You Are Browsing ‘Tips for Security Integrators’ Category

Securing the Internet of Things (IoT): Challenging but Critical

by vmstoday - on Nov 23rd 2016 - No Comments

This week, we are discussing IoT security. If IoT devices and ip cameras are not secured, hackers can use them to gain access to the enterprise network, to distribute malware, or to launch distributed denial of service (DDoS) attacks. As in the case of recent incidents for Dahua, Hikvision and others security camera manufacturers. According to a recent report from Flashpoint and Level 3 Threat Research Labs, botnets made up of hundreds of thousands of compromised IoT devices are already being used to launch massive DDoS attacks. (more…)

Advantages and Disadvantages of Using 4k Security Cameras – Part 2

by katieG - on May 10th 2016 - 1 Comment

Welcome back to part two in our series on 4K surveillance. If you missed part one in our series, it was all about what “4K” surveillance means in terms of both resolution and its possible impacts. We discussed the role that light can play in a 4K camera system, and how to figure out what kind of sensors you might need to make the most of this kind of a setup.

Today, we’re going to go more in depth. We will be looking at some of the pros and cons you might experience while using a 4K camera system and will try to help you decide if you should invest in a 4K surveillance system.


Is A 4K System right for your Surveillance Needs?

by katieG - on Apr 21st 2016 - No Comments

If you deal in physical security then the odds are good that at some point you have heard about 4K System. It is gaining a lot of popularity as of late and more and more business owners have been considering it. Today, we are going to talk about what exactly 4K is, when it is appropriate to use and to help you to begin to figure out if you want to upgrade to 4K technology. (more…)

Axis Launches New Tools to Simplify the Design and Specification of Systems of Any Size and Complexity

by vmstoday - on Mar 24th 2016 - No Comments

Axis Communications, today announced the launch of two design platforms that simplify and streamline security system design. AXIS Design Studio is specifically designed for use by independent consultants to design complex, enterprise systems leveraging existing design software. System integrators and installers can utilize AXIS Site Designer to design security solutions for small and mid-sized systems. (more…)

Challenges of The Internet of Things and Cyber Security

by M Rucinski - on Oct 20th 2015 - No Comments

The Internet is a growing part of everyday life, at home and in the workplace, even in ways we wouldn’t traditionally think of as interconnectivity. Wearable technologies such as fitness trackers are an example of the Internet of Things (IoT), the network of physical objects or devices with unique identifiers that can collect and exchange data.

The Internet of Things doesn’t necessarily mean the interconnectivity of computers and smartphones. IoT describes an environment where anything can be connected to generate intelligence, from medical devices such as pacemakers to home automation systems. IoT enables new business models by transforming the physical world into an informational system – and it’s growing. According to Gartner, Inc., an IT research firm, over 20 percent of enterprises will have digital security services using IoT devices and systems by 2017. (more…)

The Cost of Storing Surveillance Video

by vmstoday - on Nov 13th 2014 - No Comments

Are storage technologies for video surveillance up to the task of meeting consumer demand? End users seeking high quality video footage while also looking to reduce costs may discover that finding an affordable, scalable storage solution can be challenging.

The transition from analog to digital has greatly impacted storage solutions. Higher quality footage means a clearer picture, but also greater bandwidth, and thus more storage capacity. The storage capacity required by IP network and megapixel cameras can be colossal. IT professionals in charge of managing video data storage may be overwhelmed by its demands.


Cloud Surveillance – Explained

by M Rucinski - on Oct 30th 2014 - No Comments

Cloud Surveillance – Explained

How Cloud Surveillance Works

While NVRs, DVRs, and Edge Recording Platforms are common ways to store video data, there’s another option: the cloud. The cloud is a remote access data storage system managed by a third party.

Its method is simple: surveillance video from IP cameras is sent to the cloud via a secure network connection. The surveillance footage can be viewed by the client on a computer browser, or a smartphone or tablet. The data is secured through authentication (login) and authorization processes.

The main advantage of cloud storage is that surveillance video, whether taken from a single location or multiple, can be accessed anywhere from a single source. The cloud also eliminates the need for physical storage devices. Users do not have to invest in DVR or NVR equipment and video storage drives.


Best Practices for Video Analytics

by M Rucinski - on Oct 27th 2014 - No Comments

VMSToday Best Practices for Video-Analytics

The naked eye has its limitations. Video analytics, used to monitor surveillance cameras and to create automatic alerts for security incidents, can be a more efficient and cost-effective method for live monitoring of multiple video feeds than using human personnel. Intelligent video analytics solutions can detect and identify visual and audio data, and then create automatic alerts based on events.

To ensure that video analytics are most effective, security users can employ best practices in installing and maintaining surveillance equipment. (more…)

Optimizing Bandwidth for Video Surveillance

by admin - on Sep 18th 2014 - No Comments

Optimizing bandwidth for an IP video surveillance system may seem a bit like having your cake and eating it too. Namely, end users want high quality, high definition images that don’t hog too much bandwidth. There are a number of factors that determine bandwidth usage, such as number of cameras used, camera location,  image resolution, frame rate, video compression format, and amount of motion/activity that the cameras record. Many IP camera manufacturers provide online calculators for users to gauge the amount of bandwidth they will need.  And fortunately, there are also ways to reduce and optimize bandwidth usage.


In terms of bandwidth availability, the size of the surveillance area is important. Will cameras need to communicate to a server in another building? Are the buildings within the same campus? Or will the cameras be installed in a single location? Location determines the amount of bandwidth that is available, and it is generally plentiful within the same building or campus.


The amount of bandwidth consumed by IP Cameras is based on a number of variables: (more…)

M-JPEG or H.264: What’s the Best Standard for Network Cameras?

by vmstoday - on Sep 11th 2014 - No Comments


There are a number of video compression standards available, all of which can impact a video surveillance system’s success and efficiency. Of the two video compression codecs, M-JPEG and H.264, which is the best choice for video surveillance? While H.264 is efficient, widely used, and economically a good choice for consumers seeking to save on bandwidth and storage, M-JPEG delivers consistent high quality video regardless of the camera manufacturer. Determining the best compression standard depends on the conditions of the surveillance area – such as lighting and motion/activity, and the needs of the end user.


Motion JPEG or M-JPEG is a compression format that consists of sequential JPEG images. A series of frames per second creates motion video. M-JPEG requires no licensing, is widely compatible, utilizes a small amount of processing power for encoding, and is consistent and reliable with different camera manufacturers. Image frames in the sequence can be analyzed individually, which is beneficial to users reviewing surveillance recordings.

The most notable disadvantage of M-JPEG is its vast bandwidth and storage requirements.  Because it (more…)