Security Technology: Centralize or At the Edge?
December 19, 2008
The varying kinds of security technology on the market can be difficult to sort through. The first thing facility executives should do when considering upgrades is to do a threat assessment. A threat assessment provides the planning foundation for any upgrade.
Beyond a threat assessment, there are two types of technology on the market. Cameras for example, can be purchased that employ sophisticated video analytics. The analytics are carried out by the camera itself, which can reduce network bandwidth.
Another approach centralizes analytics by using a server to do the work. That makes it easier to upgrade in the future.
So whether the technology is embedded "at the edge" or is centralized on the server, make sure it's the option that works best given network bandwidth and the needs of the organization over the long term.
Read next on FacilitiesNet