NOVEMBER 2023

DOWNLOAD ISSUE

HELP

ARCHIVES

// Video Solutions

How VMS Is Keeping Pace With Third-Party Software & Hardware

Personal computer, Input device, Peripheral

An operator reviews the video footage associated with the credential that granted a visitor access to the door in AXIS Camera Station Secure Entry.

IMAGE COURTESY OF AXIS COMMUNICATIONS

Amidst a large influx of third-party software and hardware solutions available for video surveillance systems, VMS manufacturers examine the factors allowing the industry to be open to integrations.

By Laura Stepanek, SDM Contributing Writer

SHARE

Today, there is a huge spike in new, third-party software and hardware technologies available for video management systems (VMS). This fact alone means that the VMS may be the most important component of your customer’s surveillance system. When selecting a VMS, security integrators should evaluate not only how it collects, records/stores and displays live and recorded video from cameras; they also should consider the vast array of additional tasks the VMS can do through third-party software and hardware.

There are hundreds of different applications available today — many of which are powered by artificial intelligence — that a VMS can administer. Among them are:

  • Sophisticated video monitor walls.
  • Powerful forensic searches.
  • License plate recognition.
  • Access control system management.
  • Asset security and tracking.
  • Monitoring restricted security areas.
  • Monitoring acoustic/sound sensors.
  • Vape and air-quality detection.
  • Central station live video monitoring.
  • Privacy masking.
  • Point-of-sale integrations.
  • Geolocation services.
  • Smart building management.
  • Facial detection.
  • Radar and lidar sensors.
  • Vehicle scales.
  • Wide variety of analytics.

SHARE

Slayton

In order to be competitive in the security marketplace, it is essential that a VMS provides security integrators with access to third-party solutions. Access starts with manufacturers designing systems that allow integration to occur without difficulty. Beyond this, integrators can select manufacturers that have technical partnerships with a wide range of other software and hardware companies.

“That is precisely what a systems integrator is supposed to do — integrate various software and hardware systems to create a unified security system that addresses their customers’ unique situations, concerns and issues,” says Dan Berg, senior product manager for integrations at Salient Systems, Austin, Texas.

Access to third-party software and hardware has many benefits, including flexibility, innovation, interoperability, cost-effectiveness, scalability and future-proofing of the security system, says Jason Burrows, sales director at IDIS America, Coppell, Texas. “In turn, it offers more project upgrade opportunities,” he says.

The Bosch Video Management System interface displays a map view and a live camera view to an operator.

IMAGE COURTESY OF BOSCH SECURITY & SAFETY SYSTEMS

BVMS

Some VMS companies offer hundreds of third-party integrations. “That means there’s a lot of competition within even specific ones, such as biometrics, which gives you better pricing options so integrators can do more,” says William Hinton, product line manager at Genetec Security, Montreal. Having many options helps integrators address customers’ different size budgets and system sizes, as well as their changing requirements over time.

“I think it boils down to choice and options; no one wants to say ‘No’ to their customers,” Hinton says. “We want to be able to say, ‘Yes, I can do that.’ Having access to third-party integration software/hardware gives you more options to tailor to your customers’ needs.”

Even some highly unique problems can be solved with special sensors integrated with a VMS. For example, Genetec’s VMS pairs with sensors that perform heat and visual analytics to ensure with very high precision that the gas flares used to burn off chemicals in gas/petroleum refineries stay lit so that the refineries comply with laws that prohibit releasing noxious fumes into the atmosphere.

AI Applications for the VMS

There are perhaps thousands of third-party software and hardware applications that can be used to enhance a video surveillance system. Through their integration with a VMS, these applications can produce not only a more full-featured surveillance system, but in some cases create an entire ecosystem for security, safety and other business functions.

Among all the mainstream as well as unique applications, artificial intelligence (AI) heads the list in terms of its possibilities. “From cloud-based AI-powered analytics to embedded AI analytics on cameras, artificial intelligence is being applied everywhere to everything — from analyzing point-of-sale transactions to facial recognition to anomaly detection,” describes Dan Berg at Salient Systems.

In addition to performing common security applications, such as proactive response or forensic investigation, AI is involved in audio detection, business optimization, and reporting/data aggregation, reports Vincent Campisano at Axis Communications. “A VMS that allows users to access and leverage this data alongside existing surveillance and door-control functionality will be the VMS of the future,” he says.

When deep-learning technologies are integrated into VMS they enable advanced video content analysis for functions such as object recognition, behavior analysis and anomaly detection, says Jason Burrows at IDIS America. With the power of AI, VMS can automate tasks, improve accuracy and provide real-time alerts of potential security threats. The VMS platform becomes more useful when it can be integrated with IoT devices such as sensors, access control systems and alarms to create a comprehensive security ecosystem, Burrows describes.

Dave Nieweg at Milestone Systems says the industry is witnessing an accelerated evolution in AI and machine learning, with systems delving deep into extracting multi-layered information from systems. This bridges the gap between transactional, video and audio data. “This isn’t just about analyzing recorded data anymore; we’re transitioning from reactive to proactive — and even venturing into the realm of predictive security,” he says.

And beyond security, organizations are using video technologies to help enhance daily operations and customer services, his company observes. “Open platform, data-driven video management technologies today can assimilate, process and visually present data from an extensive array of analytical software, specialized cameras, sensors and pre-existing facility systems,” Nieweg describes. “In essence, video management systems have evolved into the central platform that seamlessly integrates all this intelligence into a unified data stream.”

For example, AI-powered video analytics tools on a VMS platform can provide operational insights, such as customer behavior analysis, people counting, heat mapping, queue management and occupancy monitoring. “Integrating VMS with video analytics can help businesses optimize operations and improve customers’ experiences, particularly in retail and hospitality settings,” Jason Burrows at IDIS America says.

The need for privacy is also driving how video surveillance systems are capturing, recording and displaying images of people. AI applications are helping here as well. An example is weapons detection, where both K-12 and higher education can monitor their facilities while keeping the faces and names of people out of the mix, describes Ken Francis of Eagle Eye Networks.

In the property management sector, security issues including people going missing or people coming onto a property who represent a threat are present in both high-rise buildings and malls, Francis says. A VMS that can do one-to-one matching can help with forensic investigations of these, while maintaining privacy of individuals. One-to-one matching confirms that an image of someone matches a different image of the same person, such as one contained in a database, on a credential, or in recorded video footage.

“That has nothing to do with identification; it has to do with the matching,” Francis says. “And it’s algorithmic, not an image. That is extremely hot in property management right now. We have four or five API tech partners that do that facial matching in different parts of the world.”

Bosch Security and Safety Systems’ VMS platform features an AI-based privacy overlay feature designed to meet privacy requirements, explains Michael Brewer at Bosch. “Privacy regulations around the globe have challenged VMS manufacturers to provide solutions that can conceal identities to VMS operators in select surveillance areas. Anonymizing persons in the field-of-view of selected video streams enables businesses to maintain the safety and security of people and property by visualizing the right information at the right time, while protecting the personal privacy of individuals captured on video,” he explains.

One other major application that is on point for central monitoring stations is using AI in video monitoring. “The problem with video monitoring is it can create a lot of false positives,” Francis says. “You get a dog running between the vehicles and now the operator in the monitoring center has to look at the video and figure out whether it’s a real or a false alarm. In today’s world there are dozens of AI companies that are focused on the reduction of these false positives,” he explains.

//

“Third-party solutions are beneficial for the integrator because they allow integrators to expand their total offerings, penetrate new markets, and meet different needs outside of their current scope through the adoption of new technology within a familiar VMS framework,” describes Vincent Campisano, program manager for video management at Axis Communications, Chelmsford, Mass.

Michael Brewer, North American regional marketing manager for recording and storage solutions at Bosch Security and Safety Systems, Fairport, N.Y., concurs, saying, “With rapidly evolving system requirements, no one manufacturer can provide everything that every customer might need. It is important that integrators consider VMS solutions that are flexible with providers willing to integrate with the new third-party solutions becoming available.”

An often-overlooked aspect of open architecture software is the fact that multiple third-party companies produce similar products. This provides a layer of redundancy, because there is often a similar solution that can be easily implemented as a backup plan, Campisano says. “Open architecture systems help keep integrators on their A-game with constantly evolving offerings.”

Restrictions of Closed Architecture

Dave Nieweg, community program manager at Milestone Systems, Portland, Ore., says that an integrator’s ability to swiftly adapt to emerging technologies and trends can be the difference between retaining or losing clients. “If they can’t stay ahead and bridge the expanding gap between a customer’s current system and their future aspirations, they risk facing a rip-and-replace scenario.”

In this regard, security integrators need to rely on manufacturers to be open to third-party technology partnerships. However, Nieweg, like others, believes that many video management systems generally are not keeping pace and that the security industry is lagging behind in leveraging the rapid advancements seen in other sectors. This is due to many security systems having closed architecture, where it takes a lot of work by the owning company to build rich features and functions into their platform to leverage the new technologies, he says.

Genetec Security Center unified platform provides a seamless experience for third-party software and hardware integration.

IMAGE COURTESY OF GENETEC

Omnicast Nurturing Campaign VMS Course

In contrast, open platform VMS enable a rich ecosystem of third-party software and hardware to flourish, Nieweg says. “In today’s fast-evolving world, it’s critical for systems to possess the agility to incorporate new features swiftly and phase them out when obsolete,” he emphasizes.

Hinton points out that it’s not necessarily realistic for a closed VMS to keep pace with all of the innovation in third-party software and hardware occurring today. “Simply look at your iPhone — could your iPhone possibly live without the App Store? Think of all the different value that gets added to that,” he says.

Part of the discussion about open architecture is philosophical; manufacturers such as Genetec and others want to offer as many choices as possible — in cameras, storage and more — to their customers. “But it’s also technical in that you have to have compatibility with the protocols that are used in order to communicate with our software solution,” Hinton describes. “Being open to these standard protocols for communication is part of that open architecture.”

One of the parts of open architecture is linked to the Open Network Video Interface Forum (ONVIF), an open industry forum that provides for standardized interoperability of IP-based security products. Many VMS platforms have compatibility to one or more of the ONVIF profiles. While ONVIF prescribes certain levels of compatibility, some manufacturers go beyond that to offer deeper functionality based on their open integration partnerships.

How Integrations Are Handled

Integrations between open VMS manufacturers and third-party software and hardware can be accomplished several different ways, including through software development kits (SDKs) and application programming interfaces (APIs).

“SDK is a development package that contains a set of code libraries, samples and documentation that enables developers to create custom solutions and integrations with Genetec Security Center (GSC), our flagship product,” Hinton says. “In addition to this main GSC SDK, we have other GSC features/modules, as well as other Genetec products … that have their own APIs that enable communication and integration via a set of API calls/commands. These are all documented and available for internal or public use.”

Honeywell’s MAXPRO VMS controls multiple sources of video subsystems to collect, manage and present video along with AI-based video analytics through Honeywell’s Intelligent Command.

IMAGE COURTESY OF HONEYWELL BUILDING TECHNOLOGIES

Sec Control Rm MAXPRO

The Role of Open Architecture in Third-Party Support

If open architecture is foundational to third-party integrations with VMS, then what exactly is open architecture and is it synonymous with open API?

Open means that you’re willing to do it and an API is how you integrate, says Ken Francis of Eagle Eye Networks. “API is the documentation that you give to people, but if you’re not willing to give it to them, then you’re not open — you’re closed. You’re choosing who to give it to. Open architecture really means anybody who wants it can have it.”

Francis cites the ONVIF profiles and how they originated. “A whole bunch of security industry people got together and said, ‘This is silly — all of our cameras talk a different language. Customers are really mad that anytime they want to move from one recording platform to another, they have to rip out all the cameras. So, let’s create a standard for the communication protocol between cameras and recording devices, and let’s have all the camera manufacturers write that code to that standard.”

“I would say ONVIF Profile S is the epitome of open, because it’s published; you don’t have to go ask somebody for it, you just look it up and you’ve got it. Our APIs are also published. We can’t say no to anybody because we’ve published them on our website. That’s why we call ourselves open,” Francis says.

There is also the aspect of open architecture that facilitates a faster time-to-market, says Dave Nieweg at Milestone Systems. “When a VMS operates on an authentic open platform, it sidesteps the cumbersome, time-consuming processes like complex legal negotiations or crafting intricate go-to-market strategies. Without an open framework, third parties likely find themselves mired in red tape, potentially taking years to reach a desired level of integration.”

Dan Berg of Salient Systems says that without an open architecture, it is difficult or even impossible to support third-party software and hardware — but that is only part of the solution. “The VMS vendor needs to provide the tools – API and SDK – so that third-party vendors, developers and integrators can integrate their software and hardware to the VMS,” Berg says.

It is a misnomer to say that closed protocol systems don’t integrate with third-party systems, given that “a majority of video and access control systems are built on proprietary protocols. This is what makes the availability of APIs and SDKs essential,” says Jason Burrows of IDIS America.

Burrows also cautions about challenges systems integrators may face — including compatibility issues, security risks and potential performance issues — in using open architecture in supporting third-party software and hardware for VMS, he says. “Integrating third-party software and hardware can introduce security vulnerabilities that can compromise the entire system if it is not properly vetted or does not meet industry standards for security,” he says.

//

As further examples, the latest version of the Bosch Video Management System features a new REST API that provides easy integration development for emerging third-party solutions, Brewer describes.

Honeywell’s partners can make use of integration APIs in its MAXPRO VMS open-technology solution to leverage events and attributes from many third-party systems in a seamless manner on MAXPRO interface. “Open technology and standards are always a key to future-proofing of technology platforms like VMS, as third-party products become available in the marketplace,” says Tami Wenzel, senior offering manager, commercial security, at Honeywell Building Technologies, Atlanta.

And Salient’s CompleteView VMS is an open platform, meaning it runs on non-proprietary hardware, offers multiple APIs for integration with third-party systems, and supports industry standards such as ONVIF which provide effective means to ensure interoperability with virtually any camera, Berg notes.

In addition to server-based systems, cloud VMS architectures also can be open to third-party integrations. One example is the Eagle Eye Networks Cloud VMS platform, which uses an API ecosystem that the company says attracts considerable third-party innovations and provides for cybersecurity of the data.

“What’s unique about a cloud-based VMS is that we build our software on top of our own APIs. So, all of those tech partnership integrations — third-party software or hardware functionality — are really predicated on some other company using our APIs to either pull video out of our system or use some of the features in our system inside of their user interface,” describes Ken Francis, president of Austin, Texas-based Eagle Eye Networks. “That’s what truly defines an API ecosystem. We have hundreds and hundreds of tech partners who use our documented API, which we’ve been publishing since the inception of the company.”

Security operators in this centralized monitoring environment use the IDIS Solution Suite VMS and IDIS Deep Learning Analytics.

IMAGE COURTESY OF IDIS

IDIS Image

Eagle Eye says it is this API economy that enables third-party software and hardware to function well with VMS and to keep pace with today’s level of integration.

Campisano at Axis Communications says when it comes to VMS developers and security manufacturers keeping pace with newer technology, including AI or edge devices, it almost always boils down to their go-to-market strategy. “It is far simpler, both logistically and developmentally, to integrate new third-party hardware or software into an open architecture VMS. This provides an integrator with the added benefit of being able to solve unique or complex customer problems in an agile way,” Campisano says.

“Open-architecture hardware also plays a significant role in directly integrating into a VMS. This provides two avenues of third-party software integration: first at the VMS level, and second at the physical hardware level,” he explains. “Open-source cameras can use third-party applications, which may be developed to run at the edge and integrate into a VMS — as opposed to directly integrating with the software.

“VMS providers utilizing closed architecture will have a more difficult time justifying and implementing third-party technologies due to the proprietary nature of their product. The inverse of this is true for open-architecture systems. Open software allows for customized adjustments and integration of new technology, but the complexity of a solution will increase directly with a software’s ability to meet specific and niche applications,” Campisano believes.

Milestone Systems’ XProtect Rapid REVIEW powered by BriefCam allows the security operator to review, search and analyze hours of video footage in minutes.

IMAGE COURTESY OF MILESTONE SYSTEMS

Milestone VMS 2

Overall, open-architecture solutions will keep up with the innovation of third-party technology much more effectively than closed solutions, he adds. And that plays a big role in a VMS’s ability to nimbly adapt to market shifts with cutting-edge technology. SDM