Round Table Contributions
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?
Technology is changing at a break-neck pace, and the security marketplace is currently being bombarded by a wealth of new capabilities and innovations. But what will be the impact? Which of the currently-hyped new innovations will have a major impact, and which will fade over time? And even acknowledging the long-term significance of various technologies, what can we expect to be the more immediate effect? We asked this week’s Expert Panel Roundtable: What new security technology is poised to have the greatest impact in the second half of 2017?
As security industry buzzwords go, “convergence” is perhaps the best known and most pervasive. We have been hearing about convergence in our market for almost 20 years. We have heard it’s happening soon. We have heard it’s inevitable. And yet, for all the talk of convergence, it has sometimes seemed there has been more talk than action. We wanted to check in with our Expert Panel Roundtable and get their latest takes on this most enduring of industry buzzwords. We asked this week’s panel: Has convergence happened yet in the physical security market? And what exactly does it mean?
There are many benefits of security systems, and some may be more obvious than others. Certainly, when choosing security systems to be installed, end users have goals and expectations for the systems in mind. But are there other benefits or opportunities that customers may not have thought of? It’s an interesting question, so we asked our Expert Panel Roundtable: Considering security systems integration, what is the biggest (or most common) missed opportunity?
The end of the year is a great time to reflect on what the security industry has accomplished and to look ahead. We invited our Expert Panel Roundtable to weigh in on what they expect looking forward to the new year. Most industry-watchers are familiar with the major trends, but how will those trends play out in 2017? Specifically, we asked this week’s Expert Panel Roundtable: What will be the biggest headlines for the security marketplace in 2017?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?
More cameras today are providing more video than ever, but how much of the video is available when and how it is needed? The question often comes up when law enforcement entities are seeking to access video from private systems to help solve a crime. There are many more private video systems than public systems, but is the video available when needed? And what about privacy: In what situations is it acceptable to share private video for the public good? We took these questions to this week’s Expert Panel Roundtable. Specifically, we asked: When does it make sense to share video from private video surveillance systems with citywide systems? What are the technical and/or privacy hurdles to sharing video more widely?
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillance cameras you have seen recently?
Articles by Brandon Reich
Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualisation and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organisations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you. Protecting educational facilities UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasise these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses. The primary mission of these organisations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different. This organisation, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus. Active shooter incidents In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue. Educational institutions face an increasingly complex risk environment UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder. At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralise video management, viewing and analysis. Upgrading from analogue systems Altogether, its security system consisted of older analogue platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralise system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed. Security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure The university deployed an HCI solution, one that is optimised for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximises performance and storage capacity utilisation. The platform also hosts the university’s video management solution, which serves as a centralised source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection. Protecting air travel and airports In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernise and expand the facility to meet increased passenger demand. While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs. Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process. Storage system updates It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance. Users rely on video to validate whether something did or did not happen - and this is essential in airports HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. Reducing expenses and costs The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialised IT skills. These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organisations of all types and they need to ensure their investment in capturing this data is protected. From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.
Over the past year, we’ve heard a lot of big buzzwords in conversations at different conferences, meetings and events. Deep learning, artificial intelligence and cybersecurity are hot topics, and these trends will undoubtedly define the landscape over the coming year. Other issues, mostly IT related, are also making their way into more and more surveillance-focused conversations and to me, none is more complicated — or beneficial — than hyperconvergence. What is hyperconvergence? Don’t worry if you haven’t heard the term before; you’re not alone. But it’s a concept dominating the IT space. So, what is it exactly? Network World defines hyperconvergence as an IT framework that combines storage, computing and networking into a single system to reduce data centre complexity and increase scalability. Hyperconverged infrastructure (HCI) delivers a simpler, more practical and cost-effective alternative, reducing data centre costs and complexity by integrating SAN and server virtualisation capabilities into a single software-defined infrastructure. But what does that mean? What you need to know is that HCI provides the benefits of enterprise-class IT infrastructure - think of the robust performance, resiliency, manageability and scalability IT users expect - without the high cost and complexity. However, more importantly, it can be optimised to meet the unique storage needs of the video surveillance market. Let’s look at why this trend is redefining options for video storage. Video storage infrastructures I once visited a site where the surveillance director showed me a box of CDs and USB drives that once served as the location’s “video library.” Nowadays, data is considered a just a bit more valuable to organisations: a lot more valuable! In fact, video surveillance is now considered the largest Big Data application in the world! The amount of video captured on a daily basis is growing at an exponential rate — making storing it a monumental challenge Businesses are leveraging video for all kinds of purposes – providing more business and operational value, making critical facilities more secure – and use cases will only expand in the future. The amount of video captured on a daily basis is growing at an exponential rate — making storing it a monumental challenge. Capturing and storing video surveillance data has never been easy. The application present unique challenges to traditional IT and storage infrastructures, mainly related to storage capacity and ingest rates. You’ve experienced it: Standard IT servers and Direct Attached Storage (DAS) appliances cannot keep up with the complex requirements of today’s surveillance storage environment. More sophisticated IT SAN and enterprise storage solutions are prohibitively expensive and complex to manage. Hyperconvergence for data security HCI is your opportunity to escalate your security operations to the next level. Designed as an IT solution to answer the challenges found in data centre and video storage environments, HCI empowers organisations to consolidate infrastructure and grow to petabyte-scale. When deployed in video surveillance applications, storage and throughput capacity can be scaled linearly as an organisation’s security and business requirements evolve; a critical benefit considering today’s data-driven business needs. Most importantly, system uptime and data protection prevent loss of critical information. HCI is your opportunity to escalate your security operations to the next level Looking for ease of system management? HCI eliminates the process of managing disparate platforms, learning vendor-specific management utilities and overseeing complex system administration. Instead, a single platform handles provisioning, monitoring and healing without user intervention. In return, stakeholders gain higher levels of performance, resiliency and scalability than can be provided by their internal IT organisations – and at a lower cost. Simplified security operations Simplicity is vital in today’s business environment where everyone is doing more with less. Small teams are tasked with big projects, and technology should be easier to use to allow users to focus on the task at hand, whether it is ensuring a secure environment, better managing operational processes or concentrating on building opportunity. The University of Central Florida is an excellent example of an organisation that invested in HCI to simplify its security operations while improving the safety of their constituents. With the incorporation of this platform, the university consolidated 58 standalone servers and a variety of DVRs that were all running separate software and being separately managed. With a modernised infrastructure built on HCI, IT staff and security personnel centralised and greatly simplified system management, while ensuring video is securely storage and immediately accessible when they need it- particularly in emergency situations. HCI also gave them the ability to scale their infrastructure seamlessly as their surveillance needs expand. We will highlight more of this deployment in the next installment, but in the meantime, consider that HCI is just one of the new IT solutions that can have a positive impact on your business, surveillance investments and data. There are many emerging solutions to consider and evaluate as you seek to modernise your operation. With innovations being introduced on a daily basis, the sky is the limit.
What a year it’s been! 2017 has been a monumental period of product innovation and growth for Pivot3. The company experienced a more-than-50-percent increase in bookings from Q2 to Q3 this year, including a record number of million-dollar orders. We also saw deals supporting multiple use cases more than double, and experienced continued growth in the video surveillance market, driven by new product enhancements and contracts worth more than $1 million. We have also invested in building an influential group of surveillance-focused experts internally, and increased our focus on building strong partnerships with major VMS players, key systems integrators and other aligned-technology providers, such as Iron Mountain and Lenovo. A more robust industry It wasn’t only Pivot3 that had a healthy year; the industry, as a whole, is robust. Investment in technology is growing in markets ranging from public sector organisations, municipalities, gaming and transit agencies — all seeking technology solutions that drive value, increase intelligence and reduce risk. It is the drive for data that propels the video surveillance industry forward. A respected industry thought leader said recently that “data is the modern currency,” and video is the most prominent Big Data application in the world (by far). Those vendors and installers that understand how to help organisations capture, analyse and leverage data will be the ones who secure their future in the marketplace. A respected industry thought leader said recently that “data is the modern currency" Honest predictions Last year, I predicted that cybersecurity would become of greater importance to our market and that prediction was on point. Data security has become the number one concern in the industry, widely because users are moving back to more-trusted brands that focus on implementing cybersecurity protocols into network devices. In the coming year, cybersecurity will continue to be a primary focus — and it must be — for all product vendors, integrators and end-users. The adoption of standards and guidelines around data security for physical security technology will be imperative to ensuring data integrity. An era of evolution Over the past year, deep learning and artificial intelligence have become some of the most quoted buzzwords. Organisations see the value in leveraging these trends to analyse data more efficiently, and because of recent market innovations, we see a real impact an analytics effectiveness. Additionally, we have seen more and more large organisations migrate more of their security function to the cloud. Today, private-cloud architecture is no longer novelty; it is expected, and despite some well-publicised breaches, the public cloud is now considered more secure than some traditional on-site solutions. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises The year to come As 2018 approaches, I expect to see many of these same trends accelerate even further. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises. AI will become more mainstream, and analytics solutions will become more advanced. Overall, we at Pivot3 look forward to another strong growth period and seeing the continued evolution of the market as we swing into another year.
Video. It’s a central part of everyone’s lives — whether it’s streaming content to your home television, sharing your own recorded movies on social media or transforming video into actionable intelligence in the business environment — and the value of video from all aspects and markets in the world continues to expand. Use cases are growing as well: Employee training, student learning evaluations, marketing reviews, drone video capture for real estate sales and customer engagement — the possibilities are endless. In fact, I’m truly surprised by how users are finding new ways to leverage video, ones I haven’t even imagined … yet. Of course, the ever-expanding interest in video content leads to an (important) discussion on video storage, and we can’t discuss storage without talking about the primary concepts that drive efficient, secure and effective video capture: performance, resiliency and reliability. Performance Performance is the single most important aspect of delivering high-quality video. The ability to store large amounts of content without dropping frames, which leads to image quality degradation and video loss, is paramount. System resiliency is also critical to ensure uninterrupted business operations. An airport or a casino can’t simply shut down if their video system fails (not without significant cost, operational disruption or a bunch of unhappy folks), and therefore need to do everything possible to eliminate the risk of downtime and data loss. Resiliency The simple fact is that live and recorded video must be available and accessible at all times, even when hardware fails. System failures — from both storage and video management platforms — are not tolerable because they open the door to increased risks, new vulnerabilities and potential operational interruptions, all of which lead to unacceptable liabilities and risk. Video needs to be protected just as an enterprise would protect corporate and IT data. With that being said, organisations need to turn to solutions proven within the rigorous walls of the IT world. To learn more about how IT is transforming video surveillance, please read my first article in this series. Reliability In today’s environment, video is considered mission-critical in most applications and to be honest, it needs to be! Think about the potential business and security consequences of a situation in which there is no opportunity to review video of an incident or dispute a liability claim. The potential impact of lost video should be evaluated with a risk-based model specific to your organisation. A higher risk of downtime or data loss translates to an overall higher financial risk exposure to the organisation For example, what if lost video or system downtime means your business cannot defend itself against a lawsuit? Unfortunately, the likelihood of this happening increases your organisation’s exposure to risk — a higher risk of downtime or data loss translates to an overall higher financial risk exposure to the organisation. Quite frankly, storage is the most expensive and overlooked component of any video deployment. You have to consider not only the cost of hardware (often the largest upfront cost), but also the cost of software, ongoing licence fees and software updates. You also need to evaluate the cost of the administration and management of the system, a task that often becomes more complex as systems expand over time. Scalability is also a significant requirement because it allows facilities to start small and expand systems as needs, technologies and budgets change over time. It is important to keep these evolving requirements in mind because trust me, in the future, your video system will not be the same scale it is today or tomorrow. Planning for the future Big Data, deep learning and security applications will continue to drive investment in new innovations and the traditional IT storage solutions (from those big brands we all know) will be challenged by the write-intensive nature of video surveillance. Storage platforms that can deliver enterprise-class IT capabilities and support mixed workloads, advanced levels of data protection and high system performance are the future of security operations and IT data centres. There are a myriad of ways to incorporate advanced IT platforms into your video storage infrastructure, allowing you to capitalise on the organisational demands of today while addressing the ever-increasing data-intensive requirements on the horizon.
If I asked you today how your video surveillance environment has changed over the past few years, how would you respond? I bet the answer could include the following options: An increase in the number of cameras The addition of more advanced technologies such as high-definition video, video analytics, 360-degree video devices, cloud-based services and more IT innovations. Demand for more video data to drive business, IT and security initiatives. Modern video surveillance The modernisation of today’s video surveillance technology has changed the way video is being used and enhances the value it brings to an organisation. Now, stakeholders look for ways to glean new business or operational values from security technologies. Such uses include marketing, customer service, operational monitoring and employee training — all of which help show better return on investment. One thing is for certain: video systems never get smaller. One of the big IT analyst firms released a study that indicated that this year, video surveillance is likely to be the biggest Big Data application in the world, generating 15 zettabytes of data this year. Let’s put that into perspective. Most people understand terabytes. 1,000 TB equals one petabyte. 1,000 PB is an exabyte (a massive amount of data). 1,000 exabytes is one zettabyte. Think about that: 15 billion terabytes of new data this year. The next closest application, according to Wikibon, is roughly half that amount. Security directors can no longer tolerate problems that lead to downtime or data loss Trends and demands of video New uses for video drives massive data growth and, at the same exact time, data is more mission critical than ever before. These trends and demands place substantial pressure on server, storage and networking infrastructure — all things that can hinder the value systems can bring. As a result, security directors can no longer tolerate problems that lead to downtime or data loss. As you’re looking at deploying new technology or optimising your existing infrastructure, you need solutions that deliver robust performance, scalability and resiliency. Because video is being used for more and more uses and in more and more places, downtime and data loss have a larger impact on your organisation than ever before, so it’s common to see surveillance now as part of the IT conversation. In fact, video is often owned partially by the IT department or is at least included in IT’s daily operating procedures. This is important to note because the IT world thinks differently about technology than the security world has in the past. However, IT’s mission is very similar to security; with a focus on reducing risk and lowering costs, and being asked to do so with fewer resources. Challenges for traditional physical security One of the most significant challenges for traditional security stakeholders has been learning to speak the language of IT and finding ways to meet the expectations of their IT leaders. Today’s IT departments expect server workloads to be virtualised to lower hardware costs, stronger management and control of a vast array of servers and applications, and better resiliency and scalability. Security infrastructure must adapt to match IT’s expectations of the modern data centre Traditional physical security systems haven’t been compatible with server virtualisation, which quite frankly, it not acceptable as video surveillance consumes an increasing share of data centre resources. Security infrastructure must adapt to match IT’s expectations of the modern data centre. Cost-efficient IT infrastructure Today's IT departments are also in transition as an ever-increasing number of organisations seek to reduce their infrastructure footprints to both save money and become more eco-friendly. And, unlike the systems of old that were isolated on their own networks, today’s security solutions must “play well” with a number of other enterprise technologies that integrators will need to become familiar with. To assist their efforts, IT leaders are turning to trends, such as cloud (public and private), mobility, flash and hyperconverged infrastructure. Regardless of the benefits of these specific trends, it’s all a part of a bigger initiative: a world built on software-based solutions. A software-defined environment removes the need for dedicated, complex and proprietary hardware that required teams of people to manage and replicates it through software on standard off-the-shelf hardware solutions. This approach lowers costs and decreases complexity, while increasing the ability to scale. So, what does this mean in the world of video surveillance? It increases the capacity to adapt to new technology and changes the way stakeholders view the value of video surveillance — and how they use that video today and tomorrow. Over the next decade, analysts predict that the $40 billion storage market will see significant disruption Convergence Of IT And Physical Security We’ve all seen it. There is a significant shift taking place within the security marketplace - we’re finally seeing the results of convergence! – and we’re also experiencing big changes in the traditional storage market as organisations look to store more and more data. Over the next decade, analysts predict that the $40 billion storage market will see significant disruption, with traditional proprietary storage solutions overtaken by software-defined technology. What is even more interesting is that the companies leading this charge are far different from the big brands that IT teams are used to seeing within their data centres. As IT becomes a greater force in the world of security, it is paramount that we all evaluate how these evolving processes and solutions will help organisations exceed their security goals and evolve video surveillance requirements. Understanding how the concepts mentioned above will change your role, your department and your business will allow you to be well-positioned for the future — and the future is bright.
As the whirlwind of 2016 quickly winds down, it is a good opportunity to look back at the significant trends from this year. As predicted, the industry experienced accelerated data growth, the continued convergence of security and IT, and the ever-expanding impact of the Internet of Things (IoT).Overall, 2016 was a good year. IT investments were strong and organisations rapidly adopted new data centre advancements such as hyper converged infrastructure (HCI) to help manage the huge influx of critical data without incurring new major costs.What was most unexpected about the last year was the significant impact of cybersecurity on the IoT. The security of connected devices has been a continued concern, but many were taken by surprise at the extent of the outlying vulnerabilities and how easily hackers can take over the control of devices and gain access to stored data. Luckily, minimal permanent damage was done, but edge device manufacturers and integrators must take significant precautions to prevent this type of event from reoccurring.Cyber and physical security Looking toward 2017, one can expect to see increased scrutiny over very low-cost, private-label or white-box products that may not meet modern data security requirements. Organisations will continue to align internal security departments and processes with IT to address evolving cyber and physical security threats. New technologies, such as deep learning and GPU acceleration, will enable the rise of more reliable, accurate analytics and broader market adoption of these types of technologies. Additionally, one also expects to see the emergence of cloud and hybrid-cloud platforms as viable enterprise video storage alternatives.On the business-front, 2016 was a phenomenal year for Pivot3. They continued to experience record growth and momentum, and most recently increased revenue growth by 105 percent over the same period in Q3 2015, with 67 percent of revenue coming from new customers. They focused on expanding their customer base, and added seasoned executives to help lead the organisation and fuel major growth efforts in 2017. Overall, it is exciting to see the enthusiasm for Pivot3 HCI solutions across multiple use cases and markets, and they’re well primed for further success in 2017. See the full coverage of 2016/2017 Review and Forecast articles here
Video surveillance plays a significant role in any comprehensive security plan, and the value derived from surveillance continues to expand Across the globe, organisations are challenged by a diverse risk landscape and a dynamic operational environment. The safety and security of people, assets and intellectual property are a No. 1 priority, and stakeholders look to gain continuous insight into what is happening at any given time. The ability to identify threats early and efficiently mitigate and investigate events allows an organisation to develop a more proactive stance to security. Video surveillance plays a significant role in any comprehensive security plan, and the value derived from surveillance continues to expand. The advancement of high-resolution video technology dramatically improves the quality of video evidence and demand for information continues to grow. Research firms have found that surveillance data production doubles every 18 months. Additionally, video is expected to account for more than half of the data being generated by the Internet of Things (IoT). New use cases, longer retention times and lower camera costs are driving this data explosion. Surveillance system failures As the value of video increases, it is more susceptible to being lost than ever before. Surveillance system failures can be catastrophic, leaving organisations exposed to increased risks, vulnerabilities, and operational interruptions. When a failure occurs, live or recorded video becomes inaccessible, recording is disabled, and data can be permanently lost. Some industries, such as gaming and government, are governed by standards that dictate the way video is recorded and captured. Recording failures can lead to fines from regulatory agencies, non-compliance with open records laws and even crippling lawsuits. An inability to access video forensically can inhibit closing a case. Modern organisations cannot tolerate downtime or data loss. The security industry has long relied on NVRs and DVRs to host video surveillance implementations, often due to cost and familiarity The security industry has long relied on NVRs and DVRs to host video surveillance implementations, often due to cost and familiarity. NVRs are simple appliances based on Direct Attached Storage (DAS) servers with bundled Video Management Software (VMS). These appliances can be acceptable for small, static applications where data loss and downtime are tolerable, and no future growth is planned. But for most sophisticated security applications, this is not acceptable. Threats to data security Here are the five ways in which NVR-based surveillance systems lead to a higher potential for downtime and video loss: 1. Single points of failure NVRs introduce critical single points of failure. If a box fails, access to live video is lost, recording stops and recorded video is gone — potentially forever. Additionally, appliance or component failures prevent access to live and recorded video and halt real-time recording. VMS failover only partially solves these problems, offering no protection for previously recorded video or integrated applications and requiring costly redundant hardware, software and licensing. 2. Poor manageability Systems with more than one NVR must be managed as multiple systems, which is a very manual and time-consuming process. In fact, IT departments shifted away from DAS in the 1990s to enable all systems to be managed and monitored in one simple, centralised manner. NVRs do not offer this level of streamlined system administration. Also, failures can go unnoticed because boxes have to be monitored individually to ensure performance. 3. Lack of flexibility NVRs cannot scale or access needed resources from other machines inside a larger system. Adding another NVR introduces another stand-alone system, leading to highly inefficient utilisation of system resources. As business and security plans evolve and budgets change, systems must scale compute, storage and bandwidth resources simultaneously to adapt to ever-changing requirements. Hard disks storing video data are three times more likely to fail than those used in non-video applications 4. Inefficient performance Video surveillance is a very write-intensive workload, and direct attached storage is not designed to meet the demanding needs of security applications. DAS systems are intended for read-intensive applications, and because video data is highly variable and unpredictable, NVRs must often be overprovisioned to plan for the worst case scenario. NVRs can perform adequately during ideal conditions, but performance suffers during spikes of video data and degraded system operations, which leads to video loss and image degradation. 5. Fault tolerance Hard disks storing video data are three times more likely to fail than those used in non-video applications. RAID technology developed in the 1970s is not sufficient for protecting against the increased likelihood of multiple simultaneous failures, exposing systems to permanent data loss and severely limited performance during extremely long disk rebuilds. As you can see, organisations that leverage NVRs are placing highly valuable video data into a highly ineffective, underperforming and unreliable basket. These systems do not offer the protection needed to store video for extended periods of time and are not designed to handle the write-intensive needs of surveillance applications. SAN vs. DAS Storage area networks (SAN) offer improved resiliency, efficiency, and scalability vs. DAS because storage resources are used efficiently and the data is better protected Storage area networks (SAN) offer improved resiliency, efficiency, and scalability vs. DAS because storage resources are used efficiently and the data is better protected. SAN infrastructure can also scale from medium-sized solutions to vast multi-petabyte storage systems. But traditional SAN solutions can be expensive and complicated, often requiring teams of highly trained people to manage. Furthermore, most SANs were designed for general-purpose IT applications, and as a result, do not perform well in write-intensive video surveillance environments. The advanced resiliency and efficiency of SAN are now available in a simpler and more cost-efficient form factor optimised for video surveillance applications. Hyper-converged infrastructure (HCI) delivers enterprise-class IT server and SAN storage solutions that are purpose-built for video surveillance environments and in many cases, at a price point competitive with DAS and NVRs. Cost-effective protection Video data is of tremendous value to stakeholders, and therefore, finding cost-effective, scalable and secure ways to protect this information is paramount. IT innovations — the same ones driving the next evolution of the storage market — can improve video storage administration while ensuring sensitive data remains secure, leading to more resilient security and business intelligence efforts. The HCI market is booming — IDC projects that it will grow 94 percent to $1.5 billion by the end of this year — and enterprise leaders are highly motivated to deploy these innovations. With their proven performance and data protection, these technologies will continue to proliferate security and surveillance installations as they allow users to address today’s needs while preparing for the growth of tomorrow.
We in the industry have talked about IT’s growing influence in security technology decision-making for a number of years. This year, we have seen the trend accelerate rapidly. Significant changes are occurring in data centre infrastructure technology, creating major disruption to the large enterprise server and storage providers. This is fundamentally changing the way the security industry thinks about IT. 2015 trend – emergence of hyper-converged infrastructure (HCI) One of the biggest trends to note is the emergence of hyper-converged infrastructure (HCI). HCI greatly reduces data centre costs and complexity by integrating compute, storage and virtualisation resources into a single software-defined solution deployed on COTS server hardware. Pivot3 pioneered HCI – and its predecessor, software-defined storage – to solve unique video surveillance storage challenges. The goal was to provide the benefits of enterprise-class IT infrastructure – performance, resiliency, efficiency, scalability – without the high cost and complexity. Impact of IoT on security market The Internet of Things is also greatly impacting the security and surveillance market. Networked-enabled devices and the need for more actionable data have helped drive increased security spending, even though the overall economy has remained in slow-growth mode for the past few years. Enterprise organisations invested capital cautiously in 2015, but indicators show that 2016 will be the year of technology investments; especially as refresh programmes can no longer wait. These trends are changing the face of the industry, surveillance and security as a whole. Companies who embrace emerging trends by developing IT-friendly solutions and communicating effectively to IT-focused buyers (whose needs can be slightly different than traditional security-focused buyers) will solidify a role as a leader in the market. Pivot3 – solving storage needs for IP video surveillance At Pivot3, we see ourselves as one of these leaders. Our company started out solving a very challenging storage need for IP video surveillance, and we’ve been able to take the lessons learned from surveillance and solve similar challenges in the enterprise, disaster recovery and virtual desktop infrastructure (VDI) markets. We have since brought our knowledge from the IT world back to physical security, helping to close the gap between security and IT and drive new levels of efficiency for customers. Because of this, Pivot3 is experiencing significant growth across our business segments. Convergence of security and IT The convergence between security and IT has been a promise for years. Today, the industry is finally seeing this convergence actually occur, resulting in new use cases that derive new levels of value from security data and technologies. This convergence will accelerate technology advancement and innovation, and will be very exciting to witness in the coming year. See the full coverage of 2015/2016 Review and Forecast articles here
Pivot3, a provider of hyperconverged infrastructure (HCI) solutions, has announced that Charleston International Airport (CHS) has standardised its IT and security infrastructure on Pivot3 hyperconverged solutions. CHS recently marked the completion of an ambitious upgrade project named the Terminal Redevelopment and Improvement Program. The $200-million initiative was designed to modernise and expand the facility to meet increased passenger demand, which jumped nearly 70 percent since 2010. “As the Charleston area continues to grow, the airport seeks new avenues for expansion and operational efficiency,” said Senator Paul G. Campbell Jr., Executive Director and CEO, CHS. “With the Pivot3 platform, the airport can scale quickly as its infrastructure evolves while continuing to protect its IT and security data.” Pivot3 enabled the airport to seamlessly expand its capacity to 250TB of storage The extensive rejuvenation project included a focus on an enhancement of the airport’s data centre, security, surveillance and access control systems. In addition, it incorporated a transition away from a standalone server environment to a hyperconverged infrastructure approach. CHS plans to add additional data centre application workloads on the Pivot3 platform in the future. Enhanced storage capability “It was imperative that we established a standardised infrastructure moving forward,” said Ira Campbell, Director of IT and Security, CHS. “Following an in-depth analysis, it became evident that the airport would benefit from transitioning all of our security and data centre components to run on Pivot3. The ability to consolidate mixed workloads onto one infrastructure as well as the technology’s superior scalability and resilience were the primary reasons we selected Pivot3.” Pivot3 aggregates storage, compute, networking and virtualisation resources from multiple servers into a single unified platform that maximises performance and storage capacity utilisation. Designed for demanding, data-intensive workloads, Pivot3 enabled the airport to seamlessly expand its capacity to 250TB of storage. Pivot3 is proud to be a trusted partner to CHS while helping the organisation reduce risk" Simplifying IT infrastructure Pivot3’s industry-leading resilience is critical in airport environments where system uptime and data availability are of paramount importance. If multiple hardware failures occur, servers remain online, and previously recorded data is protected and accessible. Total cost of operations is reduced through the consolidation of servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface without the need for specialised IT skills. “Charleston International Airport’s successful deployment of Pivot3 demonstrates the positive impact hyperconverged platforms deliver to mission-critical environments,” said Brandon Reich, Surveillance Practice Leader, Pivot3. “Today’s security and IT applications generate massive amounts of sensitive data, and capturing, protecting and mobilising this data is absolutely necessary for modern airports. Pivot3 is proud to be a trusted partner to CHS while helping the organisation reduce risk, lower costs and simplify their IT infrastructure even as more workloads are added.”
SourceSecurity.com’s Expert Panel covered a lot of ground in 2017 about a variety of topics resonating in the security market. The most-read Roundtable discussion in 2017 was about a familiar and ongoing debate: What is an open system? Other hot topics that made the Top-10 list of Roundtable discussions included smartphones, buzzwords, standards and product life cycles. Here is a listing of our Top 10 Expert Panel Roundtable discussions posted in 2017, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2017 (including the quotable panelists named below). 1. What is an open system? Is there a consensus in the marketplace on the definition of “open?” "Being truly ‘open’ means going above and beyond when designing your product line, keeping in mind the ability for end-users to easily interface your product with other open-platform solutions. That's why offering an open-platform design must be coupled with the ability to provide exceptional support through training, follow-up and innovation as they are brought to market.” [Mitchell Kane] 2. How are smartphones impacting the physical security market? "The security protocols on phones (such as fingerprint readers and encryption) have become some of the strongest available to consumers and are regularly used to access essential services such as banking. With this level of trust and user convenience from mobile device security, it makes sense to produce physical security systems that also take advantage of it." [John Davies] TDSi's John Davies says it makes sense to produce physical security systems that take advantage of trust and user convenience on mobile devices 3. What is the biggest missed opportunity of security systems integration? "Integrators need to be more savvy on how they can meet their customers’ IT and surveillance goals, from both a technology and services perspective. Being knowledgeable about new innovations can help integrators sell infrastructure, keeping that piece of business rather than losing server sales to a customer’s internal IT department. Integrators are tasked with ensuring surveillance customers can benefit from best practices, and solutions proven in the world of IT offer significant benefit." [Brandon Reich] 4. What are the security industry’s newest buzzwords? "End-to-End Security is a buzzword reflecting how cyber threats are increasing and the importance of ‘the security of security systems,’ especially for companies operating in the critical national infrastructure. Convergence has been a ‘hot topic’ for years, but has it really happened? In order to create true end-to-end security solutions, IT and physical security best practices need to be combined." [Arjan Bouter] End-to-End Security is a buzzword reflecting how cyber threats are increasing, says Arjan Bouter 5. What technology will have the greatest impact in the second half of 2017? "Cloud-hosted access control is poised to have the biggest impact in the second half of 2017. Organisations are looking to decentralise IT management and eliminate the need for overhead costs in hardware infrastructure and ongoing maintenance costs. This decentralisation is driving them to migrate their day-to-day systems to the cloud, and access control is no exception." [Melissa Stenger] 6. Are mergers and acquisitions good or bad for the security industry? “On the ‘pro’ side, consolidation is good for pulling together a fractured market, as vendors try to gain market share by acquiring solutions they may not otherwise have in their portfolio. On the ‘con’ side, however, consolidation restricts or limits innovation as the merged vendors strive to develop end-to-end solutions that reduce customer choices" [Reinier Tuinzing] 7. What new standards are needed in the security marketplace? "Do we need that many new standards, or do we need the industry to embrace the standards that are already in place? I believe that current standards like ONVIF and OSDP are sufficient in what they offer the industry. Members of the security industry just need to start thinking outside the box and realise that it is with standards in place that real industry growth can occur." [Per Björkdahl] 8. What will be the big news at ISC West 2017? "Security solutions that capture greater data and utilise analytics to transform the data into useful information, or business intelligence, will be the talk of the industry at ISC West this year. It’s not just about surveillance or access control anymore, but about who can best assess the end user’s interests and deliver an end-to-end solution that provides a value beyond the technology and a service beyond security.” [Richard Brent] When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality, says Oncam's Jumbi Edulbehram 9. Why should a customer continue to buy “premium” surveillance cameras? "When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality (requiring costly site visits and replacements), susceptibility to cyber-attacks, or lower quality of integrations with video management systems. Customers should certainly be prudent buyers and make sure that they’re paying for actual reliability/features/functionality rather than simply paying a premium for a brand-name product. When functionality and reliability are important, it always makes sense to ‘buy nice, not twice.’ [Jumbi Edulbehram] 10. What is an acceptable life cycle for a physical security system? "The answer to this question clearly depends on the seat you sit in. Manufacturers, integrators, distributors, consultants and engineers all have extremely different perspectives on this question. As a manufacturer, we design systems to have a lifecycle between 5 and 7 years." [Robert Lydic]
Arecont Vision®, a provider of IP-based megapixel camera technology, has announced that Pivot3, a provider of hyperconverged infrastructure (HCI) solutions, has joined the Arecont Vision Technology Partner Program™. Pivot3 HCI products will be available for testing in the Arecont Vision MegaLab™ integration facility as part of the new agreement. Pivot3 data-intensive hardware “We are honoured to be part of the Arecont Vision Technology Partner Program,” said Brandon Reich, General Manager, Surveillance, Pivot3. “With Arecont Vision, we gain a strong partner within the megapixel video surveillance industry that produces high quality camera products that will benefit Pivot3’s rapidly growing customer base.” Pivot3 HCI platforms offer software-defined SAN storage and server infrastructure in cost-effective, off-the-shelf server hardware. Purpose-built for demanding, data-intensive video surveillance workloads, Pivot3 provides the highest levels of performance, resiliency, and availability so that critical video surveillance data is stored without loss, protected from any failures, and always available when and where it is needed most. Modern video surveillance “The innovations that Pivot3 has developed around hyperconvergence complement the megapixel camera technology leadership that Arecont Vision continues to bring to the surveillance industry,” said Jeff Whitney, Vice President, Marketing, Arecont Vision. “Our customers benefit from innovative, reliable, and cyber-secure Arecont Vision cameras, and are often in a search for a resilient, enterprise-class infrastructure to get the most out of their video surveillance systems. Like Arecont Vision, Pivot3 is easy to manage, simple to deploy and scale, and is designed to handle the requirements of today’s modern video surveillance technologies.” Through the Arecont Vision Technology Partner Program, sales, development, and support contacts are established between the two companies to better engage with end user customers and systems integrators, validate integration of new features and technologies, and quickly resolve any customer support issues.
The demand for video surveillance is increasing as risks evolve and organisations elevate the value of video data Pivot3, a provider of hyper-converged infrastructure solutions, announced enhancements to its surveillance series that provide customers with additional flexibility in how to apply hyper-converged infrastructure (HCI) in security and video surveillance applications. The investments in the company’s core technology platforms allow customers to take HCI beyond traditional use cases, such as video storage, and expand capabilities through the layering of other security, IT, and business systems. Increasing demand for video surveillance The demand for video surveillance is increasing as risks evolve and organisations elevate the value of video data, leveraging it for uses beyond traditional security and safety applications. As a provider of video surveillance storage solutions, Pivot3 continues to apply the latest innovations in IT and data centre technology specifically for video surveillance applications, allowing users to better capture, store and protect data. Investment in significant upgrades to the Pivot3 hyper-converged platform ensures enhanced performance, scale and resiliency amid a growing demand for flexibility to combine mixed workloads onto a single platform. “Pivot3 HCI solutions are a core component of our video surveillance strategy because they protect our video investment, ensure system uptime, and reduce risk by eliminating system downtime and data loss,” said Philip Lisk, Chief Information Officer, Bergen County Sheriff’s Office. “Pivot3 has exceeded our expectations with its innovation and support, along with its unique architecture that has simplified management and scalability.”Recent significant enhancements Over the past year, significant enhancements have added to the Pivot3 surveillance series including: Multi-application capability that consolidates video recorders and other application workloads such as access control, visitor management and video analytics on the Pivot3 platform. The ability to run multiple workloads on the same hyper-converged system allows for reduced complexity, increased flexibility, and simplified management. The addition of Broadwell CPU platforms to support increasingly performance-intensive applications, as well as multi-petabyte storage solutions. “Pivot3 has exceeded our expectations with its innovation and support” Performance is the single most important aspect of delivering high-quality video. The newest version of Pivot3 software is optimised to improve performance and ingest rate by as much as 50 percent The Pivot3 Virtual Security Server, a unique solution for mobilising fully functional client workstations in a secure, bandwidth-efficient manner, now incorporates NVIDIA M60 and M10 GPUs for stronger video decode performance and higher camera density. The platform has been further enhanced with the addition of VMWare Horizon View 7, which provides users secure access to virtual desktops and applications in a single digital workspace. Broader platform offerings with the qualification of the Lenovo System x3650 2U rack server. Edge Office, a HCI solution optimised for small-to-medium sized businesses (SMB) and remote and branch offices (ROBO), helps companies consolidate security along with other applications by delivering compute, storage, and networking into a simple and affordable HCI solution. Investing in innovative technology “We have been a leader in the surveillance market for nearly a decade and we continue to invest in innovative technology and focus on our commitment to solve our customers’ most complex business problems,” said Brandon Reich, General Manager, Surveillance, Pivot3. “The expertise and recognition we have built in IT helps us deliver hyper-converged platforms that bring a wide range of benefits to surveillance workloads. Customers are beginning to experience the simplicity and cost efficiency of this approach, and we are well positioned to help them further evolve their security infrastructures.”Pivot3’s investments in its surveillance solutions follows a strong year in which the company experienced an 84-percent increase in total revenue over 2015 – including a more than 200-percent increase in Q4 2016 from Q4 2015 – and significant deals secured across federal, healthcare and education customers.To learn why customers in 53 countries rely on Pivot3 to protect their data, visit the company at the upcoming ISC West Conference and Expo in Las Vegas at booth #30087.
OnCampus brings together educators, administrators, and thought leaders to address the state of security on campuses The upcoming OnCampus Educational Seminar in Chicago is pleased to announce that Jeff Bean, Senior Consultant at RETA Security and Founder of Act on Bullying, Inc., will be the event’s featured speaker, and will talk about how administrators can address today’s most complex school security challenges, mitigate risk and assess a school’s security posture. Specialised in school safety Bean has more than 17 years of law enforcement experience with a police department in the suburbs of Chicago. Over the course of his career, he has specialised in school safety. He is currently assigned as the primary Liaison Officer for a school district of more than 2,500 students, and is the Resource Officer at the junior high school. Bean is also the Founder and President of Act on Bullying, Inc. Established in 2012, Act on Bullying focuses on mitigating the effects of bullying, cyber-bullying and improving school safety. In this capacity, he has presented at several state-wide conferences sponsored by the Illinois Principal’s Association, the Illinois Association of School Social Workers and the Illinois Parent Teacher Association. Safety and security on educational campuses OnCampus is a campaign dedicated to the ongoing discussion of the state of safety and security in the education market. OnCampus brings together educators, administrators, and thought leaders to address the state of security on campuses and how to address concerns related to the threats that schools face. Laura Stepanek, Editor and Associate Publisher of SDM Magazine will moderate the discussion. Additional speakers include Jumbi Edulbehram, Regional President, Americas, for Oncam, and Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Save
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions. The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Internationally, there is a patchwork of health privacy laws around the world, from Argentina to Uruguay, including laws throughout Europe, Central Asia and Australia. Role of physical security in safeguarding data Physical security systems can play a big role in helping to keep patient information safe and private, as required by various laws. For example, AMAG has developed new capabilities within its Symmetry family of products that allow healthcare institutes to demonstrate their compliance with HIPAA. Compliance reporting is a key area and has been a focus for AMAG, says Dave Ella, Vice President of Product Marketing, AMAG Technology. Hospitals and healthcare facilities install AMAG’s Symmetry access control system and Symmetry CompleteView Video Management to manage and control access and provide HIPAA compliance throughout their buildings and campuses. Security plan policies and procedures need to protect a healthcare facility, says Ella. Automatically reviewing access permissions for employees, contractors and visitors on a regular basis is a key aspect of the plan, and AMAG’s Symmetry CONNECT product is designed for that purpose. Also, capabilities within the system make documentation of adds and changes to the security system more straightforward. They include the ability to add drawings, documents and notes to any device within the system. Demanding regulatory environment Legislation like HIPAA, which establishes U.S. standards for privacy and security, impacts hospital access control policies and procedures, says Sheila Loy, Director Healthcare Strategies, North America, HID Global. In fact, HIPAA is just one element in a demanding regulatory environment. The need to comply is complicated in hospitals by security threats in an environment with high traffic volumes and complex staffing requirements, Loy adds. For instance, in California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines. Today’s access controlplatforms enable hospitals toimprove risk management andcomply with new legislationor regulatory requirements Often, hospital administrators must also follow federal guidelines established by the Centers for Medicare and Medicaid Services (CMS) that, at times, conflict with state rules and result in fines. Other entities that set security guidelines include the Joint Commission accreditation and certification body, which has oversight for physical building security, water, safety, fire, and other security processes; and the Det Norske Veritas (DNV), an independent foundation that works with healthcare authorities and providers to manage risk and improve healthcare delivery. Today’s access control platforms enable hospitals to improve risk management and comply with new legislation or regulatory requirements. For instance, HIPAA imposes strict requirements for accessing medical records, which may necessitate the use of a smart card to enter secure areas or to access IT networks that store patient information. HID Global offers comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. The company’s solutions: provide secure access to healthcare facilities and supplies; enable hospitals to identify and manage hospital visitors; provide electronic audit trails to protect patients and staff; ensure HIPAA compliance for patient records; and enable organisations to leverage existing access control cards for additional services to offer convenience and create operational efficiencies. Need for versatile authentication platform Health data is at least as valuable as financial data in the online banking industry, where a layered system approach is used to ensure that appropriate risk mitigation levels can be applied, says Loy. Even though patients don’t access healthcare information as frequently as do online banking customers, and aren’t protected by the same regulatory compliance requirements, they can benefit from the same multi-layered authentication mechanisms, both inside and outside the hospital. Healthcare organisations need a versatile authentication platform with real-time threat detection capabilities in order to effectively implement the critical five layers of security including user authentication, device authentication, transaction authentication with pattern-based intelligence, browser protection, and application security, says Loy. With video surveillance, cameras must be positioned in such a way that they don't violate HIPAA laws Access control systems can be used to help protect access to patient records and other controlled materials, adds Robert Laughlin, President, Galaxy Control Systems. By using higher-security credentials for access control readers, such as biometrics, medical facilities can increase their confidence levels that they are only providing access to authorised individuals and creating an audit trail for reporting or review. Galaxy access control systems can be integrated with a wide range of readers, including high security biometric readers. Ensuring privacy with video surveillance Video systems are also impacted by HIPAA in the United States and by similar privacy legislation around the world. When a physical security system is installed in a healthcare environment, patients’ privacy must be protected according to HIPAA’s specific rules, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. A patient’s PII – or personally identifiable information – must be protected. PII is any information that can be used to uniquely identify, contact or locate an individual, or that can be used with other sources to uniquely identify a person. With video surveillance, cameras must be positioned in such a way that they don’t violate HIPAA laws, says Ouellette. If a camera is pointed to a computer screen or something else that contains a patient’s PII, there must be an option to draw a privacy window within the frame so that a patient’s sensitive information isn’t easily accessed or compromised. HIPAA and similarrequirements can indirectlyimpact video systems inways not thought of beforethe advent of megapixel surveillance cameras Challenge of megapixel cameras Furthermore, the use of megapixel cameras can increase the challenge. HIPAA and similar requirements can indirectly impact video systems in ways not thought of before the advent of megapixel surveillance cameras, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. On one hand, video surveillance systems are more effective than ever at protecting medical records storage and access to other confidential information. On the other hand, it is now equally important to consider the field of view of a high-megapixel camera, says Whitney. A camera placed over a cashier may yield images with discernible credit card numbers of a screen within the field of view, of documents, or of the credit card itself. Medical records may similarly be picked up in detail by a high megapixel camera. Therefore, it is necessary to ensure that the integrator selected to install a video surveillance system understand the objective of each area of coverage, and what should not be included. Integrated security systems aid faster compliance Faced with a number of local, state and national regulatory guidelines, security directors within healthcare facilities must be able to improve hospital security and insulate the organisation from potential liability claims, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric. “That means implementing a surveillance system that allows multiagency cooperation and response,” he says. “Keeping all of this in mind, having a video surveillance system that integrates with the necessary emergency and fire alarm systems, access control and other systems can promote an institution’s compliance with regulatory agencies by providing proof that the organisation’s assets are safe and secured.” Finally, there is the issue of access to video. In today’s regulation-focused market, healthcare organisations must strictly control who has access to video, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Servers and storage are typically easier to secure because these devices are traditionally deployed in controlled locations, sometimes on closed networks and often under the supervision of IT. Client access is more difficult to control – security personnel, management and even first responders need access to video, and their devices are typically unsecured. This can translate into a potential HIPAA violation, especially if data is access by unauthorised people. Read Part 10 of our Security in Healthcare series here Save Save Save
Part 3 of our Security in Healthcare series Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities Video is a major component of most hospital and healthcare security systems. Among the big video trends are greater integration of video with other systems, and increased use of higher-megapixel cameras and 180-degree and 360-degree-view cameras to monitor larger areas. Variety of video applications Arecont Vision is seeing a growing number of video applications for healthcare providers. Commonly protected with Arecont Vision megapixel surveillance cameras, integrated with a video management system or a network video recorder of the customer’s choice, is coverage of: Entrances and exists to buildings, grounds, parking structures, car parks, and facilities Office areas, emergency rooms, nursing stations, treatment centers, clinics, operating rooms, procedure rooms, operating rooms, morgues, patient wards Pharmacies, drug storage areas, records storage, store rooms, laundry Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits, and other litigation and compliance Perimeter, parking surveillance and license plate recognition Facial recognition, people counting, movement monitoring Access control and staff identification Visitor, patient, and staff safety Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities. “Due to the resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results,” says Paul M. Sarnese, System Safety Direct, Virtua Health in New Jersey. “The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua.” Addressing accountability Sacred Health Health System, Pensacola, Florida, uses Arecont Vision megapixel cameras as part of a video surveillance system to look for recorded video of suspicious persons after a description is given, says Michael J. Matroni, Emergency Preparedness and Security Manager, “We are also using it to review slip-and-fall complaints, and to address issues of employee accountability.” “Arecont Vision cameras more than satisfy our requirements for image quality,” says Lai Voon Hon, General Director of Hoa Lam-Sangri-La, a high-tech healthcare park in Vietnam. “The system is working very well for us.” The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high-tech medical equipment and a professional medical staff. “Our new video surveillance system is an important element of that environment,” says Lai Voon Hon. Hospitals and healthcare facilities that have multiple sites and locations can benefit from centralising all video on a single platform Centralising video onto a single platform One Pelco customer is the University of Arizona Medical Center – South Campus (UAMC South Campus). When adding a new behavioural health hospital tower, UAMC South Campus sought to migrate and expand its existing analogue video surveillance system to an IP system that would allow the capabilities of multisite monitoring. Using Pelco’s Endura IP video management system (VMS) with NSM5200 network video recorders, the hospital system was able to centralised all video onto a single platform while allowing several operators to simultaneously look for and view video of daily events. In addition, more than 150 Sarix and Sarix with SureVision technology IP cameras were deployed throughout the new tower, emergency room and most entrances and exits. The open platform concept that Pelco offers can help ensure that existing technology can be incorporated when adding onto existing infrastructure Other hospitals and healthcare facilities that have multiple sites and locations can benefit from the kind of technology used at UAMC South Campus – especially using the latest VMS technology VideoXpert and Pelco’s latest IP camera technology, Optera, which offers 180-, 270- and 360-degree views. Additionally, the open platform concept that Pelco offers can help ensure that existing technology can be incorporated when building a new building or adding onto existing infrastructure. Pelco by Schneider Electric is focused on the development of video surveillance and security solutions for enterprise-class organisations that allow users to make real-time, business-enabling decisions. Pelco offers video management platforms, industry-leading IP cameras and accessories, and other video security products and open platform systems that healthcare facilities require to bring multiple sites and locations together into a single, holistic approach to security. Multi-sensor panoramic view cameras When Arecont Vision pioneered multi-sensor megapixel cameras with their first offerings in 2006, they were alone in the market in presenting these in place of pan-tilt-zooms (PTZs) and multiple individual cameras Over the past year, the industry has seen many legacy camera vendors offer their own 180- or 360- multi-sensor cameras to try and gain market traction. “Competition is always good, and our own fifth generation SurroundVideo cameras will get even better as a result,” says Jeff Whitney, Arecont Vision’s Vice President of Marketing. “Most importantly for healthcare overall, users will see affordable solutions that don’t require multiple analogue cameras and PTZs as in the past, and understanding of the benefits of multi-sensor cameras will accelerate. PTZs are a legacy technology just as analogue cameras and fisheye lenses are in many situations.” "Most importantly for healthcare overall, users will see affordable solutions that don’t require multiple analogue cameras and PTZs as in the past" Multi-sensor megapixel camera technology is the way of the future to keep costs down, reduce the numbers of cameras required, shrink maintenance costs, and improve quality and video coverage for healthcare, says Whitney. Pelco is also seeing an increase in use of 180-, 270- and 360-degree camera technology to cover a larger area, such as a large waiting room or corridor, or a parking garage. The technology in these cameras allow users to pan, tilt and zoom virtually within the picture to pinpoint an incident in real-time or retrospectively. Additionally, there is a significant uptick in violence within healthcare facilities, so it’s imperative that a comprehensive video surveillance system is in place to help identify potential problem areas or threats to the safety and security of patients, healthcare workers, visitors and staff of these large facilities. This can be done through open platform technology that works seamlessly with other cameras, video management systems, alarm monitoring systems and access control, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric. 360-degree analytics Jumbi Edulbehram, Regional President, Americas, Oncam, also expects 360-degree cameras to expand their uses in the healthcare realm. “Another major development will be the use of analytics, built into the 360-degree cameras, being used to help monitor traffic patterns, streamline hospital operations, increase response times and provide overall, general business intelligence for hospital administrators on ways they can improve operations and management of these facilities,” says Edulbehram. “Using analytics, the possibilities are nearly endless for how patients, staff and visitors can be better served.” A role that is sometimes overlooked is the growing importance of mobility for security officers in the healthcare vertical. “These facilities – more than ever – need to find ways to deploy effective, yet cost-aware, solutions to protect critical assets, staff, visitors and patients,” says Edulbehram. “Remote monitoring has become mainstream, and mobile applications are growing in popularity because they enable users to fully experience surveillance through 360 degrees, in full high definition from a smartphone or tablet.” The ability of officers to remain mobile while also accessing video on the go offers new flexibility that is critical to the success of any security solution, he says. There is a wealth of untapped information within the departments and offices of hospital perimeters that can be analysed to improve security strategy Expanding how video is used in healthcare With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Additionally, IT innovations will drive continued technology investment – hyperconvergence and virtual desktop infrastructure (VDI) deliver new levels of cost saving and opportunities for efficiencies, he says. For example, a VDI environment can automatically lock users out of a device after three minutes of inactivity or if they have swiped into a different workstation. Additionally, VDI drives mobility, allowing medical staff to roam from environment to environment to improve patient care and hospital operations. Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims As in hospitals and healthcare facilities, the world of video analytics is gaining ground in vertical markets such as retail, government and corporate enterprise applications, says Steve Birkmeier, VP of Sales and Business Development, Arteco. “There is a wealth of untapped information within the many departments and offices of hospital perimeters that can be analysed to improve security strategy in the future,” he says. Video event management software Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare as well, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. “At Tyco Security Products, we are making smart solutions that use native analytics and intelligence to help security operators determine when they need to record video and have that top quality image. It’s a cost-effective way to use high-resolution imaging,” he says. Read Part 4 of our Security in Healthcare series here
Event brings end users, integrators and technology partners together to discuss the surveillance and security needs of educational institutions Oncam, a provider of 360-degree video capture and business intelligence technology, announced that it will partner with Pivot3, a innovator in the development of hyper-converged infrastructure (HCI) solutions, to host the second in its series of education security symposiums aimed at creating a dialogue about the risks that today’s educational facilities face. The event, titled “OnCampus,” will take place from 10 a.m. to 2 p.m. Wednesday, Aug. 31, at Offsite in Chicago. The open, welcoming nature of today’s educational facilities poses significant threats to the safety and security of students, faculty and staff, leaving every tier of the community – from parents to police departments to school administrators – anxious to find better protection. The OnCampus educational symposium brings manufacturers, consultants, technology partners and systems integrators together to discuss the evolution, improvement and future of the education security market. Two components The OnCampus symposium includes two components. The first explores the challenges the education end user faces in today's environment where campuses are increasingly becoming the targets of evolving physical threats. The second focuses on the efforts of technology partners to bring integrated solutions to these campuses, and how these strategic partnerships can leverage the latest in video surveillance, analytics and other security technologies to aid in investigations and proactively keep students safe. “We’re excited to partner with Oncam in this endeavour to bring more awareness to the security challenges educational institutions face. With a growing focus on increasing surveillance deployments to provide safe and secure places to grow and learn, we are eager to help drive the conversation around how the industry can help support stronger security postures across the education sector,” said Brandon Reich, senior director of surveillance solutions, Pivot3. “Pivot3 is uniquely able to offer these institutions system resiliency and data protection for their video needs, which are paramount to providing security and peace-of-mind to all parties involved.” “This series of events has shown us how important the security posture of a school can be – whether it’s as small as a rural elementary school or a large, widely dispersed university,” said Jumbi Edulbehram, regional president, Americas, Oncam. “Alongside Pivot3, we want to start a dialogue about how security manufacturers, integrators and consultants can best meet those unique needs with comprehensive solutions that keep ROI, scalability and efficiency at the forefront. This event is one way to spark the conversation and offer attendees a chance to add to the discussion.”
Part 2 of our Security in Healthcare series The future is digital, and analogue systems are a thing of the past – or are they? The fact is, in the healthcare vertical at least, we may still have a way to go before the full potential of IP-based systems is realised. Obstacles include a lack of funding and the challenge of sharing IP bandwidth with other healthcare technologies. Bandwidth competition While many hospitals have invested significantly in IP systems, one challenge is bandwidth: Security and video systems often have to compete for bandwidth with other now-IT-driven systems in healthcare facilities, such medical records systems, x-ray systems and magnetic resonance imaging (MRI) systems. Security departments may not be the highest priority when allotting bandwidth, given they are competing with medical devices and systems that generate revenue. As a video company that serves the healthcare vertical, Pelco by Schneider Electric sees progress on the transition from analogue to IP video surveillance devices, but there are still a large number of healthcare facilities that do not have the necessary funds to convert completely to an IP-heavy infrastructure. A big advantage of these facilities making the transition to IP is that users can access real-time video at any time from any computer, anywhere, says Kyle Cusson, Business Development Manager, Healthcare, Pelco. “This is immensely important for information security requirements and disaster recovery,” he says. With analogue, the information gathered is physically tethered to the camera and DVR. However, there are hybrid solutions – such as encoders that convert analogue to IP – that exist and allow facilities to capitalise on existing investments for the time being. IP to gain ground soon “Over the next five years, we will definitely see a massive shift to IP solutions because they are becoming more cost-effective to deploy and are delivering superior video quality and flexibility to users,” says Cusson. The transition isn’t always all-or-nothing. It is not uncommon for healthcare providers to depend upon outdated, analogue-based video systems with limited capabilities while providing surveillance of a large facility, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. “The transition happens after a major incident or awareness of new risks and challenges that the existing systems cannot address,” he adds. “That’s when surveillance technology is often moved from inadequate analogue systems to IP megapixel surveillance cameras.” A big advantage of healthcare facilities making the transition to IP is easy access ofreal-time video any time from any computer Arecont Vision SurroundVideo Arecont Vision, a provider of video to the healthcare market, delivers megapixel surveillance cameras that reduce the cost of surveillance while increasing video coverage, improving aesthetics, and delivering high-definition (HD) video. Customers are able to continue to get value from their existing analogue systems in some cases, while supplementing them with modern digital network-based video surveillance systems until existing systems reach their end of life, Whitney says. The network-based system can then replace the legacy analogue system fully. Whitney notes that Arecont Vision’s SurroundVideo multi-sensor megapixel cameras replace multiple PTZs and fixed cameras while providing improved video coverage at a lower cost, and the system is less intrusive than the analogue systems they replace. “In new projects, most customers already have chosen to deploy IP network surveillance camera technology and gain all of the benefits and improved security immediately,” says Whitney. Cost-to-benefit analysis “We have seen the transition from analogue to IP become most complete in regards to display, with digital monitors almost completely replacing analogue monitors,” says Jumbi Edulbehram, Regional President, Americas, Oncam, which provides a broad range of 360-degree fisheye cameras and integration software to the healthcare vertical. “That’s where it really ends.” He says many hospitals and healthcare facilities have found the idea of an IP transition both cost-prohibitive and difficult to deploy. There has been some investment in relatively inexpensive decoders, which convert analogue to IP. “Cost is definitely a factor in the resistance we’re seeing in these facilities, but as the technology is developed further, that will help drive the cost down,” says Edulbehram. New adoptions take time, and there will be a long period when different technologies co-exist, says Robert Laughlin, President, Galaxy Control Systems, which provides access control systems ranging from single-door systems up to multi-site enterprise-level integrated systems. For this reason, it will continue to be essential that new software and systems are backwards-compatible with the existing equipment in place within organisations. Users need to be able to upgrade in a way that fits with both their security needs and their budgetary limitations. Access control systems such as Galaxy’s will continue to be integrated with a range of systems, and there is no one-size-fits-all solution to every access need, Laughlin says. New adoptions take time, and there will be a long period when differenttechnologies co-exist in the healthcare market Networked physical access control system Many healthcare institutions also want a path to IP-based physical access control system (PACS) solutions that are easier to operate, and that simplify expansion, customisation and integration with other solutions that can share the same network, says Sheila Loy, Director Healthcare Strategies, North America, HID Global, provider of comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. Networked access control simplifies infrastructure enhancements and modifications because hardware platforms aren’t tied to proprietary software, she notes. It’s also easier to add wireless locksets that connect with the online access control system, thus reducing wiring costs and eliminating the problems of easy-to-lose keys while providing near-online and near-real-time control of the opening. IP-based solutions also provide a single, integrated system for combining security, access control, video surveillance and incident response, perimeter detection and alarm monitoring systems. Hospitals can invest in a single, unified IP network, and logically control multiple technologies that previously co-existed only on a physical level. Plus, they can leverage their existing credential investment to seamlessly add logical access control for network log-on, and achieve a full interoperable, multi-layered security solution across company networks, systems and facilities. Analogue or IP debate – a thing of the past? "We will not only continue to seemore security devices on thenetwork, but we will also start tosee more cutting-edge medicaltechnology and equipment thatis network-capable" Other manufacturers see analogue in the healthcare vertical as largely a thing of the past. Camera technology has advanced so far and so fast that the analogue or IP debate is really a thing of the past, says Dave Ella, AMAG Technology’s Vice President of Product Marketing. “The question now is how quickly budgets will allow for the transition to newer technology,” Ella says. Hospitals benefit from higher resolutions (available with IP cameras), which can identify individuals and license plate numbers. Almost all AMAG healthcare customers are integrating their video to their access control system, which vastly speeds up response to security incidents as they unfold. Brandon Reich, Senior Director of Surveillance Solutions, Pivot3, agrees. Today, virtually all new installations are IP, he says. There are a number of organisations that still deploy analogue into large installed bases, though most have converted to IP by this point. In some cases, the rise of HD analogue video has extended the usable life of installed analogue systems, but by 2020, Reich expects the market to be vast majority IP. Pivot3 hyper-converged infrastructure (HCI) solutions for video surveillance provide a high level of protection against liabilities related to lost video. The future belongs to network-capable medical technology “In the security industry, we have seen the transition from analogue to IP systems take place over the course of several years, and it is debatable whether or not that transition is complete,” says Steve Birkmeier, VP of Sales and Business Development, Arteco. “Similarly, within the next few years, we will not only continue to see more security devices on the network, but we will also start to see more cutting-edge medical technology and equipment that is network-capable.” Securing the security devices Birkmeier says this is a burgeoning topic of discussion within the larger conversation about where the internet of Things (IoT) is leading us. However, it also leads to some interesting questions, such as: How will we secure these “wired” devices through the network? Will new compliance standards or regulations have to be put in place? What kind of failover strategy or reliability factors can these life-saving devices guarantee for vulnerable patients if the network goes down? “Taking all these questions into consideration, it is imperative that we continue to invest in IT-centric access control solutions and open up integration opportunities with these technologies to ensure the security of patients, corporate and patient data, hospital staff and equipment,” says Birkmeier. Read Part 3 of our Security in Healthcare series here