White Paper - VMS
White Paper - VMS
Brief description
The recording systems in the Cloud are here to stay definitely. The trend is clear: now monitoring and security systems as
well as a wide range of video analytics are performed directly in the Cloud. This means that it will no longer be necessary to
invest large sums of money in the acquisition of network equipment, servers and storage. Forget the complexity of
managing IT security to provide and grant access and permissions. Forget the maintenance of technological infrastructure,
updates and software patches. Cloud-Based surveillance solutions will open up a world of opportunities for you; by reducing
operating costs, improving business processes, and with the use of artificial intelligence, you can take your organization to
the highest level it can reach.
Index of contents
Introduction ..................................................................................................................................2
Architecture of traditional VMS systems .....................................................................................6
Disadvantages of implementing traditional architecture .......................................................7
Advantages of implementing traditional architecture ............................................................7
Cloud-based VMS systems ...........................................................................................................8
Architecture of VMS Systems in the Cloud ..................................................................................9
About AddaTech .........................................................................................................................13
About the Author .......................................................................................................................13
Introduction
For several decades, security has been a fundamental factor in all types of organizations.
Video cameras traditionally served as a crime prevention factor. At the origins of these
systems, images were recorded on VHS videotapes. Videos were rarely of good quality, due to
the technological limitations of both video cameras and recording devices. I have been
fortunate to see with my own eyes, hundreds of security cameras, recording on videotapes.
I remember seeing racks of considerable size, with high maintenance, rotation and storage of
VHS tapes, and finally, the quality of the recordings and the time taken by an operator to
search for an event that has been recorded by the cameras, towards these processes,
something very inefficient and expensive. It is true that inefficiency and high costs were
preferable, rather than the non-existence of security.
Digital recorders have revolutionized the security market and industry. By the mid-1990s and
early 2000s, digital recording systems (DVRs) began to be implemented. Since then, they have
not stopped growing. And of course, the software that manages these recordings has evolved
to levels unthinkable for the first years of existence of DVRs Today these software products
(called VMS - Video Management System) have incorporated the use of Artificial Intelligence,
and they continue to evolve at levels that are still unknown to us. Even DVRs have now
become NVRs (as they are devices that connect directly to a data network). Even the most
sophisticated NRVs allow video cameras to be connected via WIFI, thus avoiding the high costs
and difficulties that wired cameras may have.
Video Management Systems allow, in addition to managing the recordings and cameras, to
recognize people's faces - FACE RECOGNITION - (with effectiveness rates higher than 98%).
They allow the recognition of behavior patterns in the video scene (in real time) to prevent
theft situations (see figure 1). They allow to identify smoke, to anticipate and prevent fires.
They allow to recognize vehicle license plates, and even allow reducing fraud in the sales
terminals (POS) of any retail chain (see figure 2).
The evolution we are talking about is an evolution from typical video surveillance systems to
systems that, at present, play a more important role than that of patrimonial security. In
reality, through the use of video surveillance systems, security can be provided while
optimizing business processes, automating events, making a security agent independent
from having to be looking at an image to make a decision (early alerts). But, above all, this
evolution allows us to obtain data with which we will build information that can be of valuable
use to our business.
We refer, for example, to the capacity of these systems, to obtain statistics of how many
people enter to our store, how many of those people are male or female, in what age range
are the people, and above all, will allow us know which are the areas of our store where our
customers spend more time, or where they spend less time (places or gondolas most and less
visited). Finally, we can’t ignore the efficient management of waiting lines.
How many times do customers give up buying because there are many people in front of them
waiting to pay?1
In issues related to patrimonial or physical security, the use of video analytics has evolved a lot
and for the better. Analytics such as line crossing, zone invasion, abandoned objects, among
others, allow to automate alerts and actions centrally and automatically.
Security officers no longer have to worry about paying attention to cameras all the time.
Simply to the events that will occur. Again, Artificial Intelligence plays another fundamental
role. These software systems are capable of differentiating objects (in real time) to determine,
for example, if what is invading an area is a human being or an animal.
Figure 1: Images behavior patterns, with the use of Artificial Intelligence. Here we observe how a man
with a weapon is detected. From this detection and by the behavior of the whole scene, it is possible to
issue an alert to the police, activate an alarm, turn on a light, send an email, etc.
1
See figures 3, 4 y 5 for a better understanding of the scope of the solution “Retail Analytics”
Note: The VMS allows you to associate each transaction, to know the exact moment in which cash
cancellations, cash receipts, etc. occur.
Figure 3: Heat maps. Obtain information about busier places and where customers spend more time in a
store.
Figure 4: With facial recognition, it is possible to obtain age and gender information of the visitors to our
store. Even, by days and hours segments
Video Management Systems (VMS) are powerful software developments. They have great
scalability and advanced functionality, easy interaction with the user who operates the system,
and above all, they manage events that come from IPs or analog devices that are integrated to
the system. VMS Systems manage events, and use them to perform specific actions. Those
specific actions include from sending a simple email to capturing photos and activating or
deactivating relays.
The technological architectures to implement this type of systems are very varied. Some are
very simple and some are very complex. In any case, it will depend on each organization and its
complexity in number of cameras, days of recording, physical location of the cameras, etc.
Organizations typically have a data center (data centers) and there they have servers and
storage devices.
The following figure shows a typical architecture scheme for these traditional VMS systems.
The servers record the videos in a Main Storage and the visualization clients are in charge of
visualizing, managing, and administering the entire system.
There may be remote connections through the internet, if that option is available and enabled.
One of the main disadvantages of implementing this type of architecture is the initial cost. You
have to acquire servers, storage devices; surely you also have to invest in high-speed networks
that allow to configure VLANs and, of course, installation of the systems, the maintenance,
backup, etc. Undoubtedly, if an organization does not have this type of architecture,
implementing it can be very expensive, especially at the beginning.
On the other hand, it requires technical staff prepared to be able to support this architecture,
maintain it and act in case of emergencies. The risk is high and the solution is expensive.
The maintenance (updating) of the hardware as well as the software is a very important factor,
and in this type of architecture, scheduled service outages will need to be made. They must
work in special hours, have contingency plans, plan migrations or updates, among other
activities.
The main advantage of these architectures resides that all the information is stored locally,
guaranteeing the maximum speed and security of the data.
Access speed (for being in the same high-speed data network) is also an important factor.
Practically, there are no delays on a gigabit Ethernet network.
All these hardware equipment, together with data networks, need their safe physical space,
their maintenance, and even redundant power elements (like any traditional data center). But
perhaps a point against this traditional type of infrastructure is the limitation of connectivity;
how do you go about connecting a video camera in a place where the company LAN or WAN
connection does not reach? Today this is a weak point that is having various solutions in what I
call VMS 2.0, which are VMS systems based on the Cloud (VSaaS).
There are companies that have data centers, and connect thousands of cameras to these
centers, through complex LAN, MAN and WAN networks. In general, the monitoring of all
these cameras is carried out centrally (in an operations and monitoring center) but also, it is
required to visualize in a decentralized way in many cases. For example, it is important for a
store manager to view the cameras of his commerce when he is not present.
These types of issues can become vulnerable and complex in the traditional way of using these
VMS systems. Fortunately evolution has arrived, and thanks to the systems that are native to
the Cloud, all these issues are solved in a very easy way.
Forget about investing large sums of money in the acquisition of network equipment, servers
and storage. Forget the complexity of managing IT security to provide and grant access and
permissions. Forget infrastructure maintenance. From now your company will only limit itself
to connecting a camera and making sure it has an internet connection.
By implementing a secure Cloud-Based Solution, your videos will be well protected. Cloud-
based solutions generally require a camera (essential) and a device called Bridge; hardware
necessary to optimize bandwidth and security of the solution among other issues.
The software, being in the cloud, is always up-to-date, so you also have to forget about
shutting down servers and preventive maintenance windows.
The access management and visualization of the cameras is very simple and intuitive. It is
possible to apply and configure various video analytics and it is very easy to access from
devices such as smartphones, tablets, or through internet.
Recording is unlimited. Generally the client pays for the space he needs. Videos are stored for
15 - 30 - 60 days or more. That will depend on the business model.
But there is more, and perhaps most important; These Cloud-based solutions are capable of
integrating with other systems and with other technologies through APIs.
For example, you could integrate your access control systems, with facial recognition and
everything would be registered in the Cloud. You could also integrate license plate recognition
to enable automatic access for certain vehicles to your company parking lot.
The integrations have no limit; it could even weigh the vehicles leaving your plant, store their
data, date, time, driver and weight.
These types of architectures are simple to understand and implement. In a few minutes, your
company, business, office or why not, your own home, can have video cameras and recordings
in the cloud.
The main characteristic of this type of solution is the ease of its implementation.
If your company, business, or office already has video cameras, you should only place a BRIDGE
hardware (small, medium or large), depending on the number of cameras your company has.
Sometimes, depending on the manufacturer and the technology, some IP cameras already
have the Bridge functions within the Firmware so it is more efficient and avoids installing a
new hardware.
Bridge will allow you to access the cloud, under strict security regulations. Additionally, it will
allow you to optimize the bandwidth between your company and the internet, among other
great technical performance. It is a hardware device (or software if it is integrated into the
firmware of the video camera). Generally in small installations (4 to 8 video cameras), it is a
device with the same size as a router, like the one you have at home. In larger installations, the
hardware may be required to be placed in Communications Racks.
Once your cameras are in the cloud, you can access it from any device with a username and
password. This way you can manage cameras, recordings, users, permissions, configure
analytics, events, types of recording, etc.
Adding cameras to the system is very simple, as well as integrating different offices or
businesses or locations, which may even be geographically dispersed in different countries.
Setting alerts, notices and access is much more intuitive. It does not require much technical
knowledge, it is ideal for any type of user, you do not need to be a technology expert to
manage a Cloud-based VMS software.
This type of architectures has great scalability in all solutions. It allows integrations with third
parties software, and above all to have a high fault tolerance (high availability), generally with
values close to 99.9%. That means, there are practically no drops in service.
Integrations with third parties are done through APIs. These APIs are integrated in an easy,
organized and efficient way. What applications can I integrate through APIs? Recently a client
wanted their access control system to work in conjunction with their cloud security system.
Through APIs programming it was possible to obtain the data, for example, at what time an
employee entered, and search for the exact video of the moment of their entry.
Other integrations through APIs occur in contexts where certain processes (such as collections
at points of sale, vehicles in an industrial plant) are so important that, together with cameras
and VMS software, it provides added value to the business.
• Platform support: Fully centralized. Your company does not need technical resources
to support the infrastructure
• Flexibility in recordings: Pay for the space you need. Don't overpay. Don't pay in
advance.
• Scalability: Open new offices, place the cameras, connect them to the Bridge, and
that's it. Easy to climb. Easy to access
• Remote Access: Access from any device connected to the internet. Accessing cameras
is now simpler and faster.
• Redundancy and Reliability: You no longer need to have redundant storage, servers,
and contingency plans. The cloud offers 99.9% redundancy and reliability. Reduce
costs.
• Integrations with third parties: Thanks to the development of APIs, your system can
be integrated with other systems and / or technologies.
These are some of the advantages that these systems have. Mainly, experience has shown me
that it is possible that operating costs can be lowered, increase security, and at the same
time, it is possible to collect information, which, if used correctly, surely the company will see
many benefits. In Retail, knowing the preferences, tastes, schedules of our customers is a huge
advantage, and it is obtained without implementing complex systems. Video cameras give us
that information. Another example is the implementation of video analytics for facial
recognition; we could have early alerts and in real time, when we want to know if a certain
person entered our store or simply when it was detected by a camera. We could prevent theft,
fraud, or to check faces stored in a database, for future security events.
If we look at it from the security market side, analytics allow us to optimize processes and
times, especially for security agents and people responsible for operations.
Finally, and perhaps something that I should not omit to mention, is that these types of
services are paid per month or per year, depending on the storage space and the analytics that
your company needs. Generally, the value paid for each camera connected to the cloud is
insignificant. And if you consider the added value and the investment that you must make to
start up a system of these characteristics, I am convinced that you will not hesitate to do so,
because without a doubt it does not resist analysis.
Have you thought about how far your company can go by implementing Cloud-based
surveillance solution?
Traditional video surveillance systems -VMS- have been and are really very complex
all over the world. The cloud came to facilitate and solve many of these complexities.
With the help of AddaTech, your company will be able to implement robust, reliable
and above all, scalable systems.
About AddaTech
At AddaTech Integral IT Solutions LLC, we help optimize your
company's business processes, while ensuring a quick return
on investment. We have more than 10 years of experience in
the industry and most importantly: We know how to make
your business more profitable and secure.