Security Technology Executive

SEP-OCT 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/571504

Contents of this Issue

Navigation

Page 55 of 99

56 SECURITY TECHNOLOGY EXECUTIVE • September/October 2015 www.SecurityInfoWatch.com VIDEO SURVEILLANCE processors and systems behind the monitors. For example, because of bandwidth demands, even a hig h-per for mance processor mig ht only be able to decode two or three IP-based 4K video streams at any one time. If a security team needs to monitor 10, 20 or even hundreds of streams to provide comprehensive situation- al monitoring, it is better to allow dedicated PC ser vers to handle IP decoding. However, to enable consolidated display of information from all of these systems, you need to choose a video wall processor that is capable of com- municating with, and processing information from, a variety of servers and systems. Consolidate Control to Enhance Response Wall processors vary greatly in their capabilities; when used for security monitoring purposes, you should look for a video wall processor that pro- vides operators with consolidated control over information from multiple disparate systems, such as access control, video surveillance, and fire alarm systems. These are typically separate sys- tems that were not originally designed to work together. However, by consolidating the display of the video outputs of these systems, video wall processors allow teams to look at and respond to all of this information at the same time, and be able to customize the layout of imagery, so that relevant information can be displayed together to enhance monitoring. For example, a hospital might have a system in place to prevent the kidnapping of new - borns. Babies wear bracelets embedded with an RFID chip, which would immediately sound an alarm if a baby is taken from the mater- nity ward. This alarm should trigger a series of related security protocol events: when the alarm goes off, doors around the unit need to automatically close and lock, and cameras installed around the ward should reorient to automatically re cord do or ways and o ther access points to capture images of the sus- pected kidnapper. An operator should be able to recall a preset to immediately change the appearance of the video wall, to ensure that all imagery relevant to the critical situation is displayed. The ability to simultaneously view and analyze hospital maps, imagery related to the location of the baby, video feeds from each door way, photos of both baby and suspect, status of all access points, etc. can help opera- tors better respond to situations when timely action can make all the difference in the out- come of the scenario. As another example to illustrate the benefit of combining the display of multiple, disparate Deployed as part of the overall strategy, video walls, or integrated arrays of wall-mounted monitors, enhance the effectiveness of surveillance and security systems, as seen here at the TranStar command center in Harris County, TX.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - SEP-OCT 2015