Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Does Your Security System Actually Catch Intruders?

By Rick Charney
May 4, 2010

With technology constantly improving, do you feel you are changing anything to better protect your property, business, or most cherished assets? One of the first technology solutions was the burglar alarm system and then came along CCTV to allow for the recording of video data. Connecting CCTV to the internet has opened up numerous valuable capabilities but what are you doing to take advantage of it. Traditionally, video analytics and intrusion detection track the amount of pixel changes on a camera to detect motion. By changing parameters and masking continuously moving motion, the control center can vary the amount of alarm triggers. The next generation of video monitoring centers have been able to integrate this technology with live trained operators to effectively evaluate every motion event and separate positive motion from false motion to determine whether to dispatch police or move on to the next motion event. Police raise the priority of their response if an operator calls in the fact that intrusion is being watched live as opposed to a system generated dispatch.

For example, a Texas based Fortune 500 company recently installed four cameras and contracted with an outsourced control center to live video monitor the cameras at night when the facility was closed. Within the first week, an employee was caught stealing gas and two intruders were sent to jail after trespassing at 2:30am with empty eighteen wheelers ready to be loaded up. Government facilities are now using surveillance centers to remotely activated speakers, turn on lights, open and close gates and move PTZ cameras around a facility to monitor loitering and illegal activities and even monitor the parking lots. Industrial properties with surveillance systems are drastically improving productivity and operational efficiencies by allowing management to oversee employee activity and production lines across numerous facilities all from one office. These are just a few examples of the success stories within the industry but you could ask a monitoring control center who manages hundreds/thousands of client’s surveillance systems remotely to see how they have benefited someone’s life today by using the latest live monitoring capabilities.

Many companies have invested in existing surveillance systems that are just recording to a DVR for after the fact evidence. These investments indicate that losses and problems have occurred but what if there is technology to help these investments can create more value. Companies using live video monitoring services are having trouble imagining life without the customized service. The value is easily measurable to them and the solution of proactively watching security cameras seems so obvious. For example, a client spends $4,000/month (50 hours/week) to $8,000/month (108 hours/week) for a patrol officer to roam around the lot after working hours. Live video monitoring centers can watch all the surveillance cameras around the facility for 12 hours a night or whenever the lot is closed for a fraction of the cost. Reducing the amount of patrol service hours to only peak hours between 11pm and 2am, or eliminating the service completely, will save considerable dollars. Keep in mind that the DVR can be connected to open and close motorized gates, activate audio speakers, and lights to provide the physical presence feeling and to offer guard services such as authorizing late night tow trucks to deliver vehicles after hours in secured areas. Anyone can explain that the security budget can be reduced on a monthly basis and have better protection by having every camera on the property both inside and perimeter being live video monitored whenever the facility is closed. The live video monitoring center is not waiting for any alarms or beams to be triggered but proactively watching surveillance cameras.

When there is motion detected using video analytics that is not related to a person or car moving, the operator can move on and look at the next video clip. So if 1,000 cameras are being live video monitored and about 20 percent of them have motion detected at the same time, and out of those 20 percent, about 90 percent are not a person or car, you are left with about 20 to 30 cameras per trained operator. When there is unwanted activity, the live trained person with the help of video analytics, can instantly watch each camera on the larger monitoring screens to stream live continuous and historical footage to further investigate. The larger screens can be already streaming live continuous video footage of high crime or high activity cameras while the live motion driven pop-ups are viewed on smaller screens. The advanced live monitoring centers also have the ability to instantly call up every camera location on a facility map, protocol of customized instructions, contact information such as who to call, reporting forms with analytics, compatible access control software, and more. Only unusual video clips are sent to a client when an event occurs that needs to be reported.

The next generation of live video monitoring centers will have all the abilities described above and will continue to reduce crime and save money by using advanced video management software and controlled human intervention. By applying the latest cost effective technology and services, any end user will be able to customize their protocol and get more value out of their surveillance system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Does Your Security System Provider Protect Your Data Enough?

    See More
  • Businesses Take 7 Months to Detect System Intruders

    See More
  • cyber communication freepik

    Does your communication platform guarantee data security – and data privacy?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing