2Where IT Should Be: Ahead of the Networked Video Evolution
IT must be ahead of the evolution of networked video and how to support the applications via network-based infrastructure (network, servers, storage, broadband connections, etc.). The main driver for collaboration between physical security, loss prevention, IT and even marketing is the need to consolidate infrastructure cost or otherwise contend with diluted financial resources across the board.
3IT Needs to Keep Control of Spending
IT managers need to control network infrastructure costs without letting other departments get a slice of that budget. Physical security departments, for example, will use network infrastructure budget to build a separate network for IP cameras. Instead, IT has an opportunity to be a part of those operations and stands to do a better job with those dollars within their own network.
4IT Managers Need to Learn All They Can About IP Cameras
The common theme for IT and network video is that, at a minimum, IT managers need to acquire and maintain some level of technical understanding of IP cameras, network transmission, cyber-security practices and associated solution architecture. This knowledge can be obtained on manufacturer Websites, Web-based training, localized classroom training, physical security trade shows and a physical presence at IT trade shows and events such as Interop, BICSI and other segment-specific shows and events.
5Growing Adoption of IP Video for Business Analytics
Marketing and business management are now using more digital recordings from IP cameras. For example, they’re using cameras to study customer demographics and retail traffic patterns as they relate to strategically placed goods or high sales-volume products on store shelves. They use this data to promote sales of slower-selling goods based on proximity visibility. The net result is more stake holders in network cameras and recorded video data matriculation.
6More Intelligent Cameras Require New-Generation IT
As with all technology, more use cases found outside of the original technological intent will require more APIs, drivers and specialized apps. Analytics use will increase, as will billing mechanisms for services. Something as small as pet monitoring with triggered actions based on video analytics—such as opening a pet door when the pet enters the immediate area—could and should occur as a result of the innovation.
7IT Should Own Smaller Physical Security Systems
Organizations such as K-12 schools—where facilities have installed basic analog cameras and digital videotape recorders (DVTRs) to record the school premises—are expanding and requiring better-quality footage. As the schools implement networked cameras and sophisticated recording applications, such as panic buttons, cross-line alerts (someone entered an off-limits area), or motion detection between classes or after hours, IT is in many cases taking full ownership of the physical security systems—including access control, cameras, software, connected unified messaging and emergency alerts. IT is a logical owner in a staff and resource-strapped environment.
8Where Physical Security Department Exists, IT Becomes Best Friend
Where there is an established physical security or loss prevention department, the existing departments are the clear subject-matter experts on cameras, camera placement, appropriate software and applications. However, IT is most likely and, at least, the most qualified to work with these departments to provide “infrastructure as a service,” or at a minimum, advice on areas of network, servers and optimum storage strategies. The ability of IT to provide vendor support and discount leverage is one of the many tangible values to these departments.
9Use Common Network Infrastructures to Save Costs
10IT, Physical Security Should Combine on Cyber-Security Strategy
This should include potential audit points such as physical security in Payment Card Industry (PCI) compliance, for one example. Starting with risk management, cyber-security and other emerging executive management responsibilities, video surveillance and other physical security practices become a component of the data center and cloud strategies audit points. Questions to ask: Who is going to own the physical security component, and if collaborative, how will you cooperate? What are the lines of delineated responsibilities?
11IP-Powered Edge Devices Will Require Additional Control
Along with cameras, devices such as microphones, environmental sensors and other devices are moving to the edge of networks. IT will want to capitalize on its incumbent position in the communication/data closets, server farms and data centers rather than see company resources reallocated to create parallel capabilities and departmental capabilities.
12IT Needs to Monitor the Entire Network
Recent network hacks have been the result of attacking nontraditional IT network points of entry, such as HVAC (heating, ventilation and air-conditioning) systems. As a result, large enterprise involvement will include all network-attached devices to ensure cyber-security defense. IT is taking a more active role in auditing network ingress and egress points in order to provide comprehensive cyber-security solutions. History has taught us that no matter how controlled or structured IT is, if other network devices exist in proximity to the enterprise LAN, the devices will find a way onto the network. Classic examples are printer sharing and rogue WiFi.