Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Inside Security Integration

By John Mesenbrink
January 20, 2003
SECURITY talks with systems integrator, North American Video, Brick, N.J., about the essentials of systems integration. The following is a Q & A session with Cynthia Freschi, president of North American Video.

Q: What types of standards, platforms and protocols do you recommend for your customer?

A: At North American Video, our system design parameters are dedicated by the user’s specific needs and applications. Every customer has different needs that are based on a number of factors, which are limited to current CCTV equipment and specified platforms required by the IT departments. Today, network compatibility and available bandwidth are increasingly recurring concerns as users are starting to look at IP-based systems. This is the direction that the security industry seems to be headed in at this current time.

Q: Similarly, what type of camera equipment and compression schemes do you recommend? Or does each particular application demand a unique setup specific to that project?

A: Every installation North American Video is awarded is approached as a unique installation. There are very few instances where the same system installation may apply in two different locations. A perfect example is the over 175 post office facilities where we’ve installed CCTV systems in the New York tri-state area. The system parameters are basically identical, but each system had its own nuances. Factors such as lighting, building construction and physical layout called for each system to be modified to best meet the specific location. Casinos also have similar needs, but the system we’ve designed and installed for the Tropicana is very different from the system we are presently installing in the new Borgata Hotel & Casino in Atlantic City. At this level, no two systems are ever quite the same. Each application demands its own particular specs.

Q: With digital being the most dominant factor in CCTV, how

do you avoid bandwidth or network space allotment problems?

What do you recommend here?

A: Networked IP-based video surveillance systems are the wave of the future. Several of the leading manufacturers are heavily promoting their IP video systems capabilities, but in reality, this technology is still a few years away from replacing more conventional and proven forms of transmission for core systems operations. To run a large CCTV system, most mid to large systems will require a dedicated 1GB Ethernet network. Without such bandwidth and speed, the concept of adding a security system onto an existing data network is simply not practical. For most situations, we still recommend fiber optics transmission systems with integrated Ethernet integration for specialized remote monitoring applications. We believe this is the most effective combination of transmission technologies based on the hundreds of systems we’ve installed to date.

Q: Take us through the process of integrating video with access control. Is it a seamless transition or is it more complicated than that?

A: Video surveillance systems manufacturers have realized that there is a distinct need to interface alarm, access control and CCTV systems together. Today’s advanced matrix systems have software driven capabilities that allow them to detect and react when an alarm has been triggered or an access/entry site has been compromised. There are also several different software control programs with hardware emulation that are making it easier and more efficient to integrate alarm, access control and CCTV systems. North American Video’s ability to integrate security systems has been instrumental in securing some of the industry’s largest security systems contracts.

Q: Please explain the complexities of retrofitting. How do you balance the old technology with the new? Are systems then open to scalability?

A: Technology is changing so fast that CCTV systems installed just a few years ago are paled by comparison to today’s new devices. Cameras, digital recorders and computer driven swtichers are the primary factors for the improved performance capabilities. However, no one likes to discard equipment after a few years when it seems to be functioning well. We try to incorporate as much of a user’s existing systems as possible unless we feel the existing equipment compromises the integrity of the facility’s security. Older cameras can be positioned in secondary locations where activity is more crucial to detect than identification; recorders can be reassigned and so on. The condition and performance of the existing systems need to be evaluated on a case-by-case basis before any retrofitting can be seriously considered. As a result, retrofitting is often more difficult and equally expensive as installing new systems components. With new dome cameras, for example, one camera may replace two or three units because of its superior coverage capabilities and sensitivity.

Q: Do you recommend or offer offsite management? The ability for a manager to monitor his or her site remotely is important to some. How do you integrate video with the Web, PDAs and wireless?

A: We recommend what we believe best meets our clients’ needs. North American Video provides offsite remote viewing solutions when and where they are appropriate, but we do not provide monitoring services in-house. With today’s Broadband connections we are able to send video and control signals via the Internet, which allows the user to access their security system from any PC. Interfacing video with the Internet is no longer a mystery with the vast assortment of interfaces and software available. There are even new networking solutions available that allow images and system data to be transmitted directly to wireless PDAs and cell phones.

Q: How can the final security package result in a security management system? Briefly explain how that works.

A: By clearly defining a user’s security objectives at the onset of a project, we have a clear-cut idea of how the system will look, feel and perform before installation takes place. Given the high level of integration between CCTV, access control and alarm systems technologies, most of the systems we design are security management systems since they incorporate all of the essential security elements.

Q: Do you offer training for end users? Please explain.

A: North American Video provides on-site training with unlimited technical support for our customers. This is a critical stage for users when implementing a new security system, or even when upgrading a system. They need to know how to get the most out of their system from day one.

Q: How important are customer service and support?

A: When a customer knows he/she can depend on you to keep their security operation up and running, especially if a problem arises, you’ve probably made a customer for life. This business is all about reliability—a security system is useless if it is not functioning 100 percent. That’s why customer service and support are top priorities at North American Video—there’s nothing more important. It is one of key reasons why North American Video has grown exponentially over the years.

Q: Which video companies do you work with and what is the significance of teaming with these companies?

A: We work with every major manufacturer in the security industry. This gives us access to all the latest new products and technologies for each specific design and installation. It also provides access to specialized equipment that is often needed from installation to installation for specific application requirements.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fighting for Fire, Security Integration

    See More
  • April-issue-preview.jpg

    Inside Security's April 2022 issue: Preparing global security operations centers for remote connectivity

    See More
  • SEC Podcast Header Will Bernhjelm

    Inside SECURITY 500: Reinventing Security Leadership

    See More

Related Products

See More Products
  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing