Video at your Service

Blog Date:  7/19/2012
Author:  Ray Coulombe

The major product sectors of the security industry seem to have all followed a similar progression: analog (or low-speed serial), to digital, to IP, and now, to the cloud. The security industry may be lagging behind the IT world in terms of standards, features and product applications; however, they are both traveling the same path — and it leads to the cloud.
In certain VSaaS cases, all video remains stored locally — either in dedicated network-attached storage devices, or in cameras with internal (normally SD) storage. If suitable uplink WAN bandwidth is available from the video source, a secure Virtual Private Network (VPN) — otherwise known as a tunnel — can be employed to stream video to one or more off-site secure locations. Yet another approach, based on functionality like the Axis Communications One-Click system, allows a camera to be associated with an off-site storage system, and pushes that video to the cloud storage device. The recording, replay and live video access is controlled by a software platform such as the Axis Video Hosting System, or, for example, Salient Systems’ CompleteView.
Another consideration is the potential of analytics. Camera analytics are improving, and local processing and decision making may be critical — especially if an immediate response is required. Centralized analytics lends itself to forensics and data mining, where storage servers endowed with powerful analytics may bring their advantages to many users. This eliminates the need to make an up-front investment, and timely technology upgrades become easier.
Ultimately, a positive business value must be shown for VSaaS to reach its full potential, and additional complimentary services may be the key. Associating video with other alarm or physical security events creates a more complete picture of threats and alarms.
Link to Complete Article as it appeared in Security Technology Executive Magazine


Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->

Copyright Ⓒ 2010 SecuritySpecifiers™