Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

A Business Case for Off-site Monitoring

By Bill Zalud
August 25, 2008
Networked video has helped encourage more attention to third-party security video monitoring. One example, leveraging the acquisition of Trident Tek, American Dynamics has taken the network video recorder and added active content compression and support for MPEG4 to go with the existing MJPEG compression.

With the mobility of security video images, thanks primarily to IP, chief security officers can access their cameras from anywhere at anytime. What’s more important, however, is that the technology advances are encouraging enterprises to look outside for security video monitoring that was an inside job.

   
Also helping: video analytics, intelligence at the edge, better storage and improved image compression for transmission speed.

   
Kastle Systems, Compatible Technology Systems, ADT Security Systems and others are investing in infrastructure to allow them to offer security video monitoring services.

   
There’s no doubt that for both commercial and residential third party monitoring, those businesses have hit the wall in terms of traditional services such as burglar alarms.

  
For example, IMS Research said that the annual growth rate for the North American wholesale remote monitoring market is forecast to drop below 1 percent by 2011. The research also forecasts the total remote monitoring market will grow at over 7 percent year on year, resulting in a 3 percent drop in share for the wholesale monitoring market by 2012.



MONITORING FIRMS WANT MORE SERVICES

According to report author and IMS Research analyst Niall Jenkins, “There are two main drivers influencing the slower growth in wholesale monitoring revenues. Firstly, the number of independent alarm dealers is reducing, with many owners retiring or selling to larger players in the market. This affects the potential market for wholesale monitoring companies as the larger organizations usually monitor their own accounts. Secondly…alarm dealers benefit most when customers use additional services.”

While IMS sees new growth in the personal emergency response service arena, there also is potential in electronic access control and security video monitoring services.
Having “eyes” everywhere they are needed to verify alarms, check persons gaining access to sensitive areas, provide security for employees opening and closing facilities, and help maintain order at retail locations is becoming affordable.

Chief security officers can keep track of multiple facilities. They can take a day off or go on vacation and still supervise their businesses and confirm that things are being done correctly through their security service or directly, when needed, through the Web.

Among the uses of remote video surveillance systems are virtual guard tours in which a central station operator tours an entire facility through its video surveillance system on a regular schedule.
Some companies like the central station to make an announcement over the interactive audio monitoring system that a facility is being viewed. Unruly people at a fast-food restaurant who have not purchased anything can be asked to leave authoritatively through an interactive audio system. Video at the nightclub complex allows employee and cash areas to be monitored on-site or remotely along with doormen, crowd control outside the building and access control, which is tied in with video

 

MAKING A BUSINESS CASE

Elimination or reduction of security officer expenses is cited by some CSOs as a business reason to move to enhanced third party monitoring.

While monitoring firms always focused on telephone-delivered data specific to burglar alarms, fire alarms, emergency medical and carbon monoxide alerts, it was Sonitrol which pioneered voice verification.

Cities demanding less false alarms have, in some cases, pushed for even better verification including by video.

According to security executives at Westec InterActive, “We will see more and more state and county initiatives that require some video-verified response because police resources are stretched pretty thinly these days. Police don’t have the luxury of going to retail locations to respond to dumb alarms going off in the middle of the night.” Westec as well as some others offer third-party monitoring that blends video and audio with the ability of the monitoring person to “talk to” an individual in a store or building.

Thanks to IP-based and wireless video communications, both a traditional alarm and a video clip can be sent to a central station. Such applications can bring together security and management needs. Retail security executives using third-party monitoring services often have rolling audits in which the service goes from site to site to take a look at corporate compliance or do a point-of-sale interface audit.

Pricing for remote monitoring of video surveillance systems is still being developed as the capabilities of the technology increase and the hardware costs decrease. Some prices are based on the same model as burglar and fire alarms, with a fixed monthly price. But monitoring companies now are developing more complex services that reflect a higher price tag.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Making a Business Case for ‘Edge’ Network Intelligence

    See More
  • ‘Beta Site’ World: Building a Resilient Business

    See More
  • cyber6-900px.jpg

    Making the business case for security by design

    See More

Related Products

See More Products
  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing