A clear definition of your security requirements is at the forefront of successfully deploying and using your system. This includes defining the characteristics of your environment and potential vulnerabilities.
Intrusion Security
An intrusion security system should be part and parcel of an overall security and loss prevention plan. Intruders seek out sites that offer high rewards with low risk of being caught. The “success” of the intruder’s activity is dependent upon such factors as time, detection, lights and noise.
Access Control
The sophistication of today’s multi-faceted access control systems enables integration with intrusion security and video surveillance systems. Together these integrated systems can help control the movement of people and assets.
Adequate planning is critical to the success of your system. To ensure compatibility with your existing IT infrastructure and any new components, collaboration with your IT staff is highly recommended. This will aid in deploying and maintaining a functioning, reliable system.
Video Surveillance
Either analog, IP based, or hybrid video surveillance systems are available. If you are starting with a new system, an IP solution gives you the most options and provides the potential for the best quality results.
Considerations for a successful system include:
- Bandwidth
Your network may already have the required bandwidth. However, a network assessment is an important part of the planning process. Factors to consider include the type and number of cameras required, internal network parameters, and internet bandwidth.
- Router
An appropriate internet router is required for remote viewing and system access. This may include a wireless component to complement any wireless access points for connecting with wireless cameras and viewing devices.
- Switch(s)
A network switch or switches with Power over Ethernet (PoE) will reduce the need for locally powered cameras.
- Computer
A suitable computer is required to manage the system and provide control for the cameras, recording and monitoring.
- Viewing
Provide for both on-site and remote viewing of cameras. Prominently displayed monitors offer an effective deterrent.
- Storage
Video storage requirements are dependent upon the number of cameras, resolution of the video, and how long the video files need to be kept. Using event-based recording such as motion detection can effectively reduce storage requirements.
Download a complete copy of our FREE Business Technology Hints & Tips when you opt in here to our mailing list. www.nutecelectrotel.com
We respect your email privacy and you may opt out at any time.