Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

Video analytics capabilities drive new opportunities

By Florian Matusek
Video camera on top of building with cloudy sky behind it

Image via Unsplash

October 4, 2024

Organizations are deploying more cameras than ever, increasing the amount of available footage to help security teams address incidents. But analyzing all this footage can create new challenges. That’s where video analytics comes in for support.

Advancements in security technology and new approaches to machine learning have promoted the development of applications that can help address video management challenges. And while the availability and accuracy of video analytics applications have increased, today's solutions still require significant domain knowledge. That’s why it's important to learn about the different challenges that exist today, and what features and capabilities to consider.

Common video analytics and VMS challenges

Disconnected solutions

Many analytics solutions are separate from their video management system (VMS). They have a separate configuration interface, require different integration efforts, and offer their respective user interface. This doesn’t always fit perfectly with the rest of the workflow. While the integration of external solutions remains important, it complicates the deployment, use, and maintenance of your system, specifically for standard applications.  

Server sizes

The surge in video analytics performance comes with an increase in computing resource consumption. This increases the burden on existing, general-purpose recording servers. Specialized hardware also adds to the complexity of system design.

Diverse applications across industries

While many industries understand the value of video analytics, they’re used in different ways across these industries. Violence detection is crucial for law enforcement, whereas fall detection is essential for healthcare. Some video analytics solutions like intrusion detectors and people counters are becoming more common, and developing specialized solutions requires more time.

Advanced video analytics capabilities

The next generation of video analytics solutions will include streamlined deployment, scalability and a gradual shift toward cloud-based platforms.

Video analytics capabilities in the cloud have advanced significantly, especially now that processing can be done directly within cameras. These cameras provide valuable metadata that video surveillance as a service (VSaaS) systems leverage to reduce processing costs in the cloud. VSaaS providers use this metadata to enhance the performance and cost-effectiveness of their video analytics solutions.

The advancement of analytics will also make these capabilities accessible to more organizations. A VMS solution can have video analytics software permanently running in the background, providing valuable ongoing information for security teams. Instead of video analytics being identified as a separate technology, it may soon be a standard component of any VMS, just like archiving. Operators will have more intelligence and operational insights than ever before.

This evolution is also evident in how VMS information is visualized. Built-in charts, dedicated feature widgets, video analytics dashboards, and reports are available to help operators. A security team can understand, classify and process information faster to make better decisions.

Analytics for business insights

Recent AI advances such as machine learning and deep learning have enhanced the accuracy and power of analytics. And over time, analytics have also become less costly making these tools even more interesting and accessible to organizations in various industries. Here are a few examples of how analytics are enhancing operations in addition to security.

City transit: Using people counting and crowd estimation analytics, transit organizations can keep track of how many people are waiting for trains or buses at different times. They can adjust service frequency to align with actual demand and identify times and locations with peak foot traffic. They’re able to better allocate resources and alleviate congestion, potentially boosting customer morale.

Retail: Using video surveillance analytics such as people counting, retailers can find out how many people come into a store at any given time. Besides understanding the busiest times and days, this can help retailers measure the success of marketing initiatives by tracking the influx into the store before, during and after promotional campaigns.

Enterprise organizations: The use of video analytics gives corporate offices information to track occupancy patterns and get a better sense of how and when the office resources are being used. Some offices also have warehouses on-site. Using video analytics helps them determine if warehouse staff are consistently wearing the correct protective gear when on the job.

Airports: From people counting and crowd estimation, data points give airports insights into the passenger journey from the curbside to the gate. With that, they can better understand how long people stand in security lines, where roadblocks occur, and where people gather. They can then open up new queues or make changes that optimize the flow of people.

Tools to enhance your use of video analytics

An organization can start benefitting from analytics more effectively by implementing a range of tools that make it easier to use video analytics.

Pre-configured pages: Security leaders can speed up the configuration process with modern analytics systems that include pre-configured pages. They have configuration parameters needed for specific applications. All parameters are set with default values for particular scenarios.

Camera integrity monitoring: Look for solutions that include camera integrity monitoring. These tools help ensure that their cameras are operational and working efficiently. The system automatically identifies cameras that may have been tampered with so their team can fix or replace them.

Forensic search capabilities: If security leaders want to optimize their data analysis workflow, implement an enterprise-grade software as a service platform with advanced forensic search tools. They’ll be able to search for specific incidents faster, detect patterns and extract new levels of intelligence.

Turn a camera into a radar: Select systems allow users to use their current cameras equipped with video analytics to identify and monitor intrusions directly on an interactive map. Upon triggering an alert, security leaders can instantly locate the intruder's precise coordinates and access live streaming of their image, providing a comprehensive and actionable perspective on the situation.

Preloaded appliances: Look for solutions that include embedded tools to simplify deployment and maintenance. Appliances that are preloaded, hardened, and configured reduce the time they spend deploying and maintaining a system.

A video management solution is designed to help security leaders achieve more than just surveillance. As machine learning and cloud solutions continue to advance, video analytics will become even more powerful than they are now. This presents a significant opportunity for businesses to use their security systems in new ways to enhance their security and operations.

KEYWORDS: security camera capabilities security cameras security management video analytics video management system (VMS)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Florian Matusek, Video Analytics Group Lead, Genetec Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • surveillance-room freepik

    Advanced technology applications drive new opportunities for video management systems

    See More
  • Surveillance, video wall

    Advances in deep learning & predictive analytics will significantly increase video intelligence capabilities in 2021

    See More
  • cyber handshake

    New opportunities at the intersection of physical and cybersecurity

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products

Events

View AllSubmit An Event
  • June 15, 2012

    Axis Thermal Cameras

    Axis thermal cameras allow users to detect people, objects and incidents in complete darkness, bright daylight, and difficult conditions such as smoke, haze, dust, and light fog. In this webinar, we’ll highlight Axis thermal camera series and capabilities.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!