Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Being There Through Software

By John Mesenbrink
October 20, 2003


SECURITY magazine continues to cover the industry dialogue on remote video monitoring and its software. The experts involved here are: Jam Paydavousi, product line manager, American Dynamics, San Diego; Brian Murrey, sales engineer, North American Video, Brick, N.J.; Fredrik Nilsson, director of business development, Axis Communications, Chelmsford, Mass.; Chris Mackenzie, vice president, WebEyeAlert, Chelmsford, Mass.; Terry Louthan, product manager, Honeywell Video Solutions, Morristown, N.J.; and Mike Zorich, director of marketing, Canon USA, Lake Success, N.Y.

SECURITY: How important is software in the overall scheme of remote monitoring? Why?

PAYDAVOUSI: Software is what makes remote video monitoring possible to the masses. The cost of remote monitoring of analog video with no geography boundaries is extremely high, as it requires very high bandwidth networks. With digital video, manufacturers can use various software programs to manage digital video with regard to transmission, display and analysis of the contents in the video and index video files in industry standard database systems for future uses such as generating management reports with hyperlinks to video clips.

MURREY: Software is important mainly in the area of upgrade availability. Otherwise software becomes more of a systems control issue when working on a digital platform. When choosing control software, it is important that the software be user-friendly to facilitate easy operation by security personnel.

NILSSON: When monitoring several cameras, video management software becomes important. Because many installations use large numbers of cameras, it becomes an overwhelming task for people to constantly monitor all of the cameras. A video management tool can add more intelligence to the system, helping the operator prioritize which cameras to look at in an alarm situation.

MACKENZIE: Software is extremely important, yet at the same time it can be a big problem. Information technology (IT) departments in organizations are clamping down on personal computer-based applications because they make the machines difficult to manage and increase the total cost of ownership. The software can cause conflicts with other programs, drivers and hardware. Virus programs sometimes have to be shut off in order to install PC-based applications, which IT departments do not like to do because it creates a window for infection. Also, the software must be maintained with patches, updates and new versions. Finally, an investigator cannot just walk up to any PC in the area and access the data. They must have the software preloaded on any system they use. Web-based software applications offer a significantly better alternative to PC-based applications. With a Web-based application, accessing the software is a matter of opening a browser, going to a Web site and authenticating with a user name and a password. Everything works within the browser, so there is no software to download or install. Upgrades are maintained by the host, so there is never a need to update the application. The application can be accessed from any location.

LOUTHAN: Extremely important. Is the software easy to use? How many steps does it take to perform an action? Can I look at live and recorded video at the same time? If I am interfacing to a central station, is there any type of interface into the central station software to bring in account information? Software is a huge feature.

ZORICH: State-of-the-art remote monitoring systems are a combination of camera hardware and network software that manages the entire chain of image and alarm data from capture to the distribution of data to a viewer through local and wide area networks, i.e. the Internet. Simply put, they capture, transmit and present the data to the viewer. The best camera hardware without the assistance of good software will not meet the ever-expanding needs of the remote monitoring marketplace. Because most of today?s remote monitoring systems convert analog video to digital packets for transmission, the network bandwidth is the bottleneck and hence the limitation to growth. Therefore, the captured image quality need only evolve to keep up with the slowly expanding bandwidth capabilities in the marketplace. By contrast, software can continue to improve seemingly without bounds regardless of the network topology. In fact, over the next three to five years, until the next major bandwidth breakthrough, overall system improvements will be derived primarily from the development of newer and more effective software solutions.

SECURITY: If applicable, does your system offer real-time alarm monitoring? In what capacity?

PAYDAVOUSI: All of our digital video recorders (DVRs) come with remote management software capable of showing alarms as they occur; the remote video software can show live and pre- alarm video of the alarm. The DVR can index video with contact closure alarms, motion alarm, light change alarm, perimeter violation alarm; alarm based on the size, speed and directions of the moving object. Also, video can be indexed as an alarm, if text from transaction systems, such as point of sales or automated teller machines received by the DVR, meets certain criteria. The DVR can also accept alarm over TCP/IP from other software applications and index the appropriate video. We also have central integration and monitoring software that works with the same digital video recorders and can receive alarm notification and display.

MURREY: As far as alarms are concerned, it is not a good idea to use the video alarm functions as the primary security alert. It is best to have companies that specialize in alarm monitoring handle this aspect of your security system.

NILSSON: One of the biggest advantages of network cameras is that they are intelligent devices that include functions such as motion detection and alarm handling based on contact closure and time of day. This means that the camera is making decisions on how to handle the alarm based on the details of the event.

MACKENZIE: Our product integrates physical alarms with video alarms. When an alarm occurs, the video and alarm event are synchronized. The system will then contact the appropriate individual via cell phone or pager to notify them of the event. That individual can then access the video immediately from any PC with a Web browser, handheld computer or even a color third generation cellular telephone and see the video that was synchronized with the alarm event.

LOUTHAN: We have several versions of DVRs that offer real-time monitoring, depending on what the customer needs.

ZORICH: Our video servers and integrated camera-video server products have one or more input/output relay switches built into the rear panel of the unit. We also offer motion-detection capabilities, powered by real-time frame-by-frame analysis to detect motion within a user selectable region in the camera?s field of view. We further offer the user the ability ? once an alarm is triggered ? to capture an image associated with that alarm trigger, then attach it to an email and send it to a viewer for immediate notification of an event. Increasingly, police departments are requiring visual confirmation before responding to an alarm event. This is a significant change, and one that is capturing the attention of the manufacturers in this market. Our cameras work together to allow for the capture of an event while it?s happening, and email the captured images immediately to a viewer or a wireless personal digital assistant device.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Computer Software Tracks Missing Laptops

    See More
  • Design & Build

    See More
  • Beyond the Camera

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!