Security (Fire Alarms and Safety)

Security Sorry Were ClosedFire Alarms and Safety

Almost all municipalities apply their own regulations for fire protection. This means that your businesses participation is most likely not an option.  Cities and County inforce their codes because fires are deadly, not only to your employees and customers, but also to your business. With that in mind we’ve put together an over view of options you can do to help protect your business.

Manual Fire Alarm Systems

If you or your employees discover a fire at your place of business there are things you can do. Break the glass stations or pull stations alarms (like the ones at school buildings) can directly notify the local fire department. These stations will also most likely activate horns and strobes to warn employees and customers to leave your business. You can also use fire extinguishers (if safe) to help put out a small fire before it escalates.

Fire Detection System that are Automatic

As much as you may want to be, you can’t be in every part of your business all day, every day. That’s the reason why you need an automatic fire detection system. Sensors activated by heat and/or smoke can trigger PA announcements, integrated lighting and signage that will help accelerate an evacuation. In some cities and counties local laws require a sprinkler system for your business, the sensor will active them.

Use a Central Monitoring Station

Sometimes you can’t count on your neighbors to call the fire department, so it makes sense to have professionals monitor your fire system. Very much like the signal received from a burglar alarm system, off site monitoring stations receive a signal from the fire system panels and rapidly notify first responders.

  • Failure to comply local city or county codes can lead to a fire marshal shutting down your business for as much as 30 days or more.
  • It’s been estimated that about twenty five percent or more of all businesses never reopen after a fire or major disaster. Some businesses that actually survive still lose valuable customers and employees during their recovery.
  • As with all part of your security system (video surveillance, burglar alarms, and so on), we strongly advise a maintenance agreement with a respected vendor (fire suppression) to regularly inspect and service your system.

By Lance Roberts

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

If you liked this article, you may want to read this:

NVR and DVR Service Plans (Do you need one?)

Service, It’s What Everyone Needs

NVR Security CabinetLiquid Video Technologies, Inc. has had the opportunity over the last 14 year to see the birth of some amazing technologies. From analog camera with poor resolution to high quality digital mega pixel cameras that see in the dark,  has well as in the light,  VCR video recorder to state of the art networked web accessible DVR and NVR.

Technology (VCR’s, DVR’s and NVR’s)

DVR’s allow our customers to replace their multiplexors and time-lapse VCRs with a surveillance solution that is both hassle-free and easy to use.  Instead of constantly replacing videotapes and having to fast forward and rewind through hours of recordings to find what you want, a DVR stores the video to a hard drive, and allows you to search for it by entering the date and time you desire.  You can also view your cameras over the internet, allowing you to check on your business while at home or on the road.  The DVR’s we provide are unique in that they are powered by Linux rather than Microsoft Windows.  Linux is more stable, less likely to crash, and is immune to almost all known computer viruses.

NVR’s – A Network Video Recorder is a device for storing digital CCTV images on an IP network. The NVR is therefore a networked computing device and benefits from this in such aspects as location (which is independent of camera or control room location), security and network access and functionality. Put simply this means NVRs can be written to and read simultaneously thus allowing the viewing and analysis of one stream of video while another stream is being written. Commonly equipped with hot-swappable additional storage, NVRs are easily scalable and their contents can be subject to the back-up, recover and disaster recovery regimes that already exist on the IT network that they share.

Our Service Plan

Security Technology today is only as good as the service plan that comes with the devices installed on the customers end. This is why we offer a 1 to 3 Year Warranty on the DVR Surveillance units and 3 Year on Cameras that we install. We also guarantee our labor for 1 Year. The support after the sale is just as important as the initial products and services, then LVT should be primary source for all your security and IT needs.

Liquid Video Technologies, Inc. is here to serve you and we understand that installing a Digital Video RecordersCamerasAlarm Systems and Networking are not a onetime proposition. Service is critical to the continued operation of your equipment and business. Since we are a technology company and our markets are dynamic, we are here to support your needs for today as well as those of tomorrow.

Article By: Lance Roberts

If you would like to discuss developing your DVR or NVR Home/Business Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

If you liked this article, you may want to read this:

home safety

Choosing Your Business’s Best Cloud Solutions

Cloud Solutions - word solutionCloud Solutions

Security, at least its electronic brothers and sisters, have used cloud solutions since the beginning.

Cloud computing is today’s solution for everything from email and office applications to storage. Cloud computing is really use of resources (hardware and software) delivered as a service over a network, nowadays typically the Internet. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure. Cloud computing entrusts remote services with a user’s data, software and computation.

Enterprise security executives may not have to know exactly what is going on in the cloud, just that their needs are being met, that the mission is being addressed and that it’s secure. It’s rental, not buying.

So flip back to the initial introduction in the dinosaur days of burglar alarm monitoring for stores, offices and schools when they “rented” the monitoring of alarms from security firms far away in those first clouds.

Then flip to today with myriad cloud applications aimed at physical security, information security and general IT needs. Among the choices:


•           Infrastructure as a service (IaaS)

•           Platform as a service (PaaS)

•           Software as a service (SaaS)

•           Storage as a service (STaaS)

•           Security as a service (SECaaS)

•           Access control as a service (ACaaS)

•           Video surveillance as a service (VSaaS)

•           Mass notification as a service (MNaaS)

•           Data as a service (DaaS)

•           Test environment as a service (TEaaS)

•           Desktop as a service (DaaS)

•           API as a service (APIaaS)

•           Backend as a service (Baas)


What has helped accelerate the cloud for enterprise security is the appeal of mobile access outside of the traditional control center through laptops, smartphones and tablets, especially for security video and clips of alarms and incidents.

So what are the best in the cloud application? Basically, what works for you.


Types of Clouds

But first, it’s important to realize the differences among the clouds as well as the potential dangers to avoid. There are four types of cloud applications.

Public cloud applications, storage and other resources are made available to the general public by a service provider. These services are free or offered on a pay-per-use model. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet.

Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. Costs are leveraged over fewer users than a public cloud, so only some of the savings are achieved.

Private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Undertaking a private cloud project requires a significant level and degree of engagement to virtualize the security or business environment, and requires the organization to reevaluate decisions about existing resources.

Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. By using “hybrid cloud” architecture, companies are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on Internet connectivity. Hybrid cloud architecture requires both on-premises resources and off-site server-based cloud infrastructure.

No matter the type of cloud, when it is done right, it can have a positive impact. But every one of the steps in the project raises security, compliance and privacy issues, as examples, that must be addressed in order to avoid serious vulnerabilities.

Continue reading

Home Security – The Cost of Keeping Your Home Safe

Home SecurityWhat’s your home security plan?

A hundred years ago, people were worried about home security, just like today. “Perhaps a burglar or a fire has not invaded your home, but if they should, they would get all of your money and valuables,” warned a 1913 newspaper ad, touting the benefits of using the Merchants & Farmers Bank in Spartanburg, S.C. What has changed over the last 100 years, of course, is how people protect their homes. If you’re wondering what’s out there and available, and how much these options cost, here’s a sampling of what protections you may want to try.

If you’re a traditionalist. You can always get a gun and a watch dog. You can buy a gun (not necessarily a good one) for less than $100, but it’s more likely you’ll shell out several hundred dollars. The average annual cost of a large dog just in the first year alone is $1,843, according to the animal welfare organization ASPCA.

Something else to think about. But why spend all of that money and risk a tragic gun accident? You could just look like you own a gun, or lots of them, and instead buy a yard sign that alerts visitors that you have weaponry waiting for burglars – has signs for $19.50. For instance, one reads: “Nothing Inside Worth Dying For – We embrace the Second Amendment!”

As for a dog, if you just want a guard and not a furry companion, you could buy something like the Home Safe EWD-1 Electronic Watchdog, by Safety Technology International, which sells for about $80 on Amazon. When an intruder crosses the electronic radar waves, the alarm starts barking – which should send any criminal scurrying for safety.

You could get a home security system. If you’ve been thinking about getting one, you aren’t alone. Chad Laurens, the CEO of SimpliSafe, a company based in Cambridge, Mass., which sells wireless home security systems, says in the aftermath of the school shooting in Newtown, Conn. last December, his security system sales spiked 60 percent higher than normal.

Overall, Americans spent about $20.64 billion on home security systems in 2011, the most recent figures available, according to the business research firm MarketsandMarkets. And the industry is expected to continue to grow to $34.46 billion by 2017.

As for how much of those billions you’re likely to pay? Most companies will offer installation specials as low as $99, but start-up costs for all the equipment could run between $600 to $1,200 says Robert Siciliano, a Boston-based personal security consultant and spokesperson for, a home security review. After buying the security system equipment, you’ll have to pay for monthly monitoring, which can run from $15 to $100, but the average price is $30. Most home security systems require one to three-year contracts, although some companies, like SimpliSafe, don’t require any.

“Just make sure you always keep your alarm on. Always,” Siciliano stresses. “When you are home, away, during the day and night. Otherwise, what’s the point?”

On the plus side, you may save money on your insurance by buying a home security system; some industry experts say you’ll save anywhere from 20 to 45 percent.

Something else to think about. If a home security system is outside of your budget, there are outdoor fake security cameras that look like real ones with blinking lights. Loftek and UniquExceptional are two companies that make them, and the cameras usually cost less than 10 bucks.

Article Provided by: U.S. News

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

If you liked this article, you may want to read this:

Trust Me!

Would I Lie To You?


State of the Art Security for Jersey Mike’s Subs

It’s Not Just About Security

Jersey Mike's Greenville Video Survillance

On June 11, 2015 Jersey Mike’s Subs at 233 North Main Street in downtown Greenville, South Carolina upgraded to a state of the art video surveillance system. But it’s not just about security.

The video surveillance system that Liquid Video Technologies installed serves multiple functions for the sub sandwich giant. The cameras are used to assist in the training of new employees as well as customer relations and after hours security. Cameras systems today need to be flexible and this system is just that.

The system has six, 3 mega pixel cameras that are linked to a IP video storage device that allows for remote access. The video (whether live or recorded) can be viewed easily in real time on a web browser or web device. Also, all of this systems local network of cameras and the IP video storage device were secured in and wall mounted security cabinet that keeps the system not only out of the way but safe from unauthorized access on site.

Security Cabinet

Locked Security Cabinet

Security Cabinet

Opened Security Cabinet

Surveillance systems like this one are becoming the new standard for businesses that need to guard there customers as well as there staff. Things like safety, training, liability, and remote access are all part of the way businesses today manage there investments.

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

If you liked this article, you may want to read this:

Security vs Money

An Alarm Should Sound On Deals

Alarm - Security vs MoneyAlarms

An electronic home security system can be the source of great peace of mind or great financial headache. That’s because buying a system, and the alarm monitoring that often goes along with it, can be a thorny purchase, fraught with such perils as wildly differing prices, high-pressure sales tactics and unfriendly contracts.

Basic home security systems, or burglar alarms, are typically wired to a central control panel in the home that will activate when windows or doors are opened while the system is armed. More advanced systems add fire and carbon monoxide alarms, motion sensors, glass-break detectors and, increasingly, home automation options such as controlling home lighting and temperature.

The good news is that almost 80 percent of homeowners with alarms rated their systems as effective in protecting their homes, according to a survey by the Consumer Reports National Research Center.

But consumers shopping for systems often report hassles, said Angie Hicks, founder of Angie’s List, which collects customer ratings for various categories.

“Home alarms is one of the categories where we hear complaints about high-pressure sale and scare tactics,” she said. Some companies insist on long-term monitoring contracts.

And prices can be all over the place, said Robert Krughoff, president of Consumers’ Checkbook, which rates home security companies and recently published an extensive report on the topic to its members.

“We see a lot of variation in price and no real relationship between quality and price,” he said. “We found some of the lower-cost places rated very high in terms of quality, and some of the high-priced places don’t rate particularly high.”

Here are some basic questions and answers to help you shop.

Do I need a home security system? “I think the most important advice is to think twice before even bothering with a system,” Krughoff said. “There are a lot of things you can do that would probably be more powerful than any home security system.”

Burglars usually aren’t sophisticated. They often take advantage of unlocked doors or windows that are easily jarred open.

“Most of the time they get in through very unartful means,” said Kevin Brasler, executive editor of Consumers’ Checkbook.

Cheap and effective alternatives are quality deadbolts on doors, substantial window locks and motion-sensor lighting outside. You could get a dog, although its care might turn it into a pricey option. You could bluff by posting a Beware of Dog sign or the window stickers from alarm companies.

Habits matter too. Always lock you doors when you’re away. And when you’re on vacation, put lights on timers and have someone pick up newspapers or place newspapers on vacation hold.

“Those things really matter,” Krughoff said.

The Consumer Reports survey found that 19 percent of respondents said they at least occasionally leave doors at home unlocked when they’re out, and 26 percent said they at least occasionally leave windows unlocked when they’re not at home.

Consider that owning an alarm can be a hassle. You have to turn it on when you leave and rush to turn it off when your arrive home. Children, house guests and pets can accidentally trip the alarm, potentially leading to local fines for false alarms. And you’re supposed to test your system monthly to make sure it is communicating with the monitoring service, according to the Electronic Security Association. Maybe those hassles are why 43 percent of people who have an alarm say they occasionally don’t turn it on when not at home, according to the Consumer Reports survey.

How do I choose an equipment installer? Get several price quotes for both system installation and monitoring, perhaps starting with companies rated highly by Consumers’ Checkbook or Angie’s List. Check for complaints against individual companies with the Better Business Bureau. Salespeople who try to intimidate or pressure you into a quick decision, sometimes pointing to recent spate of burglaries in the area, are ones to avoid, according to tips at The inability of salespeople to explain how the system works is another red flag. In a recent report, Consumers’ Checkbook found prices vary widely. Prices for installation and three years of monitoring ranged from less than $2,000 to more than $3,300 for the same job.

Do I need monitoring? Central system monitoring can automatically notify an alarm company that there’s a problem by sending a signal over a landline or wireless connection. They can, in turn, notify police or fire departments. Monitoring typically costs $20 to $50 a month, depending on what’s included, but your alarm system will work without it. If your home is usually occupied or you have neighbors who will notify authorities that an alarm is sounding, central station monitoring provides only limited additional protection, according to the report in Consumers’ Checkbook.

Article Provided by: Chicago Tribune

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

If you liked this article, you may want to read this:

Access Control Systems


How Video Recorders Provide Critical Support to the Enterprise (Part 1)

Video Recorders - cctv cameraVideo Recorders

More cameras, storage, sharing of security video and more uses…all of which leads to an expanding array of storage choices: digital video recorders (DVRs), hybrid DVRs and hybrid network video recorders (NVRs), pure NVRs, virtual storage, storage in the cloud and, for some, especially retail, storage to analytics by a specializing third party. Emerging slowly and expensively are solid state storage beyond limited at the edge solutions; a 4-terabyte unit, however, can clock in at $29,000, not a viable choice, at least for now.

Most enterprise security leaders are more cautious. Look at Hideaway Pizza, a 12-restaurant chain based in Tulsa, Okla., which views video surveillance more as a critical enabler of operational excellence.

Loss prevention no doubt impacts the bottom line; but, more importantly, issues center on the performance of the kitchen and wait staff, their interaction with customers and the quality of the food. And with that in mind, Hideaway Pizza equips a typical restaurant with up to 25 cameras covering the front of the house, the kitchen, cash drawers, bar area, entrances, exits and parking lot — “pretty well every nook and cranny,” notes Tyson Smith, the chain’s IT director.

Using video surveillance as a management and training tool can definitely contribute to a restaurant’s success, but only to the extent that the video surveillance system – and storage and retrieval of the images – is reliable and easy to use.

Overcoming Its Legacy

According to Smith, Hideaway Pizza had the right idea, but was hampered by the deficiencies of its legacy technology. Video wasn’t recorded during updates of the operating system; there was a limit to the number of users who could log on to view video at one time; and it was impossible to manage the recorders from a central location. Even more troublesome, “the systems would be down and we wouldn’t know why,” says Smith. “There wouldn’t even be an alert. Managers would have to call and say ‘My cameras aren’t working,’ and we’d have to deploy someone to the site to try to figure out what was going on.”

Smith went to a hybrid NVR solution based on Hideaway Pizza’s mix of analog and IP cameras. “We’re deploying mini-dome cameras in our newest restaurants, and we’re replacing the recorders that are getting old and breaking down,” says Smith. “We have analog cameras in our older locations, so the hybrid recorder gives us a really good platform for both instances.”

The hybrid NVRs accommodate up to 32 IP cameras, 32 analog cameras or any combination of the two. They have onboard video storage of up to 12 terabytes, with the option of hard disk mirroring for redundant storage.

Security video intelligence played a distinct role at the Peabody Hotel in Orlando, Fla., a 350,000-square-foot multi-use convention, spectator, show and banquet center connected to the 1,641-luxury-room hotel. The hotel’s integrator deployed the intelligent video management system with use of server client as well as mobile applications.

More generally, there is storage action when it comes to industry-generated standards.

And, speaking of those standards, ONVIF, a global initiative for IP-based physical security products, made news at the late September ASIS International exhibition with its Profile G – the specification designed to store, search, retrieve and play back media on devices or clients that support recording capabilities and on-board storage.

Closing the Standards Loop

“The introduction of Profile G will complete the circuit between live video and the other half of the equation, which is video storage,” says Steven Dillingham, chairman of ONVIF’s Profile G Working Group. Profile G encompasses devices ranging from cameras and encoders to NVRs and client systems such as video management systems, building management systems and physical security information management (PSIM) systems, among others. For example, Profile G can be deployed between a PSIM solution integrating video playback from a NVR, including specific features such as starting and ending recording; searching video using various filters such as time, event or metadata; video retrieval and playback; and, on the receiver side, creating a source of IP media.

In another industry interoperability move, Microsoft Global Security, which is responsible for providing physical security at Microsoft Corporation, has joined the Physical Security Interoperability Alliance (PSIA) board of directors, signaling its support for the PSIA’s system-level approach to developing standards for the security industry.

Microsoft’s three Global Security Operations Centers (GSOCs) monitor 700 sites, in more than 100 countries worldwide for nearly 200,000 active personnel access accounts. Technologies include nearly 20,000 access control points and video cameras, connecting to more than 1,000 IP addressable DVRs. These sites also include more than 9,000 other devices, including duress alarms, biometric security systems and environmental alarms. The several million transactions per month have led to a significant migration and expansion of the technology to a mostly virtualized, cloud environment at Global Security.

“We are making standards and interoperability core to our security strategy here at Microsoft Global Security,” says Mike Faddis, Microsoft Global Security’s group manager, who will increasingly be basing purchases and security ecosystem on tools and technology from vendors who have adopted security standards and have a focus on interoperability with others.

IP-based security video, Cat6 wiring and Power over Ethernet or PoE, as compared to coax, are viable trends.

Article Provided By Security Magazine

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

Are you enjoying this article? Read More:

Video Recorders - cctv camera

How Video Recorders Provide Critical Support to the Enterprise (Part 2)

Video Recorders - cctv cameraVideo Recorders (continued)

DVRs on the Rope?

So it would be understandable for some to assume that DVRs are about to disappear. That may be true when it comes to some installations, where enterprise security leaders go all-IP. But in general, DVRs, as well as analog cameras, are holding their own – for now, at least. Annual sales of DVRs and other analog products continue to grow steadily, if not modestly. The analog market is vital. That vitality comes from the drives that they use. As long as you can get cheap drives, you can fix your DVR. No one is going to dump a working 16- to 24-camera DVR just to go to NVR.

Another factor driving DVRs’ continued impact is price, which for some DVRs is not just a fraction of an NVR’s, but also a fraction of the price of DVRs in the past. And these units come with more features, too, such as H.264 encoding, some sort of audio support and a lot more. DVRs have apps and can connect to Web servers.

Still, NVRs will gain a greater role, especially given the continued growth of IP video systems, and more specifically integrated systems running on network infrastructure. But there is an open architecture twist. Newer video management systems (VMS) can often be installed on plain server computers. NVRs, however, serve a purpose where a dedicated network recorder is preferred. So, as prices come down on NVRs and IP cameras and installation becomes less complex as a result of technical advances, NVRs will be growingly more attractive, down to one- to 32-channel security video installations, for instance.

Of course, many NVRs can support up to 300 cameras on a single server, remote management, hot-pluggable storage in the field, providing redundancy and large amounts of storage in a limited rack space. NVRs also stand out in reliability and manageability. At times, DVRs can experience drive failures compared to NVR drives in properly designed IP systems.

When considering the difference between NVRs and DVRs, it can also depend on the intelligence of the camera. With a DVR, things like changing frames per second and the quality of the saved video are done in the recorder itself. With an NVR, that responsibility is flipped because IP cameras can be programmed to determine the number of frames, where to look in a scene for motion, what video to send and other needs. Newer NVRs can program cameras.

Infrastructure Essential

Of course, there is the issue of the network or networks on which the camera and/or the NVR are located. Having IP cameras on the same network as the NVR is always preferred.

When it comes to storage, however, remember that most existing cameras are analog and, in migrating to IP, there is an acknowledged hybrid approach, which has created HVRs or hybrid video recorders, DVRs and NVRs that support both analog and IP camera connections, to make it easier to transition smoothly to IP systems. With a hybrid recorder, enterprises are able to not only swap out their cameras on a case-by-case basis but also continue to use the hybrid (provided it offers full IP capability) once the transition is complete. Basically, these hybrid NVR/DVRs are appliances (purposed built computers) that, at the same time, handle IP cameras and directly connected analog cameras. And, unlike a “pure” NVR, a hybrid DVR/NVR eliminates the need for a separate video encoder when connecting to analog cameras.

Another trend is so-called serverless computing and storage.

System on a chip or SOC comes together with scale out design, a key for video recording data streams with longblock random writes. The scale-out design distributes incoming video recording streams across all resources to dissipate pixel storms, eliminates all single points of failure including any individual appliance and maximizes frame rate capture for the best recording results.




Looking at a network for video storage? Look at these three general network storage options for storing, managing and securing video surveillance data.
  1. Network storage as a surveillance storage target, featuring simplified, scalable network storage for recorded or archived surveillance video files. This option uses a network storage device, often a double-, quad or six-bay desktop model or a multi-drive rackmount array, as a simple surveillance storage target that works in conjunction with video management solutions (VMS).  This targets enterprises that already have video surveillance but need to meet the demand of growing storage space and regulation requirements, enabling the opportunity to pair preferred video management software with powerful, cost effective and scalable storage and data protection.
  2. An integrated VMS that has smart network storage with video management software and IP cameras for an integrated video surveillance solution. This approach incorporates embedded or PC-based third party VMS applications to ensure fast, efficient and reliable recording of video surveillance files to a deployed network storage device. It aims at distributed enterprises and others with limited IT and surveillance support through storage capacity, security and compatibility. Mobile device applications allow the surveillance administrator to access video feeds on the go, anytime, anywhere.
  3. A hosted video surveillance solution leverages the power of cloud storage and the ubiquity of a browser-based video management system interface. An enterprise can take advantage of cloud storage technology to deliver cost savings without compromising performance, capacity or security. Using a service provider of cloud storage in combination with a network storage device and integrated video management software allows enterprises to record and store high definition video locally, for instance, while also providing economical access to standard resolution video data stored securely in the cloud.




A network video recorder (NVR) includes software that records video information to a storage device. It also is a way that makers of the software have brought traditional computer and server sources to enterprise security operations and ever tighter with IT infrastructure.

Similar in many ways to traditional DVRs, NVRs differ in that they record footage that has been already been processed and encoding by the camera, rather than at the DVR unit. Once the information is processed, it is sent along the network for storage and remote viewing.

One benefit: A unit can be located anywhere; it doesn’t have to be near the cameras. This is ideal for security purposes, as it means the unit can be safely kept in another building or at a different site, according to information through recording software source Wavestore. Its technology and commentary from the top security executive at Burlington Coat Factory was featured in the June 2013 Securitymagazine and is available on Among key NVR buying tips:

  • Works with existing, future security cameras;
  • Easy to install, maintain;
  • Handles various compression formats;
  • Handles third-party applications; and
  • Allows for expansion as needs grow.

Before choosing an NVR, however, enterprise security and integrators first calculate storage needs. Too much or too little storage picked can be an expensive decision. Just right for today and tomorrow is best.

Maximizing storage is important. At a project at Sanford, Florida’s Public Safety Complex, housing fire and police headquarters, the city updated and augmented is arrays to accommodate the significant increase in camera load for the complex. Additionally, to maximize storage resources, each camera has H.264 compression functionality to reduce bandwidth and storage, but also has a Motion JPEG option for live viewing capability.

Then there is recorder maintenance. Unlike alarms, locks and sensors that are easily tested to confirm their status, video recorders require special attention. Problems often aren’t detected until an attempt to retrieve event video fails because the footage isn’t there. “Health Check” features are available, which would assess all video recorders across an enterprise’s network and performs a regular checkup of diagnostics to ensure operational status.

Remote video storage services enable enterprise security executives to control the number of cameras from which video is pulled, how long video is stored, how much video is stored, image sizes and number of frames-per-second to be transferred to the monitoring center for safe keeping.

Retail surveillance boasts distinctive video storage needs. Some of these operations have pioneered analytics uses beyond shoplifting, sales associate theft and slip and fall investigations. While DVRs continue to play a major role at stores within a chain, there is an expanded need to aggregate video data in-house or through a third-party for customer demographics, traffic patterns and more sophisticated heat mapping.

Article Provided By Security Magazine

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

If you liked this article, you may want to read this:

Data Storage

7 Benefits of Migrating to IP Video Surveillance

7 Benefits of Migrating to IP Video Surveillance

IP video surveillance has long since graduated to a mainstream technology in the security industry – but if you’re still sitting on the fence as to whether or not it’s right for your application, the following list of IP video surveillance benefits may help you to decide:

Improved Performance– Today’s IP cameras have significantly improved performance over earlier models thanks to breakthrough imaging technologies. High performance features such as advanced digital signal processing, optical zoom lenses, wide dynamic range, on-board analytics and auto image stabilizers provide more options to help security professionals meet their specific surveillance needs more efficiently.

In addition, the high resolution of megapixel cameras affords coverage of a larger area with fewer cameras, while the forensic zooming capability of megapixel cameras can reduce the need for traditional pan/tilt/zoom appliances. The detailed images are available in live or archived format at any time to any point along the network. This enables more and better identification of individuals and events to help deter, detect and prosecute in the case of an incident.

Unlimited Scalability– One of the key benefits of IP video surveillance systems is the ease with which the system can be configured for current requirements and just as easily expanded or re-configured as needs change. Cameras can be added to the network in increments of one or more with no additional cabling or power requirements, and industry standard storage can be added as needed. Most important, these changes can be made without losing the investment in the original system.

System Configuration Versatility– Cost efficiencies can be readily gained with the system configuration versatility of IP video surveillance implementations. Video can be recorded and viewed by authorized individuals from anywhere on the network and control of multiple locations can be centralized at one location. This eliminates the need to duplicate staff or equipment at each location with potential savings of thousands of dollars in salaries and equipment cost. Cameras can be re-located or temporarily installed anywhere on the network with minimal disruption. Maintenance and service expenses can also be reduced because IP-based systems can be adjusted, checked or even re-configured remotely without the need for on-site service.

Advanced Analytics– Commonly featured in both IP video surveillance edge devices (i.e. cameras, NVRs, etc.) and at the central server, interpretive vision or analytic intelligence can be used to monitor, record, interpret, archive, retrieve and verify image data to increase the efficiency and effectiveness of the security staff. Intelligent devices can improve the abilities of control room personnel by performing automated responses such as zooming in to an object which is creating an alarm or by only transmitting video that contains specifically identified activity, making it easier to search the recorded material. Advanced analytics such as face detection, license plate recognition or people counting/tracking technologies can also be used to help improve the security of a facility.

System Integration – The ability to tie together related physical security applications such as access control, alarm/intrusion, visitor management and so on, within the organization, makes economic as well as operational sense. IP video surveillance systems provide users with a common view that can be sourced and/or managed from a central control room, an office cubicle or even from a mobile device – simultaneously by multiple users. Additionally, IP video surveillance systems enable organizations to collaborate across different functional workgroups. For example, it is possible to verify abnormalities in POS transactions by coordinating data with IP surveillance images. It is also possible to integrate entry/exit access control data with maintenance and facilities information to improve building environmental operations.

Future Proofing– IP surveillance is a very flexible technology in that it can be implemented at any stage of a deployment. Existing analog systems can be upgraded to a hybrid configuration and either maintained as such or eventually configured to a fully networked system. Cameras can be added at any time, anywhere there is network capability, or as wireless technology develops, network cameras can be deployed virtually anywhere. Another important aspect of IP surveillance is adherence to industry standards. As technology develops, software/firmware upgrades can be implemented to keep the system current.

ROI and TCO– IP surveillance deployments can improve Return on Investment (ROI) and also help to lower Total Cost of Ownership (TCO). For example, megapixel cameras used for risk management in retail can help minimize incidents of theft or fraud because of the improved image detail; or, individual devices can take advantage of increases in computer power and improvements in network speed without having to be replaced. By making a clear positive impact on the bottom line, IP surveillance systems have more than proven their worth as tomorrow’s surveillance technology of choice.

Article Provided By Security Magazine

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

If you liked this article, you may want to read this: