVision Control Center VMS Tested on May 30, 2019
IPVM's last test of IndigoVision's VMS was in 2010, which found enterprise VMS features and a simple client interface. but no 3rd party camera...
NJ Law Requires Apprenticeship For Public Works Integrators on May 24, 2019
Few integrators do a formal apprenticeship program. However, now a NJ law is requiring any integrator on public works projects (such as state...
Security / Privacy Journalist Sam Pfeifle Interview on May 24, 2019
Sam Pfeifle is best known as the outspoken former Editor of Security Systems News. After that, he was publications director at the International...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
ASCMA / Monitronics Declares Chapter 11 Bankruptcy Plan on May 22, 2019
Monitronics is entering into Chapter 11 bankruptcy. The company, also called Ascent Capital Group Inc., aka ASCMA, aka Brinks Home Security,...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Bank Security Manager Interview on May 15, 2019
Bank security contends with many significant threats - from fraudsters to robbers and more. In this interview, IPVM spoke with bank security...
China PRC Government New National Video Surveillance Standards on May 14, 2019
The People's Republic of China (PRC) government has released a new set of overarching standards for authorities to follow when they install video...

Most Recent Industry Reports

Sighthound Transforms Into Enterprise AI Provider on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...
False Verkada 'Unrivaled' Low Light Performance Claim Removed on Jun 12, 2019
Verkada falsely claimed that it delivered 'UNRIVALED LOW LIGHT PERFORMANCE' until IPVM questioned. In fact, Verkada's low light performance is...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Camera Course Summer 2019 - Register Now on Jun 12, 2019
Register for the Summer 2019 Camera Course.  This is the only independent surveillance camera course, based on in-depth product and technology...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
Carnegie Mellon AI Startup Zensors Profile on Jun 11, 2019
Zensors is a startup formed by Carnegie Mellon graduates from a Carnegie Mellon research project, offering customized models per camera that they...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact