Hybrids are solutions that use a mix of analog and IP-based technology. Analog technology such as video cameras and DVRs are network-enabled through an encoder that digitizes the analog data stream so that it can be transmitted over the network.
Hybrid systems provide a cost-effective alternative to solutions that require campuses to rip out and replace their legacy equipment. They allow users to gradually migrate to a full IPbased solution at their own pace while leveraging existing analog technology that hasn’t yet reached its end of life.
Infrastructure-as-a-Service (IaaS) enables companies to dynamically scale computing resources by outsourcing their computing infrastructure to service providers. Typically server- based solutions allow a company to add storage or additional memory almost instantaneously as needed.
Web-based businesses are great examples of companies that can leverage IaaS solutions. If a new application goes viral and downloads start exceeding existing computing resources, additional computing power can be dynamically added to meet the demand. The same situation in an on-premises solution might have ended in a crashed server and lost business. For security solutions, some hosting providers of VSaaS could offer this capability, but there are not many situations that call for it.
Integration generally refers to the installation and configuration of products and services by a third party, generally called a systems integrator. It is the professional integrator’s job to make sure that all the components work together to meet the needs of the customer. Combining video surveillance with access control would be an example of the integration of two separate systems. By adding video, the security practitioner can have both a visual and an electronic audit log of individuals entering a secure room.
Internet of Things (IoT) is the network of physical devices, vehicles, buildings and other objects embedded with electronics, software, sensors, actuators and network connectivity that enable them to collect and exchange data. Leveraging network connectivity, IoT devices provide specific information to security professionals such as video, intrusion detection, access control and business intelligence via analytics. In the physical security industry, devices such as cameras, card readers, microphones, lights and s
peakers are all IoT devices if they are connected to a network.
Interoperability is a characteristic of a product or system whose interfaces are completely understood and able to work with other products or systems, present or future. Interoperability refers to implementation or access without any restrictions. Based on open standards, interoperability enables different manufacturers’ products to work in concert with minimal additional configuration. For instance, most VMS applications support the video compression standard H.264, which makes cameras that support this compression standard interoperable with their VMS.
IP (Internet Protocol) is a method of transmitting data over a network. Prior to being sent, the data is divided into individual and completely independent “packets.” Like a letter being sent through the post office, each packet contains both the sender’s and the receiver’s unique Internet addresses to ensure that it reaches the correct recipient. Unless you are an IT professional, all you need to understand about IP is that it is one method for networked devices to communicate with each other.
IT (Information Technology) is the application of computers to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. Often used to refer to people who work in information technology disciplines, IT professionals are the folks to turn to for any project connected with the network.
Lifecycle management, or product lifecycle management (PLM), is the process of managing the entire lifecycle of a product from inception, through engineering design and manufacture, to service and disposal of manufactured products at their end of life. For security professionals, this is modified to reflect the useful duration of a product from the point it is installed to when it should be upgraded or replaced.
Lifecycle management of a product would include understanding the mean time between failures, scheduling routine maintenance and disseminating patches and upgrades to firmware and software as needed. PLM is primarily used to calculate budgets for the activities listed above.
Malware, short for malicious software, is any software used to disrupt computer operations, illegally acquire sensitive information or gain access to private computer systems, or display unwanted advertising.
As a constant threat to all operations that involve computing resources, security professionals need to remain vigilant to ensure that the software running their devices is up-to-date. Given the constantly evolving threat landscape, security professionals usually employ special software applications for continuously monitoring these threats. This is one reason why IT professionals should always be consulted when adding any devices to the network.