Integrating Innovation: Part Two, Technological Augmentation

Integrating Innovation: Part Two, Technological Augmentation

This article is split into two separate parts.? “Integrating Innovation: Part One, Unified Platform Considerations” can be read here.

In the first part of this article, we reviewed the benefits of a single vendor offering, considerations for choosing open versus closed solutions, and the different major system architectures available today.? This article will review four different technologies that can positively augment a video surveillance system.

Door solutions

A traditional and widely adopted augmentation is the integration of electronic access control and/or intercom solutions within a video surveillance system, and there are a variety of benefits associated with tying these technologies together.? Electronic access control provides traceability, convenience, and management capabilities that are not offered by traditional keyed systems, and video surveillance provides a layer of security when visual verification of who is accessing a facility is required.? As an example, this type of system augmentation allows for camera call-up capabilities, which is when operators are presented with a video of someone simultaneously accessing a door with a credential.? If individuals with access rights have their photo in the system, an operator may also opt to visually confirm that the person in the video matches the identity of the one in the picture.? This prevents prolonged breaches should someone share their physical credential or PIN.?

When paired with video analytics, incidents involving social engineering (such as when someone who is authorized to enter holds the door for someone else who is not authorized to enter) or tailgating may be captured, recorded on video, and initiate an alarm for either operators or system administrators.? Generally, these systems are integrated when offered by a single vendor, though the degree to which they are truly unified may differ between offerings.? Consider systems that have been developed in-house as opposed to acquired, or options that run within the same database structure to ensure maximum interoperability.

For certain entry points within a facility, it is beneficial to consider utilizing an intercom solution.? Intercoms blend access control functionality with video surveillance by providing a way for parties to communicate between the secured and unsecured side of a facility’s perimeter.? Many intercom units feature integrated video surveillance cameras that can be pulled into a system like a conventional camera; this means that video intercoms serve dual duty by providing live viewing during communications while simultaneously recording the interactions.? In addition to cameras, intercom devices may also feature credential readers or PIN pads for use within an access control system.? These all-in-one style intercoms save on installation costs and may sometimes only require a single data cable run with no other wiring necessary.? When incorporated with a VMS, two-way communication at doors and the ability to provide remote entry may be facilitated from a computer or mobile app.? These devices may also be incorporated into VoIP systems as an added layer of redundancy or to provide end-users architectural flexibility.

When determining which single vendor security solution to deploy, it is vital to understand the need for access control and intercom solutions, as well as the hardware options offered by that manufacturer.

Network audio

As one of the fastest growing network-based technologies, IP audio provides users flexibility, scalability, and ease of maintenance.? Unlike conventional analog audio systems, network speakers generally do not require rack mounted audio hardware such as amplifiers, equalizers, or audio source input devices.? These systems consist of intelligent network speakers or analog-to-IP conversion devices that are home run to a switch with network cable.? This replicates how video surveillance systems are installed and provides a layer of familiarity for system integrators who are not experienced with traditional audio installations.

Like intercoms, IP audio systems may serve two purposes: First, these devices may be integrated with a video surveillance or access control solution to provide active alarming and notification in the event of a system trigger.? Video surveillance systems alone are a passive deterrent, and when paired with an IP audio solution, become capable of active deterrence either using pre-recorded messages to be played during system alarm events or via direct live operator talk down.? Likewise, end-users may consider utilizing IP audio for operational purposes like automated announcements, bell schedules, targeted advertisements, or to play background music.? The dual nature of IP audio provides wider market coverage for system integrators implementing such systems and a significant return on investment for end-users.

When considering a single vendor solution, review the need for security or operational audio solutions.? At that point, if necessary, determine the type of speaker required.? Some manufacturers offer a wider range of speaker options than others, and this includes conversion devices in the event there are existing analog speakers present and a phased approach is required for replacement.

Wearable surveillance

The market has only recently adopted the use of wearable surveillance as it relates to integration into a VMS.? Wearables, also known as body cameras, are not a new concept, and different verticals are beginning to utilize them under certain circumstances and situations.? The first use-case that may come to mind is law enforcement, and while wearables, in-car video, and general surveillance cameras may be tied into a single vendor software offering, this is not the most unique use case.? Today, many healthcare facilities and providers opt for the use of wearables; similarly, maintenance personnel or individuals operating in areas that require surveillance that are difficult to mount traditional cameras may also be seen leveraging this technology.? Not only do these devices provide point-of-view video on what is occurring, but built-in technology like Wi-Fi and cellular capabilities, accelerometers, and even GPS permit use cases like live monitoring from a central station of both audio and video, video recording triggers in the event of a slip-and-fall for safety purposes, and general location data of incidents, respectively.

Wearables are not for every user of a surveillance system; however, when combined within the same solution, provide an additional perspective when utilized in conjunction and time-synced with other conventional surveillance devices.? When exploring wearables, consider two major points: First, determine the architecture for storing the video; is it located in the cloud and based on a subscription or is it stored on an NVR with other surveillance video and data?? Finally, understand all of the different types of wearables offered, ranging from very aggressive looking to milder, their accessories, and the warranty offered by each respective manufacturer.

Specialty & modular

Specialty devices and modular cameras are often used under very specific and unique circumstances and include devices such as small form-factor cameras with the ability to utilize multiple sensors simultaneously, thermal devices for both object and temperature detection, explosion protected devices, and radar.? It’s important to review the entire breadth of a manufacturer’s portfolio in the event one of these technologies is required.? There are many use cases that incorporate multiple technologies, though one of the most compelling instances is with radar.

For large areas where object classification, speed, and/or trajectory are required, and where there may be zero to very low light, radar is a fantastic option.? Many times, schools will utilize radar devices for protecting turf sports fields from after-hours vandalism or general unauthorized use.? Radars can detect people within specific zones, and when triggered, can initiate a pre-recorded message from an IP speaker to warn the individuals who may not realize they are somewhere that they are not authorized to be.? The major drawback with radar, even though its field of view can be pulled into a surveillance system, is that there is no way to verify alarms.? In these instances, it’s necessary to pair the radar with a surveillance camera, optimally, a pan-tilt-zoom (PTZ) capable one with integrated IR illumination.? In the instance of a radar violation the camera can auto track on the alarming objects which provides video verification to an operator receiving the alarm and records identifying information about the individual in the scene.? This combination may be deployed with a single vendor given that the manufacturer offers this entire suite of security hardware and software capabilities.?

Like the other technological use cases, it’s vitally important to understand the problem to be solved and explore all the different ways to achieve a solution in the most effective and long-term budget friendly way possible.? Communication with multiple manufacturers and solution providers is key to understanding all the single vendor options available today.

Final thoughts

The option for highly integrated, flexible, single vendor solutions presents an opportunity for organizations facing the complexities of selecting and managing a security solution. Choosing an end-to-end solution not only streamlines procurement and deployment, but also enhances the overall efficiency and reliability of the solution. The choice between open and closed architectures, coupled with the flexibility to incorporate both traditional and non-traditional system augmentations, such as door control, IP audio, wearables, or specialty devices ensures that both system integrators and end-users can tailor solutions to meet their needs.??

The education and support offered by single vendors consolidate the learning curve, allowing both system integrators and end-users to maximize the value of their investments with fewer disruptions and a clearer path to resolution when issues arise. The benefits of reduced complexity, enhanced interoperability, and a unified point of contact for service and support form a compelling case for organizations to consider single vendor solutions as an approach to meeting their safety and security needs.

Ultimately, the decision to adopt a single vendor solution should be guided by an understanding of the organization's current and future needs, the technological flexibility offered, and the level of support provided by the vendor. By making an informed choice, organizations can ensure that their investment not only solves their immediate security and operational challenges, but also positions them for success as they grow and as their needs evolve. This strategic approach allows system integrators and end-users alike to navigate the available options with confidence, leading to improved security, optimal efficiency, and a lower overall total cost of ownership.

要查看或添加评论,请登录

Vincent Campisano的更多文章

社区洞察

其他会员也浏览了