Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity Management

Video Verification: Use it Wisely!

By Joel Jensen
November 29, 2010
The term “video verification” generally applies to the use of a camera to verify whether an intrusion alarm is genuine, false, or a nuisance alarm. A false alarm would indicate an alarm generated by a system that is a result of a malfunction in the alarm system. A nuisance alarm is indicative of a system working properly, but is generated by some kind of user (human) error.  Video verification, often hailed as a solution to nuisance alarms, can be a tool in reducing nuisance alarms but within the limitations of video and human decision-making.

Video has limitations? Of course it does, and we know all know it, right? Video of strangers and especially disguised strangers are nothing less than frustrating to investigators. Nuisance alarms are typically the result of user error – human error. A video window opening on a monitor in your central station due to an intrusion alarm is presented to a human who will make a decision based on what is viewed in that video stream. This is another opportunity for human error. Throw in time-tested audio verification and we’re creating a potentially costly combination of good technology controlled by humans capable of drawing incorrect conclusions. So why is it that I advocate the use of video verification? Because it is, like any other solution, a tool – and the old expression of the right tool for the job is applicable with any type of technology.

Video verification features in electronic access control can potentially reduce human error. Video verification in an integrated access control system can provide us with the stored image of a cardholder side-by-side with live video from an access control point. However, how often are these badge images updated and do people really look the same in person or via video as their badge images? That may or may not be critical in all security applications. If a protected area requires a high level of security, biometric solutions are called for in place of, or in addition to video verification. So when is video verification useful in an electronic access control environment? Quite a few places!

Small businesses are obvious candidates for video verification, but we are in the enterprise security business. I’ll use my own application as one example – a university setting. A very common nuisance alarm for us is a door held open signal. Video verification displays a classroom filled with laptops, people seated in front of them and someone in the front of the room speaking to them. It appears that the door has been propped open for an unscheduled class. It would be very unlikely that this many people could conspire to perpetrate a mass theft of laptop computers. The area can be monitored for a bit, via video, without committing additional human response resources. 

A rather common fixture in the enterprise is the conference room. Again, it’s a very suitable application of video verification, and I’m sure you can think of areas in your facility where video verification is both a suitable and cost effective tool in reducing nuisance alarms. Even if your access control solution doesn’t offer video verification functionality, it can be accomplished via the alarm outputs that are ubiquitous on today’s IP camera offerings in settings such as this. Let’s expand the execution of video and electronic access control a bit further.

I’m a regular advocate of regarding doors as systems in the access control realm and also video cameras as virtually a standard component in access control. IP video in concert with electronic access control will yield an excellent ROI when applied effectively – the right tool for the job. Keeping the right tool perspective in mind – a video component is not always the right tool for video verification. Once again, I’ll use my environment as an example. No control center staff is given the authority to disregard an alarm based upon what is observed in a protected area via video or video verification. Video is used as a tool for prioritizing an officer response and also utilized for officer safety. Again, no control center staff member has the authority to disregard an alarm. A policy and procedure factor, if you will, and additional training for all staff affected.

Video as a priority setting tool: Consider the example I used of what appears to be an unscheduled class. That door held open alarm is assigned to an officer with a non-emergency priority, and will continue to be monitored until that officer responds and checks the area or chooses not to respond. Policy, procedure and training…

Video as an officer safety tool: The control center staff observes people with tools removing computer workstations and video projectors. That information is provided to officers responding. A screwdriver can become a weapon. Obviously, intrusion alarms with accompanying video displaying forced entry using burglary tools are critical to officer safety. The bottom line: Expanding the use of proper technology will be cost effective in reducing expenses created by existing technology if, and only if, there are additional commitments made in managing expansion. Those additional commitments must include policy and procedure changes, staff training on the existing and new technology and the inclusion of multiple layers of accountability associated with the changes. 

KEYWORDS: electronic verification

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • It’s 2010: Be Careful with your Convergence

    See More
  • It’s Time for a Proposal!

    See More
  • The Best of Three

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing