Centralized Video Monitoring Comes Into Focus

March 1, 2007
/ Print / Reprints /
ShareMore
/ Text Size+


Centralized video monitoring has long been the holy grail of our industry because of its inherent efficiencies, including the optimized use of existing resources. Some early attempts to fashion a centralized video monitoring system included the use of videoconferencing codecs with multi-point camera capability. The limitations of the scalability, the high cost and the need for dedicated ISDN lines soon proved this solution unacceptable to the video security and surveillance market. As a result, the pursuit for a mainstream centralized monitoring solution seemed to languish – at least for a few years.

Then the advent of networking came along.

New software and digital hardware technologies combined with the increasing utilization of Ethernet, IP and wireless mesh based networks provides the control and transmission platforms required for advanced centralized control operations. Proprietary technologies have also been replaced by open platform solutions, which have further expanded the possibilities for more seamless means of integrating disparate manufacturers’ video surveillance products. These advances have also opened up new business models for end users, system integrators, service providers and manufacturers alike.

Web-based Applications, Too

Applications for centralized video monitoring are found across a wide variety of vertical security markets including retail loss prevention, property management, logistics, transportation, government and gaming, to name a few. The concept has further expanded to include Web-based monitoring for marketing and promotional activities in the form of video browsing as well as the more recent mobile monitoring technology.

What makes centralized video monitoring so attractive is its enabling ability, which allows security professionals to view data and manage an entire network of security devices from a single location, anywhere on the network. It is a significant step beyond centralized alarm monitoring and event management because it provides live visual confirmation of an incident. Additionally, video auditing and analytics can be employed to further enhance its value and benefits.

Now, instead of disparate video surveillance systems, which are monitored locally, an in-house corporate network can be used as a nationwide video monitoring network. This method not only links each store to a centralized management network but can also provide advanced functionality such as multi-site monitoring and management of security data, simultaneous monitoring, recording and playback, bi-directional communication (i.e. PTZ commands) and distribution of real time video to local law enforcement.

In the case of grocery chains, some stores have integrated their POS (Point of Sale) appliances to the video surveillance systems, which are centrally monitored. By using sophisticated programmable software, management can more easily track discrepancies and questionable activities at the check out as well as obtain real-time feedback. In some instances, the recorded footage can also be used for employee training.

Centralized video monitoring is a key tool for loss prevention professionals because it enhances coverage and assists personnel in performing their duties more efficiently. When combined with store operations, merchandising, marketing and human resources, centralized video monitoring can become a source of actionable intelligence, which allows management to better utilize their resources and improve business.

Reducing Costs

On a smaller scale such as an educational facility with multiple campuses in a surrounding geographic region, centralized video monitoring is equally as effective in helping to decrease and deter criminal activity. Additionally, the deployment of centralized video monitoring can help combat the vulnerability of the school’s financial operations. Because most schools have an extensive and sophisticated network, digital cameras can be added to the video surveillance network for only the cost of purchase and installation. With the increased coverage provided by the additional cameras and centralized monitoring, on-going expenditures for labor can be reduced. In some instances, insurance premiums can also be reduced.

The concept of centralized video monitoring also provides new business opportunities to systems integrators and security service providers in addition to smaller, regional monitoring companies. Due to financial or other corporate considerations, many organizations outsource their monitoring to a third party. The extensive expertise and services of these providers can help an organization’s security management overcome the obstacles and complexities of integrating video and data in a digital environment as well as the monitoring, management, emergency response and forensic analysis necessary to an overall security and surveillance system.

Video alarm verification is certainly one of the benefits that centralized video monitoring brings to a monitoring service provider’s offerings. If an alarm is generated, a video image of the site location is automatically sent to the central station along with the alarm signal. Central station attendants can then visually confirm the nature of the alarm and alert local police. More and more, municipal law enforcement agencies are refusing to respond to alarms unless they have been verified, and service providers can elicit additional revenue from this service.

Additionally, services that include statistical summaries with visual documentation, monitoring processes or managing people can also offer new vertical market opportunities to a service provider. By leveraging their core capabilities with video and data recording and auditing, security providers can go beyond the traditional mindset and offer enhanced value on an enterprise-wide level.

Finally, centralized video monitoring has diversified the traditional security vendor roles or, more commonly, partnering between manufacturers. Increasingly, products are designed with an open platform and developer tools are provided so that integration with other security related products is possible.

Market demands for centralized video monitoring have also provided the impetus for manufacturers to add advanced features to their products, which supplement the application. Today’s digital IP cameras feature monitoring enhancements such as megapixel image quality, built-in intelligence (motion detection, alarm management, locking controls, etc.) and encryption for secure communication.

Robotic security video units can be wirelessly integrated with a voice alert receiver via radio frequency signal. When the unit is activated, the receiver will deliver an audible announcement to security officers or property owners. For example, a message stating “Someone has entered the back lot” could be played by the receiver in the guardhouse.

SIDEBAR: Robotics, Low-light Video Make Impression

Centralized video monitoring is a hot business strategy, according to Security Magazine columnist Cynthia Freschi. But are other trends emerging such as robotics and specialty low-light cameras.

For example, a new automated crime deterrent product from Cross Point Industries protects large outdoor areas with a high-intensity light and security video capabilities that make it seem human-operated to an intruder.

Finding the Intruder

When activity is detected within a protected area, the light will turn on and rotate until it finds the intruder.  The light will then follow the intruder, giving the impression that they are being watched and recorded. The Ground Observing Reconnaissance Transmitter (GORT) unit includes a 500-watt halogen lamp, a security video camera mount and connections for 12 VDC camera power and video signal.  Such technology detects and responds to the presence of intruders within a protected area, while supporting cameras are typically used in outdoor environments.  

The key deterrent feature of the patented GORT unit is the effect of the tracking light on intruders.  When activated, the GORT unit aims its bright light in the direction of the intruder and follows the target if it moves around on the property.  Wireless sensors extend the reach of such an application so it can detect and track activity up to 1,000 feet away.  When activated, the light will oscillate left and right and then back to the target to remind individuals that they have been detected and are being watched.

Business applications include the sides or rooftops of large buildings, automobile dealerships, truck storage facilities, impound lots, schools and residences.  A high-end automobile dealership in Los Angeles is among the first businesses to install 12 of the units.

Another development centers on low light cameras that do not use IR LEDs. For instance, Speco Technologies’ latest series of cameras see in low light with “intensifier technology” that amplifies and maximizes existing light to generate pictures in darkness where other cameras cannot. A new feature being shown on the floor of the International Security Conference later this month are snap on covers that convert housings from the standard dark grey to decorator white. These covers can also be painted to match any décor without painting the actual camera housing.  

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Cynthia Freschi

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+