Where to Install Headend Equipment

Author: Ethan Ace, Published on Mar 14, 2012

Installing surveillance headend equipment in the wrong location can lead to increased failure rates or tampering. Often little thought is given to this decision, since security systems are frequently considered only after a facility is designed and built. In this update, we will look at the three most common locations where equipment is mounted and the advantages and disadvantages or each. Finally, we give our recommendations on how to best protect equipment that must be located "anywhere it fits".

Arbitrary Placement

Likely the most common location for equipment in small installation is "wherever there's room". This often amounts to locating equipment on or under a desk, on top of cabinets or other furniture, or on a wall shelf. If employees are trusted, and the location is not in view of the public, this is often not a problem. However, it may lead to unforeseen complications if not considered carefully:

  • Security: Most often, when system equipment is arbitrarily placed, no security measures are taken to prevent access to it. This makes it easier for settings to be changed and the systems disabled. If equipment is located in a highly visible location, criminals may easily remove or destroy the recorder, eliminating evidence of their crime in the process.
  • Environment: These locations are rarely chosen with consideration of environmental controls. This could contribute to dust and debris entering equipment fans, or internal temperatures being above recommended operating levels for extended periods of time. As we discussed in our hard drive failure statistics, these are the most common reasons for hard drive failure, increasing the probability that archived video will be unavailable when needed.
  • Access: Placing the equipment in an out of the way location may obstruct access to it when it is needed. This may be a problem, for example, if the recorder must be directly accessed to retrieve video. Connecting the recorder to a network and using remote client software alleviates this problem, at least somewhat, but equipment is still difficult to access for servicing, and this "out of sight, out of mind" philosophy may lead to the system falling into disrepair. 

With Monitoring Equipment

In some systems, users prefer to mount equipment in dedicated monitoring furniture, if a central monitoring console exists. These consoles are often made with rack space built-in. This furniture does not suffer from the same security or accessibility issues of arbitrary placement, as the location is generally secure, and staffed much of the day, or 24/7. Locating equipment in furniture does have its own issues:

  • Environment: While monitoring furniture may ship with rack space, it is not intended to have a rack's worth of equipment installed in it. Often, it is not properly ventilated to handle high heat loads.
  • Noise: Fan noise from equipment may become a nuisance to monitoring staff. VMS servers, which routinely are under mid-to-high server load, may be especially loud.

If either of these two points are issues at the monitoring location, equipment should be moved to a remotely located rack, which provides better thermal management, and reduces noise levels near users.

IT Racks

In facilities where space is available, either in existing racks, or new, equipment should be rack mounted. Placing equipment in dedicated spaces alleviates issues of access, environmental control, noise, and security, or at the very least, makes these easier to manage, since the space is not used for other purposes.

In spaces shared with general IT equipment, issues of physical access to security equipment may arise. Short of installing a dedicated locking cabinet for all equipment, there is little that can be done. Locking plexiglass covers are available, which can prevent access to connections and power switches in some cases, but access to power cords and patch cables may be impossible to completely prevent.

Recommendations

Generally speaking, equipment should be rack-mounted whenever possible, in dedicated IT racks. Failing this, if a monitoring station exists, consider placing equipment there. Ad-hoc placement should be considered as a last resort, only if no other space can be made.

If equipment absolutely must be placed arbitrarily, two considerations may contribute greatly to the system's usability:

  • Enclosures: To improve security and offer some protection from dust and debris, equipment in exposed locations should be installed in some sort of enclosure. Lockboxes and small wall-mount cabinets are available for as little as $50 online, and can prevent access by unauthorized parties.
  • Working height: If equipment must be directly accessed to operate and export video, it should be mounted at a working height of no more than approximately 48". Even if the system is network-connected, and these operations can be performed remotely, this height is a good idea, to make servicing and routine maintenance easier.
Comments : PRO Members only. Login. or Join.

Related Reports

Security System Health Monitoring Usage Statistics 2018 on Oct 09, 2018
How well and quickly do integrators know if devices are offline or broken? New IPVM statistics show that typically no health monitoring is...
IP Camera Installability Shootout - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Uniview, Vivotek on Oct 08, 2018
What are the best and worst cameras from an installation standpoint? Which manufacturers make it harder or easier to install their cameras? We...
Fall 2018 New Products Directory on Oct 03, 2018
Fall 2018 New Products Directory We have compiled a directory of new products released fall 2018, or at least since our Spring 2018 Directory. The...
Network Cable Testing Guide on Oct 02, 2018
Proper cable installation is key to trouble-free surveillance systems. However, testing is often an afterthought, with problems only discovered...
AHJ / Authority Having Jurisdiction Tutorial on Sep 27, 2018
One of the most powerful yet often underappreciated characters in all of physical security is the Authority Having Jurisdiction (AHJ). Often,...
Ladders For Installers Guide on Sep 25, 2018
Ladders are one of the most important pieces of worksite equipment for the surveillance technician. Too often, however, even highly experienced...
Alexa Guard Expands Amazon's Security Offerings, Boosts ADT's Stock on Sep 21, 2018
Amazon is expanding their security offerings yet again, this time with Alexa Guard that delivers security audio analytics and a virtual "Fake...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...

Most Recent Industry Reports

Knightscope Winning Investors, Struggling With Growth on Oct 16, 2018
While Knightscope's new financials show the company only winning 11 new customers in the past 12 months, the company continues to win new...
Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Huawei Admits AI "Bubble" on Oct 16, 2018
A fascinating article from the Chinese government's Global Times: Huawei’s AI ambition to reshape industries. While the Global Times talks about...
ADI's Financials Revealed + W-Box Growth Priority on Oct 15, 2018
  ADI is one of the most powerful distributors in the security industry but how big are they? How much profit do they make? How much do they sell...
Amazon Touts Home Security Market Disruption on Oct 15, 2018
Amazon is coming for ADT and all of home security. Indeed, Amazon is advertising this as, in their own words, calling home security a: Inside...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
Mysterious Patent Troll 'Secure Cam' Targets Industry, Sues Hanwha, Hikvison, JCI, Panasonic, More on Oct 11, 2018
A company named "Secure Cam," who is actively hiding their ownership, has acquired a slew of video patents and is systematically suing video...
Unfixed Critical Vulnerability In Millions of XiongMai Devices Disclosed on Oct 10, 2018
XiongMai, one of the biggest OEMs alongside Dahua and Hikvision, has suffered a critical vulnerability impacting millions of their devices. This...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact