Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Digital Revolution Video

April 10, 2004


Cliché or not, security has entered the Information Age. Information technology, which includes all forms of technology used to create, store, exchange and utilize information in a variety of forms, has permeated virtually every aspect of the industry, changing industry structures, markets and end user expectations with each successive innovation. As with any technology that gains market credence, video technology and software for remote video monitoring will continue to evolve toward greater mainstream acceptance, added stability, miniaturization and lower costs.

The goal of security consultants, integrators and end users is to understand what the changes in video technology could mean for the security industry and how such ongoing changes will affect its future. This is especially true in the emerging field of video transmission via the Internet, which makes the future potential of video technologies almost limitless. Its impact could affect societies, politics and above all, the way we see the world and ourselves in it.

New opportunities made available by digital technology are evolving into three significant trends, which will cultivate the video market and affect customer value over the next three to five years: 1.) Intelligent Video, 2.) Multi-Use of Cameras and 3.) Video Mobility. These trends plus the continued growth of video for evidentiary and surveillance purposes represent the engines that could drive the video market to outpace all other segments of the security market.

Growth of intelligent video means cameras will appear everything including passenger cars.

‘Intelligent’ video

As the video market proliferates, one of the greatest challenges will be the ability to monitor numerous cameras effectively. Demand for intelligent video features will have to increase as the number of cameras being utilized increases in order to avoid data overload. The technology currently in development to address this problem has been dubbed, aptly, “intelligent video.”

How can intelligent video technology, which its developers describe as producing “actionable information versus information by the pound,” be used to supplement operators? Intelligent video will make the monitoring of video manageable without missing important or mission-critical events. For example, video motion detection can now be designed for event-driven detection of multiple active objects within a video scene. This type of detection can alarm on a variety of events such as a person falling, two persons merging, erratic behavior or a person or persons loitering. It can also do just the opposite by alarming when a person or object becomes stationary for a predetermined length of time, such as an unattended package at an airport. With this technology, a security guard could know if someone had fallen in a parking lot even if he or she were not looking directly at the video display. Of course, there is still the possibility of false alarms, but in this situation it would be better to find someone bent over to tie a shoelace than miss a person dying of a heart attack.

An additional advantage of intelligent video is the potential increase of preventive responses and a reduction in liability. An example might be combining a water sensor in a specific camera area. Rather than alarming when a customer or visitor slips and falls because of a wet floor, an alarm would be sent to the maintenance department when the floor becomes wet so it can be cleaned up before someone falls.

Currently, end users employ most CCTV systems primarily for security, evidentiary purposes or surveillance. A high percentage of this use is after business hours. However, commercial businesses are beginning to realize that, like good computers and communication systems, security (primarily video) can become a fundamental business tool. By receiving a business tool as well as a security system, the purchaser can increase his or her return on investment. Intelligent video and “data mining” software has the potential to turn a traditional security surveillance system into a multi-use tool.

A video surveillance system with intelligent video can be used for measuring customer traffic, discovering peak purchasing hours (for improved staffing), studying shopping trends, analyzing marketing impact, inventory control and learning more about customers and their purchasing habits. Because the system can boast such benefits to the end user’s marketing department as well as security considerations, a provider of such systems now can make his or her sales pitch to both departments. The cost is shared by two budgets, making it an easier sale.

Revolutionary video systems more easily integrate with computer and communications technologies. Remote monitoring now goes beyond security to include general business needs.

Mobility

One particularly prominent facet of the IT Revolution has been the promulgation of wireless technology, and video surveillance seems to be following the trend. In addition to squad and patrol car usage, town center and public space surveillance, which necessitates such technology, is becoming increasingly more popular among municipalities. Cost, quality and size improvements have made cameras available for use on buses, rail systems, recreation vehicles and commercial trucks. In fact, some luxury cars now have cameras expanding rear views more effectively than rear-view mirrors.

Despite the benefits, however, moving real-time video surveillance and monitoring to handheld devices is in its infancy and has some drawbacks:

Performance: Frame refresh is still slow as transmission is limited by a number of competing compression and transmission standards. As compression improves (Wavelet, JPEG, MPEG1 through 4, proprietary algorithms, etc.) refresh rates should improve also. Concurrently, improvements in transmission methods and reduction of latency (time it takes each signal to get from the point of capture to point of viewing) will also increase refresh rates. The combined improvements will provide dramatic increases in wireless performance in the near term.

Cost: Handheld devices are still too expensive. How many businesses will give their guards laptop computers or expensive custom devices? The change will come when cell phone video technology improves and is accepted in the consumer market; as with most IT Age advances, the technology should “trickle down” to security and the cost will go down as well. It is more realistic to believe that an organization will be able to give guards $100 phones versus more expensive and cumbersome laptops or proprietary devices.

Communication needs to link with video: If mobile devices can link video and all emergency responders onto a common communication patch, it could drive the market and the acceptance of this technology, not to mention increase its usefulness exponentially.

By providing a range of capabilities for the capture, storage and transmission of video images, video surveillance has entered a new dimension as both a security and a business management solution. Better resolution, improved manipulation, faster transmission, reliable storage and convenient retrieval make a digital surveillance system a smart business choice, once the technology becomes cost effective. Over time, cameras will become as universal as door contacts and will have the same impact on the market and end user as television had on radio. The possibilities inherent in this technology are boundless. Perhaps once the Information Age has run its course, the Optical Revolution will be next.

Intelligent domes can fit into numerous business applications.

Sidebar: Today’s Video Applications

The applications for remote video are as diverse as customers. Common video surveillance users today – convenience food stores, guard replacement and alarm verification – share a mutual application in requiring verified response. Other applications of video surveillance technology include:
  • Convenience stores – intervention, employee theft

  • Auto dealerships – guard replacement, vandalism and vehicle theft

  • Multi-family housing – remote video patrol

  • Senior housing – patient monitoring

  • Second home or empty home – monitoring

  • Alarm verification

  • Virtual patrol – monitoring buildings and property – entrances, exits, lobbies

    and corridors, receiving docks, special storage areas, labs, cashiers, etc.

  • Perimeter security

  • Pipelines and utilities – intrusion response, security monitoring,

    sensor-activated leaks or breaks

  • Schools and school buses

  • Retail stores (malls, parking lots, shopping areas, etc.) – virtual patrol and interactive monitoring and data-mining, visitor /vehicle ID and license plate verification

  • Unmanned or vacant facilities and buildings

  • Banks, financial institutions, check cashing locations and ATM’s

  • Law enforcement and squad car recording – evidence documentation

  • Transportation depots

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Digital rEVOLUTION

    See More
  • 2014 Security 500 cover

    Security 500: The Predictive Revolution

    See More
  • Deepfake-freepik1170x658.jpg

    Digital twins & deepfakes: The two sides of this technological coin

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing