IP or Analog surveillance, critical choice but should make financial sense

"Not everyone likes chocolate ice cream, that is why ice cream parlors carry many flavors but all share common delivery methods cup or cone. It seems in the surveillance market there is a push to IP cameras and Network Video Recorders (NVR), evolving from the tried and tested CCTV analog cameras and Digital Video Recorders (DVR)." Says George Choge the director of Basesys Solution Ltd.

Choge says IP cameras and NVR's offer advanced benefits, higher resolution through megapixel cameras, built in recorders, and more at a minimum price increase. "What really drives these decisions are the applications and topology, some customers need several cameras in an office environment, some may need megapixel cameras for outdoor use to cover large areas, and get signal broadcasted back with a wireless bridge or cellular modem". These are everyday challenges customers face.

To solve these challenges, the H.264 was introduced to both analog and IP cameras which provides the ability to speak and listen through connected cameras, this allows many more additional applications for the operator of the system for example video analytics. However IP camera/NVR systems take a hit because of high initial and outgoing support costs.

NVR requires Windows based servers, database support, and a good understanding of IP networking, there is a significant cost to server and viewing licenses which requires tech support to keep system updated and running. Bottom line, in the technology of video surveillance, users usually are only interested in the ability to view and record video locally at their facility, and a way to watch or review past archives in a simple Windows or Mac client software that they can install, or have a mobile app with the same functionality. It doesn't matter whether the device is analog or IP to the user it should look like a list of cameras regardless of how they are connected or where they are located.

"Users continue to demand for a simple to deploy and use interface. The same interface should allow access to 2 ways audio and the ability to control I/O ports, allowing the surveillance operator full control and audio of devices at the locations specified.", says Choge. The ability to see, hear and control devices anytime anywhere with a simple software interface is the goal of today's video surveillance operator.

With this kind of reach out and view/control aspect we move out of surveillance market and into the operational and compliance issues that companies are requiring to improve business efficiencies. In today's surveillance market more push is centered towards Machine 2 Machine (M2M) and Cloud computing, both are extensions of what the existing equipment can support. An example of M2M could be a temperature sensor connected to a DVR or IP camera that send email or text alerts of a temperature threshold being met. Users have ability to look in live and see thermostat, possibly trigger reset of breaker or power switch. With cloud services they could send these alerts or event based video to the cloud for offsite storage or a centralized location. IC Realtime answers this call; the company narrows the technology gap between analog and IP offerings. Based in Pompano Beach Florida, IC Realtime offers a complete line of DVRs, NVRs, Hybrid (supports both analog and IP cameras), and mobile devices.

"Many companies that have multiple branches or many cameras are switching to IP cameras the main reason being central management capabilities and partly need for high resolution in specific critical locations. This leads to installation of high maintenance servers and license fees with recurring charges from the licenses", says Choge, who distributes of IC Realtime products locally.

"With the right equipment and advice, all this high costs could easily be averted" he adds. "Surveillance is critical but at the same time it should make short and long term financial sense to a company." With this, 3rd party security firms can easily host and monitor surveillance for other companies with the bonus of cloud technologies and offsite backup with help of a unified centrally managed systems.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Peter Nalika

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place