Issue link: https://resources.genetec.com/i/1448814
Open-architecture security systems allow you to right-size your investment in security. You can buy only the hardware, service and storage needed now, with the knowledge you can add to your system later as your needs change. Because open-architecture systems don't lock you into proprietary hardware, you'll have a larger choice of products from a wide range of manufacturers. Here are some tips to help determine initial features to invest in and how to design your security system to scale for future growth. – Know your regulatory compliance requirements: First up are the non-negotiables. Each jurisdiction has specific compliance requirements for security, and operators may not fully understand how this can affect things like server space to meet video retention specifications or access control logs. If your cultivation facility requires 200 cameras to ensure complete coverage and your state requires you to retain video footage for 90 days, how much storage do you need? The answer depends on multiple factors, including camera resolution, how many frames per second are recorded and whether you're recording 24 hours a day (as required in some jurisdictions). There's no way around it: You'll need to do these calculations to know you're buying enough data storage to comply with regulatory requirements. Cloud-based storage is an option that reduces on-site hardware costs. If your requirements mandate multiple months of video storage, a hybrid system may make more sense. For example, if 90 days retention is required, consider a solution with 30 days storage on-premises that can also upload to cloud storage. As the on-prem system reaches capacity, it continuously uploads the older video to archive. This approach meets your 90 days of compliance while minimizing upfront server costs. Law enforcement or legal teams may need to be able to review evidence history to determine if the video was downloaded or deleted. And so other features you may need for compliance could include remote connectivity for regulators to view video, watermarked video to ensure the video hasn't been tampered with and audit logs for compliance officials. Employee access credentials may also have special requirements. For example, you may need to keep a log of lost or stolen badges and choose a system that can immediately deactivate them to ensure they can't be used by unauthorized persons to enter your facility. Regulations vary significantly from jurisdiction to jurisdiction — and can be changed with minimal notice. Choose a security system that can easily be adapted and respond to new requirements, as well as your future growth. – Don't scrimp on security: Security hardware costs have dropped significantly in recent years as new manufacturers have entered the market. IP cameras are now mass-produced around the world. Choices for storage hardware and video appliances abound and it's tempting to make decisions solely based on cost. Something to remember: All security hardware requires software to operate. That's why it's important to look