SlideShare ist ein Scribd-Unternehmen logo
Capt SB Tyagi ( ; ) 1sbtyagi@gail.co.in sbtyagi1958@gmail.com
The environment, in which the Security operates, has
changed beyond recognition. The ease of travel, more open
borders and digital technologies have globalized criminality,
making it far harder to contain and prosecute. Terrorism, of
course, is notoriously borderless. But globalization has also
massively expanded opportunities for organized crime. And
technology, by spawning new kinds of crime while facilitating
the traditional variety, is helping lawbreakers become ever
bolder and more difficult to track down.
The shelf-life of security technology and the functional life of security systems have been
severely challenged by fast paced innovations and newer technology. Today’s technology is on
the verge of obsolescence and yesterday’s technology is obsolete already! The investment on
security systems and measures are directly linked to ROI and the operational life of the security
systems.
One of the biggest challenges enterprise and public sector organizations face is in leveraging
existing infrastructure like video surveillance to deliver more value, better situational awareness,
and faster threat recognition and response. We need to gain a better understanding of today’s
challenges and best practices in video surveillance and physical security, and how they can
maximize existing security assets while minimizing risk.
We need to learn how the combination of PSIM, behaviour recognition technology and video
surveillance can improve existing security infrastructure as well as gain insight on how data can
be analysed for dramatic improvements in situational awareness, response and resolution.
To maximise the security with existing infrastructure, following are the essential ingredients -
 Thinking out-of-the-box!
 Innovation and application
 Know your inventory
 Know your technology
 PSIM
 Predict and improve through analytics
 Data storage – cloud computing
 Trust the team
 Optimize ways of working
 Enhance collaboration
 Proactively manage changes
Physical security information management (PSIM) is a category of software that provides a
platform and applications created by middleware developers, designed to integrate multiple
unconnected security applications and devices and control them through one comprehensive
user interface. It collects and correlates events from existing disparate security devices and
Capt SB Tyagi ( ; ) 2sbtyagi@gail.co.in sbtyagi1958@gmail.com
information systems (video, access control, sensors, analytics, networks, building systems, etc.)
to empower personnel to identify and proactively resolve situations. PSIM integration enables
numerous organisational benefits, including increased control, improved situation awareness and
management reporting. Ultimately, these solutions allow organisations to reduce costs through
improved efficiency and to improve security through increased intelligence.
A complete PSIM software system has six key capabilities:
 Collection: Device management independent software collects data from any number of
disparate security devices or systems.
 Analysis: The system analyses and correlates the data, events, and alarms, to identify
the real situations and their priority.
 Verification: PSIM software presents the relevant situation information in a quick and
easily-digestible format for an operator to verify the situation.
 Resolution: The system provides Standard Operating Procedures (SOPs), step-by-step
instructions based on best practices and an organization’s policies, and tools to resolve
the situation.
 Reporting: The PSIM software tracks all the information and steps for compliance
reporting, training and potentially, in-depth investigative analysis.
 Audit trail: The PSIM also monitors how each operator interacts with the system, tracks
any manual changes to security systems and calculates reaction times for each event.
A key differential between PSIM based integration and other forms of physical security system
integration is the ability for a PSIM platform to connect systems at a data level, contrasting other
forms of integration which interface a limited number of products. PSIM allows use of open
technologies which are compatible with a large number of manufacturers. These PSIM products
offer more opportunities for expansion and can reduce implementation costs through greater use
of existing equipment. PSIM solutions in general are deployed to centralize information to single
or multiple control hubs. These are referred to as control rooms or command and control centres.
Security systems typically integrated into a PSIM solution include;
 Access control systems
 CCTV
 Fire detection
 Video wall
 Intrusion detection system
 Perimeter Intrusion detection system
 Radar based detection
 GIS mapping systems
 Intercom
 Automated barriers & bollards
 Building management systems
 Lighting control system
 Power Monitoring System
Capt SB Tyagi ( ; ) 3sbtyagi@gail.co.in sbtyagi1958@gmail.com
Behavioral Recognition Systems: It is Behavioural Analytics technology that analyses video
content by imitating learning and memory processes of the human brain. This fully automated
scalable surveillance technology is different from all Video Analytics systems since it is able to
autonomously detect abnormal behaviour in real time, without the need of human intervention.
The computer software utilizes the behavioural Analytics technology, which monitors a scene
through each camera separately and learns on behaviour. This system combines computer vision
with cognitive machine learning processes, and it develops patterns for different classes of
objects. These patterns later become rules for the system that autonomously detaches normal
situations from those that can be possible threats.
Functionality
 Reason-based system: Unlike the traditional, rule-based system, Behavioral Analytics is
the reason-based system that enables a machine to learn what is abnormal, without
human pre-programing. By decreasing the number of alerts, it helps security officers to
perceive more threats in real time.
 The Entire Field of View Analysis: BRS analyses the total field of view through each
video camera in closed-circuit television system, despite certain difficulties, types of
equipment or specific conditions on a scene.
 Continuous Learning and Modifying: Unlike the traditional video surveillance rules-
based technology, BRS permanently learns and registers when some changes occur, so
any on-going programing is not necessary.
 Open Standards: It is the "open standards" system which enables it to cooperate easily
with different infrastructures, both the existing ones and the new ones. This video
surveillance technology has been deployed globally across critical infrastructure facilities,
intelligence agency applications, urban areas, seaports, financial institutions and others.
 Easy Installation: BRS needs maximum of a few days for the complete hardware and
software installation, regardless of the number of cameras that need to be connected into
the system and without any changes on the client's site.
Moving your Infrastructure to the Cloud:
In all probability, the CCTV system needs largest storage space. The need increases with advent
of HD cameras. A typical CCTV System with 140 cameras of fixed focal and 10 DH cameras, the
storage needed for 30 days recording with reduced frame rate is 20 TB approximately. With the
number of HD cameras and the types of video analytics increase, the storage space goes for
quantum leap! In such scenario the cloud computing is better alternative.
With Cloud Computing becoming more widely utilized, it is important for organizations to
understand ways to maximize benefits and minimize risks of a move to the cloud. Buyers need to
appreciate that assessing individual providers is critical to the success of Cloud Computing
programs.

Weitere ähnliche Inhalte

Mehr von Capt SB Tyagi, COAC'CC*,FISM,CSC,

Mehr von Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 
News letter jan 13
News letter jan 13News letter jan 13
News letter jan 13
 
Saw security awareness part v
Saw   security awareness part vSaw   security awareness part v
Saw security awareness part v
 
Security Awareness Part II - women security tips
Security Awareness Part II - women security tipsSecurity Awareness Part II - women security tips
Security Awareness Part II - women security tips
 
Security Awareness Part I
Security Awareness Part ISecurity Awareness Part I
Security Awareness Part I
 
Lesson learnt from mumbai terror attacks.
Lesson learnt from mumbai terror attacks.Lesson learnt from mumbai terror attacks.
Lesson learnt from mumbai terror attacks.
 
Crime investigation
Crime investigationCrime investigation
Crime investigation
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 

Kürzlich hochgeladen

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...sanghavirahi2
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 

Kürzlich hochgeladen (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 

How to maximize security with existing infrastructure basis

  • 1. Capt SB Tyagi ( ; ) 1sbtyagi@gail.co.in sbtyagi1958@gmail.com The environment, in which the Security operates, has changed beyond recognition. The ease of travel, more open borders and digital technologies have globalized criminality, making it far harder to contain and prosecute. Terrorism, of course, is notoriously borderless. But globalization has also massively expanded opportunities for organized crime. And technology, by spawning new kinds of crime while facilitating the traditional variety, is helping lawbreakers become ever bolder and more difficult to track down. The shelf-life of security technology and the functional life of security systems have been severely challenged by fast paced innovations and newer technology. Today’s technology is on the verge of obsolescence and yesterday’s technology is obsolete already! The investment on security systems and measures are directly linked to ROI and the operational life of the security systems. One of the biggest challenges enterprise and public sector organizations face is in leveraging existing infrastructure like video surveillance to deliver more value, better situational awareness, and faster threat recognition and response. We need to gain a better understanding of today’s challenges and best practices in video surveillance and physical security, and how they can maximize existing security assets while minimizing risk. We need to learn how the combination of PSIM, behaviour recognition technology and video surveillance can improve existing security infrastructure as well as gain insight on how data can be analysed for dramatic improvements in situational awareness, response and resolution. To maximise the security with existing infrastructure, following are the essential ingredients -  Thinking out-of-the-box!  Innovation and application  Know your inventory  Know your technology  PSIM  Predict and improve through analytics  Data storage – cloud computing  Trust the team  Optimize ways of working  Enhance collaboration  Proactively manage changes Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and
  • 2. Capt SB Tyagi ( ; ) 2sbtyagi@gail.co.in sbtyagi1958@gmail.com information systems (video, access control, sensors, analytics, networks, building systems, etc.) to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organisational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organisations to reduce costs through improved efficiency and to improve security through increased intelligence. A complete PSIM software system has six key capabilities:  Collection: Device management independent software collects data from any number of disparate security devices or systems.  Analysis: The system analyses and correlates the data, events, and alarms, to identify the real situations and their priority.  Verification: PSIM software presents the relevant situation information in a quick and easily-digestible format for an operator to verify the situation.  Resolution: The system provides Standard Operating Procedures (SOPs), step-by-step instructions based on best practices and an organization’s policies, and tools to resolve the situation.  Reporting: The PSIM software tracks all the information and steps for compliance reporting, training and potentially, in-depth investigative analysis.  Audit trail: The PSIM also monitors how each operator interacts with the system, tracks any manual changes to security systems and calculates reaction times for each event. A key differential between PSIM based integration and other forms of physical security system integration is the ability for a PSIM platform to connect systems at a data level, contrasting other forms of integration which interface a limited number of products. PSIM allows use of open technologies which are compatible with a large number of manufacturers. These PSIM products offer more opportunities for expansion and can reduce implementation costs through greater use of existing equipment. PSIM solutions in general are deployed to centralize information to single or multiple control hubs. These are referred to as control rooms or command and control centres. Security systems typically integrated into a PSIM solution include;  Access control systems  CCTV  Fire detection  Video wall  Intrusion detection system  Perimeter Intrusion detection system  Radar based detection  GIS mapping systems  Intercom  Automated barriers & bollards  Building management systems  Lighting control system  Power Monitoring System
  • 3. Capt SB Tyagi ( ; ) 3sbtyagi@gail.co.in sbtyagi1958@gmail.com Behavioral Recognition Systems: It is Behavioural Analytics technology that analyses video content by imitating learning and memory processes of the human brain. This fully automated scalable surveillance technology is different from all Video Analytics systems since it is able to autonomously detect abnormal behaviour in real time, without the need of human intervention. The computer software utilizes the behavioural Analytics technology, which monitors a scene through each camera separately and learns on behaviour. This system combines computer vision with cognitive machine learning processes, and it develops patterns for different classes of objects. These patterns later become rules for the system that autonomously detaches normal situations from those that can be possible threats. Functionality  Reason-based system: Unlike the traditional, rule-based system, Behavioral Analytics is the reason-based system that enables a machine to learn what is abnormal, without human pre-programing. By decreasing the number of alerts, it helps security officers to perceive more threats in real time.  The Entire Field of View Analysis: BRS analyses the total field of view through each video camera in closed-circuit television system, despite certain difficulties, types of equipment or specific conditions on a scene.  Continuous Learning and Modifying: Unlike the traditional video surveillance rules- based technology, BRS permanently learns and registers when some changes occur, so any on-going programing is not necessary.  Open Standards: It is the "open standards" system which enables it to cooperate easily with different infrastructures, both the existing ones and the new ones. This video surveillance technology has been deployed globally across critical infrastructure facilities, intelligence agency applications, urban areas, seaports, financial institutions and others.  Easy Installation: BRS needs maximum of a few days for the complete hardware and software installation, regardless of the number of cameras that need to be connected into the system and without any changes on the client's site. Moving your Infrastructure to the Cloud: In all probability, the CCTV system needs largest storage space. The need increases with advent of HD cameras. A typical CCTV System with 140 cameras of fixed focal and 10 DH cameras, the storage needed for 30 days recording with reduced frame rate is 20 TB approximately. With the number of HD cameras and the types of video analytics increase, the storage space goes for quantum leap! In such scenario the cloud computing is better alternative. With Cloud Computing becoming more widely utilized, it is important for organizations to understand ways to maximize benefits and minimize risks of a move to the cloud. Buyers need to appreciate that assessing individual providers is critical to the success of Cloud Computing programs.