Seamless integration of digital video with security applications

May 2001 Surveillance

The digital video market has undergone a significant transformation during the past few years. Digital video technology has become popular as a replacement for analog CCTV.

As a result, digital video recorders and standalone systems have become a large and fast growing market segment. Many businesses have spent a great deal of capital on their existing analog systems and associated infrastructure. At the same time, they understand the value and need for digital video technology, and many companies have created budgets for digital video solutions. The technology is still new, and digital video recorder (DVR) devices are introduced to the market almost every day. As a result, the focus has been on the 'box'.

Customer interest should instead be directed toward what digital video technology can contribute to a business' total security environment. There are three market segments in which digital video technology functions as part of a business solution. These include DVRs, nonintegrated digital video management systems (DVMSs), and DVMSs as a seamlessly integrated part of a total security solution.

Digital video in a total security management solution
Digital video in a total security management solution

Standalone DVRs

The most rudimentary of these is a standalone DVR. These devices are typically used as low cost replacements for analog VCRs. Because of high demand and a proliferation of such hardware on the market, DVRs have become price-based commodity items. They have limited functionality and operate independently of other systems, making them ineffective in serving the complex security needs of today's businesses.

Although a nonintegrated DVMS offers substantial improvements over a simple DVR device, it is still limited. It typically has a user interface that enables the system operator to control recording and playback, and to display video in one or more monitoring windows. However, it is only a partial solution, because it cannot link video to related alarms and event information from other systems that are critical to a company's security needs. The system does not recognise that the different events are related, so they cannot be monitored as a single occurrence in a central station monitoring environment. Centralised administration and management of nonintegrated systems is impossible. Information is stored in multiple databases, and because management requires multiple security administrators, such systems are cost ineffective. The fundamental problem remains that there are multiple, unrelated systems trying to behave as one.

Open architecture

Digital video technology's true value to security is realised when it is seamlessly integrated into a Total Security Knowledge Management Solution. With seamless integration there is a single system based on a scalable distributed architecture, in which various components can be seamlessly plugged through well defined 'open interfaces' and behave as an integral part of this system.

The heart of a seamlessly integrated solution is open architecture. An open system is one that is designed in accordance with accepted standards in use in the computer industry, and one that can easily integrate with other applications and devices. Only a system that is both device and data exchange independent can be considered truly open. Open architecture allows a company to create a security management environment that includes nonproprietary, off the shelf devices and applications, standard operating systems and databases within the existing corporate network infrastructure. For digital video solutions, open architecture provides support for multiple video compression algorithms, video servers and off the shelf, hard disk-based and tape library archival devices. In such an environment, when technology migrates, the customer is not tied to a particular manufacturer.

In a seamlessly integrated system, video can be linked to alarms or events generated by any third party field devices in the enterprise, including intrusion detection, fire, access, asset and any other controllers. A seamlessly integrated system offers centralised management, administration, monitoring and reporting. Its single, centralised database contains all the information that, in a nonintegrated environment, would be distributed among multiple databases. The open architecture design enables a system operator to view alarms and related video simultaneously on the same screen and in realtime. These features provide a complete picture of what happens, where, to whom and when within the enterprise. This information can be critically important evidence when a problem or security breach occurs.

A case in point might be the theft of an employee credential (ie badge). When the credential is reported stolen, the system's centralised database is updated to reflect the new credential status. A subsequent attempt to access the facility using the stolen credential generates an alarm, which denies the thief access and initiates capture of digital video of the access attempt. A guard located in another building or on the other side of the world views both the alarm information and the live video footage simultaneously on the same screen, and can respond immediately. The video clip can be stored and archived for later retrieval.

In another example, an employee carries a notebook computer from Area A to Area B within a building. As the person moves through the doorway, portal readers register the employee's credential information, as well as the notebook's RF asset tag number. The system checks the integrated database to verify whether that employee has permission to enter Area B at the time, and whether the employee has authority to move that notebook from Area A to Area B. If the person has such authority, access is granted to Area B. Otherwise, the system generates an alarm, access is denied and video footage is captured of the person attempting to remove the notebook. The video clip can also be exported and forwarded via electronic mail to management and security personnel.

These two very simple examples illustrate that digital video technology can be an invaluable tool when seamlessly integrated into a total security solution. It offers flexibility, cost effectiveness, centralised administration and monitoring, and instantaneous retrieval of vital information.

For further details contact Phil Mailes, Lenel Systems International on tel: (0944) 1932 874773, fax: (0944) 1932 874551, e-mail: [email protected]

About the author

Rudy D. Prokupets is Chief Technology Officer and Executive Vice President of Research and Development at Lenel Systems International. He holds a MSc degree in Electrical Engineering, and a Masters degree in Applied Mathematics. He is a frequent speaker at industry trade shows and seminars, has been published in books and numerous trade publications, and holds several patents.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.