New IT Role: Combining Physical, Digital Security in Data Centers

 
 
By Chris Preimesberger  |  Posted 2015-02-23
 
 
 
 
 
 
 
 
 
  • Previous
    1 - New IT Role: Combining Physical, Digital Security in Data Centers
    Next

    New IT Role: Combining Physical, Digital Security in Data Centers

    by Chris Preimesberger
  • Previous
    2 - Where IT Should Be: Ahead of the Networked Video Evolution
    Next

    Where IT Should Be: Ahead of the Networked Video Evolution

    IT must be ahead of the evolution of networked video and how to support the applications via network-based infrastructure (network, servers, storage, broadband connections, etc.). The main driver for collaboration between physical security, loss prevention, IT and even marketing is the need to consolidate infrastructure cost or otherwise contend with diluted financial resources across the board.
  • Previous
    3 - IT Needs to Keep Control of Spending
    Next

    IT Needs to Keep Control of Spending

    IT managers need to control network infrastructure costs without letting other departments get a slice of that budget. Physical security departments, for example, will use network infrastructure budget to build a separate network for IP cameras. Instead, IT has an opportunity to be a part of those operations and stands to do a better job with those dollars within their own network.
  • Previous
    4 - IT Managers Need to Learn All They Can About IP Cameras
    Next

    IT Managers Need to Learn All They Can About IP Cameras

    The common theme for IT and network video is that, at a minimum, IT managers need to acquire and maintain some level of technical understanding of IP cameras, network transmission, cyber-security practices and associated solution architecture. This knowledge can be obtained on manufacturer Websites, Web-based training, localized classroom training, physical security trade shows and a physical presence at IT trade shows and events such as Interop, BICSI and other segment-specific shows and events.
  • Previous
    5 - Growing Adoption of IP Video for Business Analytics
    Next

    Growing Adoption of IP Video for Business Analytics

    Marketing and business management are now using more digital recordings from IP cameras.  For example, they're using cameras to study customer demographics and retail traffic patterns as they relate to strategically placed goods or high sales-volume products on store shelves. They use this data to promote sales of slower-selling goods based on proximity visibility. The net result is more stake holders in network cameras and recorded video data matriculation.
  • Previous
    6 - More Intelligent Cameras Require New-Generation IT
    Next

    More Intelligent Cameras Require New-Generation IT

    As with all technology, more use cases found outside of the original technological intent will require more APIs, drivers and specialized apps. Analytics use will increase, as will billing mechanisms for services. Something as small as pet monitoring with triggered actions based on video analytics—such as opening a pet door when the pet enters the immediate area—could and should occur as a result of the innovation.
  • Previous
    7 - IT Should Own Smaller Physical Security Systems
    Next

    IT Should Own Smaller Physical Security Systems

    Organizations such as K-12 schools—where facilities have installed basic analog cameras and digital videotape recorders (DVTRs) to record the school premises—are expanding and requiring better-quality footage. As the schools implement networked cameras and sophisticated recording applications, such as panic buttons, cross-line alerts (someone entered an off-limits area), or motion detection between classes or after hours, IT is in many cases taking full ownership of the physical security systems—including access control, cameras, software, connected unified messaging and emergency alerts.  IT is a logical owner in a staff and resource-strapped environment.
  • Previous
    8 - Where Physical Security Department Exists, IT Becomes Best Friend
    Next

    Where Physical Security Department Exists, IT Becomes Best Friend

    Where there is an established physical security or loss prevention department, the existing departments are the clear subject-matter experts on cameras, camera placement, appropriate software and applications. However, IT is most likely and, at least, the most qualified to work with these departments to provide "infrastructure as a service," or at a minimum, advice on areas of network, servers and optimum storage strategies.  The ability of IT to provide vendor support and discount leverage is one of the many tangible values to these departments.
  • Previous
    9 - Use Common Network Infrastructures to Save Costs
    Next

    Use Common Network Infrastructures to Save Costs

    Anything above the smallest of IP video systems will require significant investment in cabling and hardware. These costs can be, at the very least, mitigated by taking advantage of IT's existing networks and inherent infrastructure components, such as servers and storage strategies.
  • Previous
    10 - IT, Physical Security Should Combine on Cyber-Security Strategy
    Next

    IT, Physical Security Should Combine on Cyber-Security Strategy

    This should include potential audit points such as physical security in Payment Card Industry (PCI) compliance, for one example. Starting with risk management, cyber-security and other emerging executive management responsibilities, video surveillance and other physical security practices become a component of the data center and cloud strategies audit points. Questions to ask: Who is going to own the physical security component, and if collaborative, how will you cooperate?  What are the lines of delineated responsibilities?
  • Previous
    11 - IP-Powered Edge Devices Will Require Additional Control
    Next

    IP-Powered Edge Devices Will Require Additional Control

    Along with cameras, devices such as microphones, environmental sensors and other devices are moving to the edge of networks. IT will want to capitalize on its incumbent position in the communication/data closets, server farms and data centers rather than see company resources reallocated to create parallel capabilities and departmental capabilities.
  • Previous
    12 - IT Needs to Monitor the Entire Network
    Next

    IT Needs to Monitor the Entire Network

    Recent network hacks have been the result of attacking nontraditional IT network points of entry, such as HVAC (heating, ventilation and air-conditioning) systems. As a result, large enterprise involvement will include all network-attached devices to ensure cyber-security defense. IT is taking a more active role in auditing network ingress and egress points in order to provide comprehensive cyber-security solutions. History has taught us that no matter how controlled or structured IT is, if other network devices exist in proximity to the enterprise LAN, the devices will find a way onto the network. Classic examples are printer sharing and rogue WiFi.
 

All of us are aware of the increasing number of video surveillance cameras deployed as we go about our daily lives. The uses range from airports to banks to schools, retail stores, street corners and private residences. As IP surveillance camera and analytics technology evolve, the uses of the networked digital video are expanding well outside pure safety and security to loss prevention and business analytics. Examples of business uses for digital video analytics include customer traffic monitoring (heat mapping), monitoring wait times at cash registers and calculating demographic interest in in-house advertising; we could go on. What this really means to IT is that video cameras are crossing "user lines," and seeing a wider investment and requiring additional IP-based infrastructure to support (network, servers and storage). This slide show, produced using eWEEK reporting and input from Vince Ricco, North America technology partner manager at network video specialist Axis Communications, offers key data points on these changes for IT and security managers.

 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel