Video surveillance remains a key weapon in the security team's arsenal Scott Greiper says eight out of every 10 security purchases in 2004 will be access control products. Video surveillance remains a key weapon in the security team’s arsenal (see “What Do the Mob, eBay and Winona Ryder Have in Common?” Page 40), and Greiper, a research analyst who tracks security technologies for investment bank C.E. Unterberg, Towbin, says lower component costs, the rise of digital video and increasing integration with computer networks have dramatically reduced the cost of deploying surveillance systems. As a result, camera installations have proliferated rapidly. That’s good news for businesses that have a lot of assets to watch over. The flip side of the coin, Greiper says, is that companies with lots of cameras have a hard time managing them, archiving the necessary data and making sense of the tide of information that comes from multiple video streams. He says a fair amount of venture capital is currently aimed at products and technologies that will add necessary intelligence and automation for video surveillance management. Recent video product announcements illustrate many of Greiper’s observations quite nicely.Axis Video Servers www.axis.com Axis Communications makes servers that incorporate signals from existing analog cameras. That means a company with a big investment in analog CCTV equipment can seamlessly integrate those cameras with newer digital equipment. The Axis servers digitize analog signals and provide password-protected access through a standard Web browser.BroadWare www.broadware.com BroadWare Technology’s software for video management is based on technology developed for videoconferencing, so BroadWare video is designed for low-latency, real-time streaming performance (instead of caching or buffering techniques) using proxy servers. The system gives authorized users access to the video stream from any camera at any location on the network, and the low latency makes direct remote camera control more valuable (for example, in instances that require a quick pan or zoom of a particular camera). BroadWare also provides tools for managing bandwidth consumption. Mobotix www.mobotix.comMobotix aims to make IP surveillance cameras truly plug-and-play with the company data networkallegedly as easy as installing a networked printer. The company’s cameras plug directly into Ethernets, without requiring additional software or even a power source (power is drawn through the network cable). Again, standard Web browsers provide the viewing and management interface. Some Mobotix models incorporate various additional hardware features, such as a passive infrared sensor.VistaScape www.vistascape.comVistaScape helps address the data overload issue that Greiper mentioned. The company’s software takes input from multiple video sources and overlays the results onto a graphical representation of the entire area being monitored. So, for example, instead of peering at a bank of monitors, personnel overseeing a harbor can look at a simulated overhead view that uses icons to indicate anywhere motion is detected in the harbor area. The company describes this as “situational awareness of your entire secured area, on one screen.” If something needs to be checked out in detail (to which end policy-based alerts are built in), drilling down to a particular camera is a point-and-click affair. Related content news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Encryption Encryption news CISOs are struggling to get cybersecurity budgets: Report In the latter part of Q4 2022, many CISOs reported that their approved 2023 budgets were being slashed as part of an overall budget tightening. By Shweta Sharma Sep 26, 2023 4 mins Budget Technology Industry feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Authentication Identity Management Solutions opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe