ISG BLOG

ISG Blog

Avoiding Pitfalls of Emerging Surveillance Systems

Re-posted with permission from LENSEC and edited for content

When the security integrator and end-users are considering surveillance systems, there is a great deal of complexity to consider. The average end-user probably doesn’t know where to begin, or where to focus their attention as they put together a solution for their business or organization. Security integrators can help, but the myriad of choices con be complicated.

Complexity doesn’t have to equal complicated. Sometimes there is a simple solution to fix a complicated problem.

Everyone expects the demand for network-connected devices to increase dramatically in the coming years. Bandwidth requirements to keep up with the expanding needs are also taxing businesses trying to keep up with demand.

The complexity issue generates the need for easy, reliable, and low-cost of hardware ownership and deployment. The lowest cost devices can be more expensive more in the long run than equipment that is properly designed to remain secure while optimizing its network usage. We recommend a holistic, layered approach, using open systems.

Existing System Challenges

When using existing infrastructure employing centralized or distributed architecture, experts tell us each security project has its own challenges. When end-users have legacy equipment or analog cameras switching to encoders, which introduces complexity, and could potentially offer vulnerabilities with legacy hardware. Integrating existing technology into a new or refreshed system deployment will require proper planning to ensure the equipment is appropriate for achieving the planned results (i.e. – better resolution, protected endpoints, etc.).

Customers might need to adapt systems to meet new standards and requirements.

Working with a knowledgeable and reputable integrator will help the customer understand when a solution using legacy equipment doesn’t make sense and produces an inefficient end-result.

You need a way to prevent cybersecurity threats from the edge with one hammer, not trying to keep track of problems in a cobbled together solution. The integrator should suggest using an advanced endpoint antivirus and malware platform that are AI-based and do not require constant updates. This solution will keep up with the threats as they occur.

Scalability

Customers often tell the security integrator, “This is what I need to today, but I want to be able to plan for what I’m going to need tomorrow.” This need to scale can show in the need for data throughput from cameras sending higher resolution images over the network. We also see a need for scaling the number of network ports over time. Once ports are used up, adding additional cameras also means adding additional port capability.

Storage becomes a big concern as well. Meeting with state and local government, we see the regulations that are put upon them, especially law enforcement, the longevity of that storage is needed for two to three years.

That can create a need for massive storage on the network, requiring much more storage than most customers’ plan to purchase, especially when you need video captured at a high quality and frame rate.

Careful evaluation of scalability becomes important if a customer needs a high-resolution camera, or adds services such as video analytics that add stress to an existing network. There is a trade-off of capability due to network restraints. A lot of customers say, ‘I need that high-quality forensics at the edge, but I just don’t have the pipes to do it. That’s a big trade-off and it could be a pitfall.”

Investment in equipment that will optimize the network without compromising quality is an important consideration.

Customers can avoid this pitfall by choosing equipment and software that includes health monitoring. We have solutions for this, and LENSEC also includes a health monitoring solution in Perspective VMS®. Monitoring your network can identify issues before they become real problems. Having regular monitoring reports can identify equipment issues before you discover outages at the worst possible time – post-incident.

It’s also important for customers to know the value of open-architecture platforms. Many companies sell systems that are proprietary in nature. This means, they don’t work will with other company’s equipment. When the customer’s technology supports open platform, the scalability improves over time. Perspective VMS® has an open platform and integration that allows for future scalability.

Evolving Market Needs

If the security integrator and their customer don’t pay attention to emerging market trends, they are facing a potential pitfall. Video analytics are making an impact on the security market by allowing customers to implement smart alerts for facial recognition, behavior monitoring, and remote site monitoring. In the event of theft, particularly in the energy sector, we see a lot of need for that edge processing. This helps predict abnormal behavior to help prevent people breaking in and stealing copper, for example. LENSEC has a solar solution that they can recommend for remote sites without physical infrastructure, such as buildings, existing power, and more.

Cybersecurity risk is trending upward still.

According to a study by Accenture over eight years, the average annual number of security breaches has increased by over 27%. That is actually stealing data from you and using it in some sort of nefarious way. Just a simple malware attack is extremely costly. It can take you over a month or more to resolve that. In some cases, we’ve seen where cameras or endpoints got infected, and they couldn’t reset the factory defaults to get rid of it, so they had to throw away the equipment.

Technology is advancing in great strides to be able to provide better equipment at the edge. Not only rugged equipment, but also edge protection from cyber or physical attacks becomes essential.

When rugged equipment is used in certain environments, integrators and customers must decide if they are storing video and data processing at the edge or are they backhauling the information to a centralized management location. Current technology allows for data streaming using a limited bandwidth backhaul, such as LTE or satellite transmission. Organizations need to remote monitor to know the health of those signals way out in those rugged environments. Generalized surveillance is not going to serve this environment. Lack of edge security and hardening of endpoints create a pitfall that integrators and customers need to learn about.

Pitfalls Require Market Ready Solutions

To summarize, here are key solutions that help the integrator and customer avoid pitfalls in today’s emerging security market.

Emerging Security Solutions:

  • Open Platforms for Easy Integration
  • Quick & Easy Deployment
  • Reliable Equipment & Software Protects Reputation & Credibility (Integrator and Customer)
  • Lower Total Cost of Ownership (TCO)
  • Automate Cybersecurity with Machine Learning
  • Stay Ahead of Increasing Complexity (i.e. – Regulations, Threats

Ask an ISG Expert Today

We offer products and services that are right-sized for customers seeking network optimization without sacrificing video quality, protection from cyber-threats and end-point vulnerabilities, and hardware and cyber health monitoring. Contact your local ISG dealer for more information on video surveillance solutions that make sense for your organization.

Subscribe

Want to receive automatic email notifications whenever we have a new story in a specific category of interest?

CLICK HERE to subscribe to subscribe the ISG Blog today!

Categories