Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Remote Video Auditing Creates Value

August 1, 2004
Coming off of significant tech investments in the 1990s, and precipitous market declines of the new millennium, companies are pressed to get more out of existing investments and develop new sources of return on investment. Couple that directive with ever growing concerns related to homeland security, food safety and loss prevention, and the result is businesses focusing on preventive measures and seeking turnkey security solutions.

A service that seems to deliver on all these requirements, remote video auditing (RVA), is quickly gaining momentum in today’s marketplace. Managers are sent weekly e-mail scorecards that summarize an individual location’s performance. The reports contain pass/fail hyper links to video clips and still images, providing visual documentation of events uncovered by the auditing service. By utilizing RVA, companies can track events, breaches and business practices at customer locations.

RVA’s premise is both simple and revolutionary: leverage existing hardware and galvanize with enhanced software and services to produce increased return from current investments. The auditing system uses the Internet to leverage remote viewing through very inventive uses of video, to help businesses reap benefits from their recorded video.

Alone and unmonitored, recorded data is worthless. Audited and analyzed, however, the findings can produce a bevy of valuable information for businesses spanning retail, fast food, food processing, convenience stores and transportation.

According to Adam Aronson, CEO of New York City-based Arrowsight Inc., “Sending reports to make, save or reduce spending is becoming a must-have due to the need to reduce costs and drive productivity. RVA offers companies a threefold value proposition – increased return, reduced overhead and improved efficiency.” Aronson’s company, along with partner, Tyco subsidiary ADT Security Services, develops RVA software and services and delivers daily, weekly and monthly audits and compliance reports. The reports monitor compliance, reduced shrinkage and job performance and provide access to videos and still images.

Extrapolating from his pioneering work in childcare remote video viewing services with former company ParentWatch, Aronson looked to how the technology could be applied to other industries. He logged hundreds of hours monitoring convenience stores, fast food chains, retail stores and food processing plants in order to identify the common denominators of business. He also observed recorded video could have many uses beyond security, including compliance, productivity, customer service and cost containment.

The heart and soul of a security system is the camera and recording device. RVA software must integrate with existing hardware such as digital video recorders and data sources, encompassing point-of-sale, security systems and other enterprise data.

The Web can bring data collected by security and facility systems to business managers who audit

their operations and staff performance.

Every second counts

In a mobile economy, time is money. Few companies have become more familiar with this than the fast food industry, where the drive-through window represents a franchise’s cash cow. According to fast food giant McDonalds, the critical success factor is “time-in-line,” which specifically refers to the time it takes customers to get from the cash-pay window to the food pickup window. “The difference between 100 and 150 seconds is the death knell to drive thru operations,” notes Aronson. “Customers are at the fast food restaurant because it’s quick and they’re in the drive-through lane because it’s quicker.” RVA Services have dramatically improved time-in-line by integrating with the security cameras at the cash pay and pick-up windows and monitoring movement.

Tony Delligatti, owner of three McDonald’s franchises in North Carolina, began using the video audit services at his locations to effect dramatic improvements, including increased sales by leveraging Arrowsight pass/fail score cards.

Delligati adds, “When we receive the audit report and are able to show our managers actual video of a car sitting at a drive thru for two minutes, it’s very powerful. It takes away excuses.” In addition to decreasing the time between paying and reception of a food order, Delligati uses RVA services to reduce food waste, increase employee productivity and ensure food safety compliance.

Compliance is critical

Nowhere is it more important to follow rules and regulations than in food processing, where the health and welfare of the public is at stake.

For retail businesses, shrinkage is a growing problem that annually costs the industry billions of dollars. Arrowsight worked with Finish Line, a 500-store retail chain, at one of their target stores in order to implement a system ensuring compliance with basic security procedures designed to reduce theft, especially internal theft.

By giving the staff the perception that the premises were being monitored and audited at an off-site facility, Finish Line witnessed an astounding 63 percent reduction in shrinkage over a four-month period.

Security however, is not the only area that companies are interested in monitoring. RVA services also represent a cost-efficient method of culling marketing research. In an effort to improve research and development and increase sales, Pfizer retained Arrowsight to monitor the customer movement, behavior and overall viability of their in-store product displays at a major drug store chain.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Remote Monitoring

    How Remote Monitoring Adds Value from Afar

    See More
  • school student sits at desk

    Strategic video surveillance creates safer K-12 schools

    See More
  • education and training

    The value in event-driven video analytics

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing