A clear definition of your security requirements is at the forefront of successfully deploying and using your system. This includes defining the characteristics of your environment and potential vulnerabilities.

Intrusion Security

An intrusion security system should be part and parcel of an overall security and loss prevention plan. Intruders seek out sites that offer high rewards with low risk of being caught. The “success” of the intruder’s activity is dependent upon such factors as time, detection, lights and noise.

Access Control

The sophistication of today’s multi-faceted access control systems enables integration with intrusion security and video surveillance systems. Together these integrated systems can help control the movement of people and assets.

Adequate planning is critical to the success of your system. To ensure compatibility with your existing IT infrastructure and any new components, collaboration with your IT staff is highly recommended. This will aid in deploying and maintaining a functioning, reliable system.

Video Surveillance

Either analog, IP based, or hybrid video surveillance systems are available. If you are starting with a new system, an IP solution gives you the most options and provides the potential for the best quality results.

Considerations for a successful system include:

  • Bandwidth

Your network may already have the required bandwidth. However, a network assessment is an important part of the planning process. Factors to consider include the type and number of cameras required, internal network parameters, and internet bandwidth.

  • Router

An appropriate internet router is required for remote viewing and system access. This may include a wireless component to complement any wireless access points for connecting with wireless cameras and viewing devices.

  • Switch(s)

A network switch or switches with Power over Ethernet (PoE) will reduce the need for locally powered cameras.

  • Computer

A suitable computer is required to manage the system and provide control for the cameras, recording and monitoring.

  • Viewing

Provide for both on-site and remote viewing of cameras. Prominently displayed monitors offer an effective deterrent.

  • Storage

Video storage requirements are dependent upon the number of cameras, resolution of the video, and how long the video files need to be kept. Using event-based recording such as motion detection can effectively reduce storage requirements.

security2

Download a complete copy of our FREE Business Technology Hints & Tips when you opt in here to our mailing list. www.nutecelectrotel.com

We respect your email privacy and you may opt out at any time.

About Dennis Turner