Security Technology Executive

JUL-AUG 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/1013012

Contents of this Issue

Navigation

Page 33 of 83

34 SECURIT Y TECHNOLOGY E XECUTIVE • July/August 2018 • www. SecurityInfoWatch.com STE: As more video surveillance systems come online, joining the IoT, what are the biggest challenges the industry is currently facing in terms of implementation and deployment? Bulik: With more surveillance systems becom- ing IP based, you're seeing IT departments and video surveillance security departments merg- ing , which can be a significant and challenging task. When building or upgrading video surveil- lance systems, this collaboration is essential for a interoperable enterprise-wide as well as specifically geared and staged for each indi- vidual location. Red Hawk has developed its National Accounts Center of Excellence (COE) in New Orleans for this very reason. Because innovations are being introduced so quickly, it's proven worthwhile to bench test new technologies to determine the best uses and applications for real-world custom- er installations. Much of the troubleshoot- ing and configurations are done before the product ever goes to a customer location because for some applications, setting up analytics can be a complicated and time- consuming process. To achieve maximum efficiency and con- sistency for large- scale, national projects, we often pre-build or stage equipment and pro- gram security systems before they go out. Then, the team at the COE serves as a central resource for field technicians at installation time. Due to their up to the minute training and product knowledge, the team here is able to identify common problems quickly and promptly resolve any issues that crop up. For more complex matters, the team here can also remote into systems when needed. STE: Is it always necessary to start from scratch to implement a video surveillance/analytic system or can you utilize existing equipment and upgrade the system in stages? Tampier: One of the largest casinos in North America faced this very dilemma as it grew and expanded. Red Hawk was able to complete a multi-phased project to update the resort's analog video system to full color, IP cameras and a networked video manage- ment system. The upgrade required that the new cameras and existing analog products work together for a seamless integration which can be adapted as the casino contin- ues to expand in the future. When it comes to security technologies, it's not a "one and done" approach because not only is the technology changing , but the threats are evolving as well. That's why it's so crucial to have a trusted, long-term rela- tionship with your integrator who knows your business needs as well as your secu- rity risks. » What's really changed is how the data is being captured can be used to drive more actionable insights. « — Darrin Bulik, Director of Product Marketing and Client Devices at Western Digital successful deployment and one that teams need to address. For context, as you know, for a long time, the areas of IT and video surveillance deployment and management have been two separate teams, with separate skillsets, and separate approaches. As new video surveillance technologies and busi- ness needs emerge, like surveillance data stream- ing in from multiple points in the field through connected cameras and other video devices and video analytics, it is increasingly important for the deployment and management teams to work together and understand the additional burden these technologies place on surveillance systems. This enables them to strategize, set up, and roll out their systems effectively. STE: What about an enterprise that has multiple locations? How best to address and implement video analytic needs when facilities are different or when circumstances vary by location? Brandon Cobb: With the right security systems integrator, you can expect them to have the abil- ity to deliver systems that are both standard and VIDEO SURVEILLANCE

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2018