VAD Technologies
  • Home
  • About US
    • Vendor Partners
  • Technologies
  • News / Blog
  • Marketplace
  • Contact
  • Support

NEWS / BLOG

Monitoring Physical Security Systems with PRTG and VAD Technologies

6/8/2018

6 Comments

 
Picture
The basic principles of physical security systems have been around for decades, and have not changed that much: surveillance, intrusion detection, and triggering alarms in case of breaches or anomalies still form the basis of any security installation. What has changed, however, is the technology driving these basic principles, as digitization has changed the very bones of security systems. Along with this digitization, new challenges have arisen. In this post, we take a look at some of these, and how to mitigate them.
Digitized Security
​

But what are these new technologies ("new" being relative, considering some have been around for more than a decade) that are changing the physical security industry? Here are some examples:
  • IP Cameras: In the late '90s, the first network cameras kickstarted the move in video surveillance away from analogue and towards digital. Later, IP cameras, which embraced IP networking technology, Power over Ethernet (PoE), and various kinds of video compression, provided a better way to connect and manage surveillance cameras. As an added bonus, it has become easier to access video feeds remotely using mobile devices. 
  • IP Access Control: Not only cameras took advantage of IP networking technology; IP access controllers can connect directly to the network, and no longer need a terminal server as they did in the old days. 
  • Digital Data Storage: Previously, data such as recorded video footage was committed to tape. More recently, data is stored digitally on hard drives or in the cloud. 
  • Other "Things": In the age of IoT, many other devices are network-enabled. Panic buttons, motion detectors, HVAC (Heating, Ventilation, and Air Conditioning) systems, and smoke detectors are just a few examples. 
A Smorgasbord of Technologies
Other than being a word I like to use whenever it is even remotely applicable, "smorgasbord" (thanks, Sweden!) is an apt description for modern security systems. Because of the digitization of their components, these systems are often a patchwork of technologies, protocols, and a variety of devices from multiple vendors. The first challenge security system integrators face is that they need to get all these disparate devices on a network, and then get that network configured and optimized. Yeah, might take more than a few days.
But getting the environment set up and configured is just the first part of the struggle. 

The New Weakest Link: The Network

The digitized nature of modern security systems introduces new points of failure in addition to the traditional ones. For example, lost data has become a factor. With video data stored digitally, if something goes wrong – such as a storage device crashing or the network not transmitting data – video footage can be lost.
But perhaps the biggest weak point for modern security systems is the underlying network. Bottlenecks, bandwidth issues, or routing problems that prevent data being sent or received properly are all things that can compromise a security system. And if cyber criminals get access to the network or devices, they have the ability to negate the security of the entire system. This might involve shutting down aspects of the system, or using devices for purposes other than intended.
The above risks pose a critical danger to any security system. So how do you prevent these things from happening? 
The short answer is: you cannot completely circumvent these risks. Electronic devices will malfunction, networks will have bandwidth issues, and storage devices will fail. These are the eternal truths of the digital world. All you can do is take preventative steps where possible, and set up alerts for when there is a failure. Enter network monitoring.

Monitoring the Security System

As with other industries, modern security systems have seen a convergence with traditional IT: you have the specialized security devices running on the same infrastructure as more operational IT devices such as switches, servers, routers, and so on. While this does add to the complexity of these systems, it also means that there is the possibility to monitor everything in one place, despite the disparate technologies.  
The same general steps that apply to monitoring traditional IT environments also apply to monitoring a security system network:
  1. Establish the metrics for a healthy running system. For example, how much bandwidth do specific devices use when operating normally? What does the traffic flow look like in different parts of the network at different times of day? What kind of CPU usage is normal for servers? 
  2. Based on the metrics from step 1, set up thresholds and alerts. When values go above or below the "normal" values, then you know that you have a potential problem.
Using a good network monitoring solution, it's possible to get a view of the entire network on one dashboard. Furthermore, the information you get from monitoring the network can help you make adjustments to help prevent loss of data or critical failures. Take a look at some examples in the table below of potential issues you can pick up when monitoring a security system.
Examples of Issues and Possible Resolutions
Technology
Issue
Solution
​IP Cameras
High bandwidth usage
​Adjust the image resolution, video compression, or frame rate.
Storage Devices
Low disk space available
Archive older data, or increase HDD size. 
UPS (Uninterruptible Power Supply) Back-Up Battery Power
Low battery level
​Investigate reasons for the low level, and replace/repair if necessary.
All Devices
Device not responding
Troubleshoot the issue. 
One of the advantages of network monitoring is that the kinds of systems you can monitor are quite varied, as long as the connected devices offer standard technologies (such as SNMP, NetFlow, WMI, and so on). While the monitoring approach remains the same - configure a sensor for a device and get statistics from that sensor - the actual network can look very different from one installation to another. So with the same network monitoring principle, you might be monitoring a hospital, a Smart Home, a Smart City...or a physical security system. 

for the original article please visit: ​https://blog.paessler.com/monitoring-physical-security-systems
6 Comments
Dhrusti IT and Security Centre link
29/10/2021 11:31:58 am

good information u have shared keep on posting

Reply
NETWORKING DEVICES link
10/1/2023 02:54:29 pm

Impressive! Thanks for sharing this.

Reply
Security Companies Australia link
31/5/2023 01:47:39 pm

Surveillance, intrusion detection, and alarms triggered in response to breaches or anomalies remain the foundation of any security installation, as evidenced by the fact that they have been used effectively for decades. I appreciate your contribution and look forward to more in the future.

Reply
Spy Cameras Australia link
2/6/2023 02:55:37 pm

Since digitalization has altered the very foundations of security systems, this is an excellent study that provides much-needed details regarding the technology that drives these fundamental concepts. As a result of this increased digitalization, new difficulties have emerged. In this article, we will discuss some of these risks and the steps you can take to protect yourself. For someone like me who is interested in learning more, this may be a fantastic resource. The blog is excellent.

Reply
security cameras melbourne link
12/6/2023 02:53:52 pm

Surveillance, intrusion detection, and setting off alarms in the event of breaches or anomalies are still the backbone of every security installation, despite the fact that these fundamentals have been around for decades and haven't evolved much. Insightful data about the subject are made available to us.

Reply
jenny link
11/10/2023 01:54:22 pm

This article is incredibly helpful! I've been looking for resources on monitoring physical security systems, and this post has provided valuable insights and tips. Understanding how to monitor and maintain the security of our physical assets is crucial, and this post does an excellent job of explaining it. Thank you for sharing this valuable information.

Reply



Leave a Reply.

    Archives

    November 2024
    October 2024
    September 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    October 2023
    July 2023
    June 2023
    May 2023
    March 2023
    February 2023
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    February 2017
    January 2017

    Categories

    All

    RSS Feed

Services

Sales
Pre-sales
Training 
​Marketing
Finance
​Logistics

Company

About
Technologies
Our Vendor Partners
Jobs

Support

Contact
​Support
Terms & Conditions
Picture

An AlJammaz Technologies Company

© COPYRIGHT 2015. ALL RIGHTS RESERVED.
  • Home
  • About US
    • Vendor Partners
  • Technologies
  • News / Blog
  • Marketplace
  • Contact
  • Support