Security Business

JUL 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 31 of 108

July 2019 / / Security Business 31 tems and NVRs selected for the job – creating a seamlessly integrated solution from different vendors. Designing a Complete Video and Storage Solution By selecting Profile T products, integrators and systems designers are able to select equipment armed with the knowledge of the specific features required for interoperability. Knowing that a product is Profile T conformant does not require knowledge of what is within that product, only that it will work with another Profile T device for streaming video and audio, and supporting PTZ. Most importantly, it will compress video – thus reducing overall storage needs and costs. With Profile T in place, the integrator can also implement Profile G, a specification designed to store, search, retrieve and play back media on devices or clients that support recording capabilities and on-board storage, for a complete video and storage solution. Profile G encompasses devices ranging from cameras and encoders to NVRs and video management systems, as well as those functions as included in such platforms as building management systems, physical security information management (PSIM) systems and other physical security systems. By bringing video playback into the profile concept and into ONVIF specifications, it becomes much easier for end-users, integrators, consultants The freedom of choice to select the best and most appropriate camera or NVR for the project, and to ensure that future additions to the video system will continue to be compatible with existing equipment, is one of the key benefits of using conformant products. Don't Run the Risk! Protect you Network from Damaging Power Surges Your First Line of Defense 800-753-2345 Request information:

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - JUL 2019