Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.

1 May 2017 Surveillance, Information Security, Integrated Solutions

What is it that makes a client purchase a particular preference in their video security solution? We know from current trends that most people are motivated by price and we also know that the often quoted ‘you pay for what you get’ comes back to haunt many people on their purchase choice.

The majority of solution vendors of all types and sizes will probably offer you a Chinese solution: Hikvision, Dahua, Sunell, Uniview or an OEM version filtered down from one of these manufacturers. In distinct contrast, there are a number of solution vendors who will actually tell you that you are making a mistake and need to look more closely at being brand agnostic and choosing best-of-breed products. This article sets to lay down some key points to consider before making your decision.

The camera

Cameras come in all shapes, sizes and price ranges. Depending upon your requirements, you will hopefully find the right camera for your needs from your vendor. However, most vendors only offer you a single brand of camera that might be strong in one particular area and weak in others. Correctly, you should consider the key issues that determine what camera you should use to cover the field of view, lighting, depth of view, focal point and what it is you actually want to see; i.e. the ‘Job Description’ for the camera.

There are many choices and despite a higher price you may find the area covered by a more expensive single or multi-sensor camera may be a cheaper option when cost of installation is fully considered. Choose the right company to advise you and they should be able to recommend a complete solution with a choice of best-of-breed products to solve your problems.

A boxed NVR

The same vendor who offers you a particular brand of camera will also offer you a recording solution. In a previous article, Vision Catcher commented on ‘What is in the box you have just bought’ and the pitfalls that you may uncover (www.securitysa.com/8728a). In simple terms, you will be given a box capable of recording the same brand of cameras with limited options for adding new cameras unless they are the same brand or ONVIF compliant. Upgrades for recorder and camera firmware may be available, but will restrict you in what you might be able to do at a later date. Finally, many of the low cost, small box recording devices have cybersecurity questions that most vendors cannot answer.

The boxed NVR and free licences

A boxed NVR will always come with a number of free licences. Most vendors talk of a single price for the ‘box’ including a number of licences and provide an all-up single cost. For example, the NVR is R1500 for 16 channels and R3000 for 32 channels. The vendor may also offer you an off-the-shelf PC including free licensing with i3 or i5 configuration, and allow you to add storage as required, all for a similar single price at perhaps R6000 to R10 000. The key promise being is that there is no fee for any licence. Well, what did you just pay for the goods, surely the cost of the licence is hidden within the cost of the box even if it is described as ‘FREE’?

There is a market for all levels of NVR and what we see are the demands for fuller features within the video management software (VMS). This provides for more licence options, greater storage capability and enhanced enterprise level features such as Suspect Tracking, Smart Search, Thumbnails, higher megapixel-rated camera storage and multi-sensor options that permit you to choose best-of-breed products and the right camera, lens and solution for a particular job description.

The evolution will continue as vendors will pander to the client’s need to hear that there is no licence fee, yet someone has to write the code that provides the firmware for the NVR and camera to work. At some point there must be a fee for the code wherever it is combined within a package price.

Best-of-breed choices

When you are looking further than a single brand concept and want to be able to use a range of cameras with specific performance criteria, built in analytics, SD card storage and NVR type functionality, multiple or single sensors and other features such as suspect tracking, you have to review what a VMS can offer. Recent releases from the exacqVision VMS has included:

• Suspect tracking.

• Enhanced mobile experience.

o Audio support.

o Inactivity timeout.

o Door monitoring.

• Custom system, camera and user attributes.

• Email video previews.

• Refined search date/time entry.

• Enhanced file manager and burn dialogue.

• New camera integrations and ONVIF additions.

• Enterprise system management enhancements for greater system healthcare and exacqCloud.

Most VMS options are brand agnostic, although there are one or two VMS choices that provide an end-to-end solution with varying success, using mainly their own cameras with occasional ONVIF and greater integration for a select few. Products such as exacqVision and Milestone pride themselves on the large range of camera brands and models that are fully integrated and are continually updated with newer firmware and integration options as they are released by the camera manufacturers.

Using a VMS with a true open architecture interface now allows you to look beyond what just a camera NVR can offer and provide full integration options for analytics, point of sale, access control and intrusion, as well as other coded interfaces that can provide a single management console and display.

Having this freedom of choice amongst best-of-breed products allows you to choose the right solutions that will provide a combined integrated and secure environment for your company, business, complex or home environment.

Cybersecurity

A real concern in our rapidly expanding IoT (Internet of Things) world is always being connected and having worldwide accessibility on a daily basis. This has created a large increase in new security threats to our environment and IT infrastructure. The threats from phishing attacks, theft of identity, data breaches and corporate espionage, to the DDoS and Botnet attacks that are used to hold companies to ransom is a reality.

Tyco Security Products set about a cyber protection programme more than five years ago and has developed one of the industry’s first programmes aimed at an holistic approach to cyber security for physical security products. This combines best practices in secure product development, testing and evaluation, and configuration guidelines for compliance that are filtered through to its marketing team, to the distributors and the resellers offering their products in the local market.

Recent malware infections that have been well publicised through cyber security sites and in the newspapers were mostly achieved through some well-known brand named cameras and NVRs. The misuse of usernames and passwords, failure to adhere to basic cyber protection rules and the telnet and open port standard setups available on many devices lead to these international attacks. These attacks had a direct effect on the President of the United States in the lead up to his inauguration and for a number of businesses that have cost them considerable sums of money.

The solution is to use product from manufacturers where you know that the cybersecurity threat is being addressed. The first question you should be asking your vendor or installer is what cybersecurity measures are in place to ensure the safety and protection of your IT infrastructure. Vision Catcher continues to promote and educate cybersecurity amongst its varied clients and vendors, highlighting the steps that are taken for exacqVision VMS and its various hardware options, as well as Illustra cameras and the Kantech access control.

Those same protection measures can be applied to those third-party cameras, access control and integrated solutions as part of our total package of offerings. The reality is that manufacturer, distributor, integrator, installer, consultant and end user client should equally address the question marks presented by cybersecurity.

Mobile access

The risk of a cybersecurity attack needs to be balanced with giving the client relevant access and tools for their system from mobile devices and perhaps even to be able to offer cloud services. Ensuring that our security solutions are cybersecure from outside malware attack means that we are able to set-up secure links through iPhone, Android and Windows devices with application downloads from relevant online stores. The mobile configuration requires clear authentication and provides for audit trail logging to check that disciplines and usage checks are correctly maintained.

A new development in the United States is a full cloud service interface allowing for enterprise-level management. exacqCloud provides camera and server health monitoring services hosted on AWS (Amazon Web Services). Exacq remains responsible for maintaining the dealer cloud with full SSL (Secure Sockets Layer) security up to 128 bit of Advanced Encryption Standard.

The same configuration options are available for local control rooms providing both mobile and offsite monitoring options as value added services that can be provided within the VMS capabilities.

Conclusions

Vision Catcher chooses to partner with products and solutions that provide a clear structure and plan for how an integrated security solution can be developed using best-of-breed products. The building tools have been clearly laid out within this article and give you the choice of the way forward for your own premises. Choosing a product because it is cheaper and the vendor promises and even demonstrates an amazing picture may not be all that you need.

Consider the priorities for how your security solution should evolve. Do we want to stay with a single brand? Is best-of-breed a better option? Is there a VMS with the option to choose a range of cameras from different brands and suppliers? Does your VMS have the features and integration options you require? Is the VMS providing you with cybersecurity, enhanced features and simplicity of operation? When we factor all of these points together you will have a security system that will provide you with the return you envisaged for a price that ensures that you are fully protected.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...