Network Impact from HD Security Cameras

networkNe

Security manufacturers are developing ultra-high-resolution cameras that produce detailed images to protect facilities and monitor operations. As analog and legacy IP systems are being replaced, IT departments are being called to assist with planning, installing, and managing the HD systems.

Data and bandwidth implications

New high-resolution cameras create approximately 5 megabits of data per second (Mbps). Ultra-high megapixel panoramic cameras can create as much as 30 megabits or more of data per second. This amount of data must be managed from the moment it leaves the camera, across the network, to the viewing station at the security desk, to the storage appliance pool receiving terabytes to petabytes of streaming video 24 hours a day. Video streams must be viewed and recorded without loss of resolution.

Network infrastructure

Network switches are deployed with respect current and future demands, but often overlooking video surveillance bandwidth demands. Network administrators will need to consider the deployment of physically separated networks for security and business production. They will also consider multicast protocol to reduce network flooding in certain situations. Power over Ethernet (PoE) is the most common way to provide power to security cameras and must be considered when determining the total draw from network switch hardware.

Computer hardware

Multiple departments will need viewer access to security cameras. IT will need to determine if new cameras can be viewed reliably on the existing video graphic cards. Servers must be deployed that can handle the data being created by dozens, hundreds, or even thousands of cameras. If the organization runs in a virtualized environment, licensing and available processor assets must be assessed.

Storage appliances

The amount of storage required is computed with a formula that uses data estimations created by the cameras. Storage devices are then deployed in a centralized data center or in decentralized locations across a campus.

Cybersecurity

Reputable manufacturers engineer cameras and other devices that are penetration attack tested. They also provide regular firmware updates to ensure that new attack methods can’t exploit previously unknown vulnerabilities. Likewise, your security integration partner will perform camera firmware updates as part of the ongoing security maintenance agreement. You must also consider the increased risk of insider hacking. By placing more cameras in plain view, the risk of internal challenges to security can increase. Employees or students can attempt to access security cameras and other devices through their internal network connection. Strict password protection and, in many cases, virtual private network (VPN) policies should be used to prevent unauthorized access to security devices.

Bridging security demands and IT support

You can count on Securitronics to provide expert advice for your most demanding safety and security concerns. We are dedicated problem-solvers, always ready to use new and innovative technologies to develop your plan and secure your property, assets, and personnel. Our goal is to build long-term, lasting partnerships based on absolute trust and personalized services from the most skilled and talented security professionals available.

Contact Securitronics Solutionist today. 800.795.3747

On-Site Security Risk Assessment

assessment

Imagine a facility constructed from day 1 with future security requirements as the top priority. Does that describe your security landscape?  Most likely not. The level of security installed on day 1 does not always reflect the security required of the organization later.

There’s often a mismatch between budget, specifier input, and end user operational requirements. Requirements change with facility capabilities and in response to prevalent threats. A facility that was once secure with cameras at the entrance, may now require security checkpoints at the property entrance and a perimeter fence detection system with cameras watching the property line. Organizations change, the world changes, and security technologies change in response.

Organizational changes

Expansion or reduction of the physical footprint of an organization is impacted by new construction projects. New projects may require alterations or upgrades to the existing systems. Prior to physical changes, a complete security risk assessment must be performed to uncover the new security requirements for the organization. Likewise, if a business changes its scope of operation, there may be the need to increase security. This may happen when cash flow changes or the potential hazard increases.

Environmental changes

If a local threat arises, it may impact a cluster of facilities. If a national or global threat arises, the entire vertical market must adopt new security measures, all of which require security risk assessments. For example, the Department of Homeland Security (DHS) directs 16 specific critical infrastructure categories related to cyber, physical, and electronic security requirements. These requirements are reviewed and updated to reflect global security changes and their impact on specific industries.

Security technology changes

Improvements in security system technology are occurring at a staggering rate. Surveillance cameras are being produced with dramatically higher resolution capability. Access control systems are becoming more sophisticated, from card credentials to biometric readers. Legacy perimeter intrusion detection systems (PIDS) attached to fences are being replaced with modern power over Ethernet (PoE) devices and increased, smart sensitivity capabilities. When the mean time between failure (MTBF) for legacy security devices may have been as long as 15 years using analog technology, new IP based system devices may only have a three to five-year replacement cycle.

Action plan

These common scenarios present reasons to conduct a security risk assessment on a regularly scheduled basis in addition to when specific needs arise. Performing these assessments regularly can bring unrealized vulnerabilities to the surface.  These assessments should be conducted by security technology experts in conjunction with officials familiar with the unique operations of the organization. Without expertise from both sides, vulnerabilities may remain overlooked.

You can count on Securitronics to perform comprehensive security risk assessments that address your most demanding safety and security concerns. We are dedicated problem-solvers, always ready to use new and innovative technologies to develop your plan and secure your property, assets, and personnel. Our goal is to build long-term, lasting partnerships based on absolute trust and personalized services from the most skilled and talented security professionals available.

Contact Securitronics today. 800.795.3747