A Business Case for Off-site Monitoring

August 25, 2008
/ Print / Reprints /
ShareMore
/ Text Size+
Networked video has helped encourage more attention to third-party security video monitoring. One example, leveraging the acquisition of Trident Tek, American Dynamics has taken the network video recorder and added active content compression and support for MPEG4 to go with the existing MJPEG compression.

With the mobility of security video images, thanks primarily to IP, chief security officers can access their cameras from anywhere at anytime. What’s more important, however, is that the technology advances are encouraging enterprises to look outside for security video monitoring that was an inside job.

   
Also helping: video analytics, intelligence at the edge, better storage and improved image compression for transmission speed.

   
Kastle Systems, Compatible Technology Systems, ADT Security Systems and others are investing in infrastructure to allow them to offer security video monitoring services.

   
There’s no doubt that for both commercial and residential third party monitoring, those businesses have hit the wall in terms of traditional services such as burglar alarms.

  
For example, IMS Research said that the annual growth rate for the North American wholesale remote monitoring market is forecast to drop below 1 percent by 2011. The research also forecasts the total remote monitoring market will grow at over 7 percent year on year, resulting in a 3 percent drop in share for the wholesale monitoring market by 2012.



MONITORING FIRMS WANT MORE SERVICES

According to report author and IMS Research analyst Niall Jenkins, “There are two main drivers influencing the slower growth in wholesale monitoring revenues. Firstly, the number of independent alarm dealers is reducing, with many owners retiring or selling to larger players in the market. This affects the potential market for wholesale monitoring companies as the larger organizations usually monitor their own accounts. Secondly…alarm dealers benefit most when customers use additional services.”

While IMS sees new growth in the personal emergency response service arena, there also is potential in electronic access control and security video monitoring services.
Having “eyes” everywhere they are needed to verify alarms, check persons gaining access to sensitive areas, provide security for employees opening and closing facilities, and help maintain order at retail locations is becoming affordable.

Chief security officers can keep track of multiple facilities. They can take a day off or go on vacation and still supervise their businesses and confirm that things are being done correctly through their security service or directly, when needed, through the Web.

Among the uses of remote video surveillance systems are virtual guard tours in which a central station operator tours an entire facility through its video surveillance system on a regular schedule.
Some companies like the central station to make an announcement over the interactive audio monitoring system that a facility is being viewed. Unruly people at a fast-food restaurant who have not purchased anything can be asked to leave authoritatively through an interactive audio system. Video at the nightclub complex allows employee and cash areas to be monitored on-site or remotely along with doormen, crowd control outside the building and access control, which is tied in with video

 

MAKING A BUSINESS CASE

Elimination or reduction of security officer expenses is cited by some CSOs as a business reason to move to enhanced third party monitoring.

While monitoring firms always focused on telephone-delivered data specific to burglar alarms, fire alarms, emergency medical and carbon monoxide alerts, it was Sonitrol which pioneered voice verification.

Cities demanding less false alarms have, in some cases, pushed for even better verification including by video.

According to security executives at Westec InterActive, “We will see more and more state and county initiatives that require some video-verified response because police resources are stretched pretty thinly these days. Police don’t have the luxury of going to retail locations to respond to dumb alarms going off in the middle of the night.” Westec as well as some others offer third-party monitoring that blends video and audio with the ability of the monitoring person to “talk to” an individual in a store or building.

Thanks to IP-based and wireless video communications, both a traditional alarm and a video clip can be sent to a central station. Such applications can bring together security and management needs. Retail security executives using third-party monitoring services often have rolling audits in which the service goes from site to site to take a look at corporate compliance or do a point-of-sale interface audit.

Pricing for remote monitoring of video surveillance systems is still being developed as the capabilities of the technology increase and the hardware costs decrease. Some prices are based on the same model as burglar and fire alarms, with a fixed monthly price. But monitoring companies now are developing more complex services that reflect a higher price tag.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bill Zalud

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+