Security Technology Executive

MAY-JUN 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/530736

Contents of this Issue

Navigation

Page 25 of 67

26 SECURITY TECHNOLOGY EXECUTIVE • May/June 2015 www.SecurityInfoWatch.com TECHNOLOGY ROUNDTABLE and lowering costs. As users continue to seek more detailed images, bandwidth and storage consumption can increase along with the number of pixels – making noise reduction and compression extremely impor- tant for lowering bitrates. The best place to lower bitrates is in the camera by adjusting noise reduction based upon light levels and moving objects. Bosch accomplishes this with Intelligent Dynamic Noise Reduction (IDNR), which produces images with the least amount of noise, greatest amount of detail and lowest bitrates. When no motion is present, IDNR minimizes bitrates. When an impor tant object is detected, bitrates increase to capture maximum details. Band- width is only being consumed at higher levels when increased scene detail may be needed. With IDNR, bitrates, and therefore bandwidth and storage requirements, can be lowered by up to 50 percent with no compro- mise on image quality. In addition to improvements at the sys- tem level, greater integration of tangent sys- tems – such as intrusion, access control, fire detection and more – with the video system will help users realize greater efficiencies and provide them with more information on events at their facilities. Christian Morin: T he next trend that will impact the security industr y will be cloud computing. The ability for organiza- tions to subscribe to cloud services, rather than invest in their own infrastructure and licenses, provides greater f lexibility both from the ability to access new functionality on-demand, as well as transitioning poten- tially large capital procurements to opera- tional expenses. The shift to the cloud does not mean customers will abandon their on-premises security systems. Rather, they are able to implement hybrid systems that leverage their existing infrastructure, soft- ware, and devices, and connect them to the cloud in order to utilize ser vices that can extend their existing capabilities, and/or allow them reduce costs. The ability to lever- age cloud resources means not only a sav- ings in acquisition costs (e.g. not having to purchase new servers and licenses to deploy an application) but also in operational and maintenance costs, as an organization can reduce the time IT staff spends maintaining/ upgrading equipment and software, and will no longer need to pay for the electricity for power, cooling and floor space for their own server rooms. For example, Genetec 's Cloud Archives ser vice has been designed to complement existing Security Center systems, where cus- tomers can transfer all or some of their video recordings to the cloud. They will do this to be able to protect certain key video record- ings (whether minutes, hours, or days) in a secure, off-site location, and may also want to retain older archives for long-term reten- tion in the cloud, in order to reduce the stor- age hardware that they require on-premises. This allows organizing to continue utilizing their existing infrastructure, while benefit- ing from the flexibility to transfer additional storage capacity to the cloud to minimize their investment in additional servers. Kenneth Hune Petersen: Milestone Sys- tems' open platform technolog y and inte- gration with other IP-based systems has changed the video sur veillance industr y. Now, video enabling - the combination of video and other business systems - is the way forward. It is not a move away from security, but rather additions of other functions to that of traditional asset protection and loss prevention. The amount of revenue-generat- ing potential inherent in video enabling is a 'win-win-win' for vendors, partners and the customers. We see tremendous opportuni- ties in areas such as customer service, elderly care, training, education and environmental applications. Doron Girmonsky: Ever ything is driv- ing the market toward more data -- longer recording times, greater resolution, higher frame rates, and increased redundancy. By itself, more data is not more useful; in fact, it can be a hindrance. With too much data you're unable to see the forest for the trees, which is the starting point for the next 'BIG' thing. The focus should be on converting data into something insightful; that's the promise of big data. To deliver on this, we need tools that can automatically uncover patterns in data that can be used proactively. This operational intelligence can be used to pre- dict what airport gates or bank branches are hotspots for issues, and to expedite a mass transit agency's ability to find suspects fast- er than they could previously. Armed with this type of information and the potential to prevent crimes, organizations may be able to better justify additional investments to add more cameras or further expand their secu- rity system. Kenneth Hune Petersen is Chief Sales/Marketing Officer at Milestone Systems. Kevin Saldanha is Director of Video Imaging Systems at Pelco by Schneider Electric. Tom Cook is Vice President, Sales, North America at Samsung. Allen Chan is Senior Product Manager at SONY Security Systems Division. Doron Girmonsky is the Head of Technology & Innovation, Security Group at NICE Systems

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2015