ONVIF: The evolution of a standard

July 2016 Editor's Choice, Security Services & Risk Management

ONVIF has achieved a lot since its founding in 2008. ONVIF has nearly 500 members and there are more than 5 000 ONVIF-conformant products in the market today. Like many other standards, ONVIF has evolved incrementally. Other standards like the International Electrotechnical Commission (IEC), the Institute of Electrical and Electronics Engineers (IEEE) and Bluetooth have evolved in many of the same ways that ONVIF has.

Building a foundation

ONVIF was founded by Axis, Sony and Bosch to create a global standard for the interface of network cameras and video management systems. It sought to provide greater freedom of choice for installers and end users to select products from a variety of different vendors. By establishing a basic standard for video in its early days, the founders also hoped to simplify product development for manufacturers.

Early on, ONVIF realised it had to make some adjustments to its approach to creating a standard. Although members had agreed on how to specify APIs for video, the way the manufacturers deployed these in their products varied. As a result, ONVIF turned to the profile concept. The idea with the profile concept was that if manufacturers developed products in accordance with the profile, their products would work together regardless of the manufacturer of the VMS or camera.

Per Björkdahl, ONVIF Steering 
Committee Chair.
Per Björkdahl, ONVIF Steering Committee Chair.

Bluetooth experienced a similar chain of events when it introduced an updated version of its headsets specification. Bluetooth introduced its ‘Headset Profile’ to work regardless of when a device was manufactured. A new profile with a new name was created when future changes were needed. ONVIF is using the same approach: if a product is Profile S conformant, for example, it will always be conformant, regardless of when it is manufactured.

A broadening vision

Two years after its founding, ONVIF extended its scope to include access control. Because of the framework established on ONVIF’s formation, the group’s scope for standards can include any discipline within the physical security industry and is no longer solely focused on video. Like ONVIF, other standards organisations have also extended their scope over time.

What is today IEEE and its standards body began in the 1880s as an organisation for electrical engineers whose mission was to standardise electricity. It grew to encompass other industries and is now considered one of the biggest and most influential technology standards in the world. Similarly, the IEC began their standards work in the electricity industry, eventually expanding its scope as well.

IEC and ONVIF

As the demand for interoperability between all devices increases and the concept of the Internet of Things becomes a reality, standards groups are increasingly working together. ONVIF and the IEC are working together in this collaborative way.

The ONVIF specification has been included in the new international IEC 62676 standard for video surveillance systems, the first international standard for video surveillance systems. The IEC’s standard for Electronic Access Control has also incorporated ONVIF’s newest access control specification in its soon to be released IEC60839 standard. This cooperation between standards organisations like ONVIF and IEC will likely continue in order to provide the highest levels of interoperability, which ultimately benefits the end user.

By examining the evolution of other standards, we can see how vital they are to industries, often beginning with a relatively small focus on one specific market and expanding to include others as acceptance and use grows. What comes next for ONVIF depends on its members and the physical security community, who ultimately are together at the helm, driving us forward as new technology develops and evolves.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.