Mobile Applications Gaining Ground in Security

The traditional office-based work environment is giving way to one that’s mobile and decentralized. Portable computing/communication devices such as wireless phones and the more sophisticated smart phones, PDAs, radio-frequency handsets, Netbooks and other Bluetooth, WiFi or 3G-enabled devices are freeing employees from their cubicles and creating the potential for increased mobility and productivity. And nowhere is this more true, or being greeted with more enthusiasm, than in the professional video security and surveillance industry.
Mobile and Web applications offer the promise of improved security operations, ranging from access control verification to remote video surveillance monitoring using hand-held devices or Web-based access, to more effective crime prevention through increased situational awareness. While the progress that network video and software development has made in the past few years is enabling this capability, the operational benefits are significant on their own and worth noting because of how they can positively impact an organization’s security strategy. 

Accessibility Wins

Most evident and arguably the primary reason for security management to include mobile and/or Web applications in the overall security plan is access to live or pre-recorded video surveillance images anytime, anywhere and on almost any mobile device. This remote monitoring flexibility, often at MPEG-4 quality, and the relative ease of installing video surveillance clients on a mobile device, provides management the opportunity to respond to and ultimately resolve issues faster and more efficiently.
And with some of the more sophisticated mobile devices and video surveillance software programs, built-in 3D visual effects, camera control functions and GPS features can provide additional and pertinent information to help strengthen the value of the system and the ROI (return on investment).
Video surveillance software for mobile and Web applications, which often include, at a minimum, motion detection and alarm notification features, can also help to add more eyes to a surveillance operation. These “intelligent” functions typically require low bandwidth while providing immediate detection and alerting for heightened situational awareness. Used in the proper applications, these programs can virtually eliminate the need to have an operator constantly monitoring a security system. Additionally, with mobile capability, on-site visibility of security personnel can be increased without compromising situational security and it is also feasible that mobility can affect manpower requirements and costs by allowing fewer personnel to cover an area. Think of the advantages on a campus environment where security guards can spend more of their time “in the field” as opposed to sitting behind a console in some administrative building.
Most video management software programs also offer mobile and Web application capability. The push technology which permits quick access to live video enables security management to make time-sensitive decisions from a remote location, review situations requiring collaboration with other parties or agencies, or even simply to manage staff remotely. Features such as push technology (automatic video delivery) are ideally suited to mobile video surveillance applications because it delivers live, real-time video to those who need it most, when they need it most. The video system becomes more valuable when the information can be shared and used immediately. 

Correlate and Fuse Video to Non-Video

Another benefit of mobile applications is their use in short-term and special event monitoring. For example, video surveillance and security for last year’s political conventions in Denver and Minneapolis made liberal use of mobile, Web and wireless technology.  Approximately 100 video surveillance cameras were installed in each of the convention cities and users accessed the system from sub stations, at mobile command and control stations, from individual police vehicles and from federal agency MACC (Mobile Agency Command Center) locations. The software control platform allowed authorized users to correlate and fuse video and non-video events. Alerts were then automatically delivered to viewers of interest on their
mobile devices.
Unlike promises made with other new and developing technologies, mobile and/or web applications provide a qualified result. Its effects can be found in alarm verification, as law enforcement agencies continue to expand false alarm fines or in improved situational awareness as agencies respond to a call, and even in manpower reductions as security personnel are better able to multitask. Mobile and web applications in the video surveillance arena can make the responder more aware of the surroundings and thus more efficient and effective in the performance of duties. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Cynthia Freschi

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.