Skip to content Skip to sidebar Skip to footer

Cashing in on Your VMS System

By Paul Fisher | originally published on SECURITY TODAY

In banking today, the FBI and Federal Deposit Insurance Corp. (FDIC), have mandated security standards that require a minimum number of cameras and camera resolution in each facility. Often viewed as a grudge expense, video surveillance has been low on the priority list for investment, as financial institutions have historically struggled to see a potential return on investment in an analog or standalone DVR-based surveillance systems. This can often lead banks to forgo updates to systems – which ultimately can lead to physical and cyber security concerns.

When approaching banking security, it is important to offer security decision-makers as much information as possible about the benefits to migrating from an analog system to a digital one. One of those benefits is the potential in leveraging a video management system (VMS). Here are a few ways banks can utilize their VMS for business operations and security:

Access Control in Financial Institutions

In most types of financial institutions, compliance with industry regulations and audit trails are everyday events. It is necessary to link a video system to the transactions of an access control system when validating if the person using a traditional key card is actually the cardholder when entering a secured area, such as one governed by PCI regulations for credit card payment processors.

Another option would be the use of facial recognition, iris scans or fingerprint credentials to control access. With many available integrations between video management systems and physical access control software, banks can easily use video to verify a cardholder’s identity in the event that a credential has been stolen or replicated.

It can also assist in deterring employee theft, as only managers might be allowed access to certain areas of a bank. A VMS can help by notifying proper personnel immediately of who is requesting access, allowing them to either confirm or deny in real-time.

Read the full article on Security Today’s Website here!

Go to Top