Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity Management

Video Verification: Use it Wisely!

By Joel Jensen
November 29, 2010
The term “video verification” generally applies to the use of a camera to verify whether an intrusion alarm is genuine, false, or a nuisance alarm. A false alarm would indicate an alarm generated by a system that is a result of a malfunction in the alarm system. A nuisance alarm is indicative of a system working properly, but is generated by some kind of user (human) error.  Video verification, often hailed as a solution to nuisance alarms, can be a tool in reducing nuisance alarms but within the limitations of video and human decision-making.

Video has limitations? Of course it does, and we know all know it, right? Video of strangers and especially disguised strangers are nothing less than frustrating to investigators. Nuisance alarms are typically the result of user error – human error. A video window opening on a monitor in your central station due to an intrusion alarm is presented to a human who will make a decision based on what is viewed in that video stream. This is another opportunity for human error. Throw in time-tested audio verification and we’re creating a potentially costly combination of good technology controlled by humans capable of drawing incorrect conclusions. So why is it that I advocate the use of video verification? Because it is, like any other solution, a tool – and the old expression of the right tool for the job is applicable with any type of technology.

Video verification features in electronic access control can potentially reduce human error. Video verification in an integrated access control system can provide us with the stored image of a cardholder side-by-side with live video from an access control point. However, how often are these badge images updated and do people really look the same in person or via video as their badge images? That may or may not be critical in all security applications. If a protected area requires a high level of security, biometric solutions are called for in place of, or in addition to video verification. So when is video verification useful in an electronic access control environment? Quite a few places!

Small businesses are obvious candidates for video verification, but we are in the enterprise security business. I’ll use my own application as one example – a university setting. A very common nuisance alarm for us is a door held open signal. Video verification displays a classroom filled with laptops, people seated in front of them and someone in the front of the room speaking to them. It appears that the door has been propped open for an unscheduled class. It would be very unlikely that this many people could conspire to perpetrate a mass theft of laptop computers. The area can be monitored for a bit, via video, without committing additional human response resources. 

A rather common fixture in the enterprise is the conference room. Again, it’s a very suitable application of video verification, and I’m sure you can think of areas in your facility where video verification is both a suitable and cost effective tool in reducing nuisance alarms. Even if your access control solution doesn’t offer video verification functionality, it can be accomplished via the alarm outputs that are ubiquitous on today’s IP camera offerings in settings such as this. Let’s expand the execution of video and electronic access control a bit further.

I’m a regular advocate of regarding doors as systems in the access control realm and also video cameras as virtually a standard component in access control. IP video in concert with electronic access control will yield an excellent ROI when applied effectively – the right tool for the job. Keeping the right tool perspective in mind – a video component is not always the right tool for video verification. Once again, I’ll use my environment as an example. No control center staff is given the authority to disregard an alarm based upon what is observed in a protected area via video or video verification. Video is used as a tool for prioritizing an officer response and also utilized for officer safety. Again, no control center staff member has the authority to disregard an alarm. A policy and procedure factor, if you will, and additional training for all staff affected.

Video as a priority setting tool: Consider the example I used of what appears to be an unscheduled class. That door held open alarm is assigned to an officer with a non-emergency priority, and will continue to be monitored until that officer responds and checks the area or chooses not to respond. Policy, procedure and training…

Video as an officer safety tool: The control center staff observes people with tools removing computer workstations and video projectors. That information is provided to officers responding. A screwdriver can become a weapon. Obviously, intrusion alarms with accompanying video displaying forced entry using burglary tools are critical to officer safety. The bottom line: Expanding the use of proper technology will be cost effective in reducing expenses created by existing technology if, and only if, there are additional commitments made in managing expansion. Those additional commitments must include policy and procedure changes, staff training on the existing and new technology and the inclusion of multiple layers of accountability associated with the changes. 

KEYWORDS: electronic verification

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • It’s 2010: Be Careful with your Convergence

    See More
  • It’s Time for a Proposal!

    See More
  • The Best of Three

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing