Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Mobile Applications Gaining Ground in Security

By Cynthia Freschi
July 1, 2009

The traditional office-based work environment is giving way to one that’s mobile and decentralized. Portable computing/communication devices such as wireless phones and the more sophisticated smart phones, PDAs, radio-frequency handsets, Netbooks and other Bluetooth, WiFi or 3G-enabled devices are freeing employees from their cubicles and creating the potential for increased mobility and productivity. And nowhere is this more true, or being greeted with more enthusiasm, than in the professional video security and surveillance industry.
     
Mobile and Web applications offer the promise of improved security operations, ranging from access control verification to remote video surveillance monitoring using hand-held devices or Web-based access, to more effective crime prevention through increased situational awareness. While the progress that network video and software development has made in the past few years is enabling this capability, the operational benefits are significant on their own and worth noting because of how they can positively impact an organization’s security strategy. 


Accessibility Wins

Most evident and arguably the primary reason for security management to include mobile and/or Web applications in the overall security plan is access to live or pre-recorded video surveillance images anytime, anywhere and on almost any mobile device. This remote monitoring flexibility, often at MPEG-4 quality, and the relative ease of installing video surveillance clients on a mobile device, provides management the opportunity to respond to and ultimately resolve issues faster and more efficiently.
     
And with some of the more sophisticated mobile devices and video surveillance software programs, built-in 3D visual effects, camera control functions and GPS features can provide additional and pertinent information to help strengthen the value of the system and the ROI (return on investment).
     
Video surveillance software for mobile and Web applications, which often include, at a minimum, motion detection and alarm notification features, can also help to add more eyes to a surveillance operation. These “intelligent” functions typically require low bandwidth while providing immediate detection and alerting for heightened situational awareness. Used in the proper applications, these programs can virtually eliminate the need to have an operator constantly monitoring a security system. Additionally, with mobile capability, on-site visibility of security personnel can be increased without compromising situational security and it is also feasible that mobility can affect manpower requirements and costs by allowing fewer personnel to cover an area. Think of the advantages on a campus environment where security guards can spend more of their time “in the field” as opposed to sitting behind a console in some administrative building.
     
Most video management software programs also offer mobile and Web application capability. The push technology which permits quick access to live video enables security management to make time-sensitive decisions from a remote location, review situations requiring collaboration with other parties or agencies, or even simply to manage staff remotely. Features such as push technology (automatic video delivery) are ideally suited to mobile video surveillance applications because it delivers live, real-time video to those who need it most, when they need it most. The video system becomes more valuable when the information can be shared and used immediately. 


Correlate and Fuse Video to Non-Video

Another benefit of mobile applications is their use in short-term and special event monitoring. For example, video surveillance and security for last year’s political conventions in Denver and Minneapolis made liberal use of mobile, Web and wireless technology.  Approximately 100 video surveillance cameras were installed in each of the convention cities and users accessed the system from sub stations, at mobile command and control stations, from individual police vehicles and from federal agency MACC (Mobile Agency Command Center) locations. The software control platform allowed authorized users to correlate and fuse video and non-video events. Alerts were then automatically delivered to viewers of interest on their
mobile devices.
     
Unlike promises made with other new and developing technologies, mobile and/or web applications provide a qualified result. Its effects can be found in alarm verification, as law enforcement agencies continue to expand false alarm fines or in improved situational awareness as agencies respond to a call, and even in manpower reductions as security personnel are better able to multitask. Mobile and web applications in the video surveillance arena can make the responder more aware of the surroundings and thus more efficient and effective in the performance of duties. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cynthia Freschi is president of North American Video, with fully staffed offices located in five states. Her firm is an SDM Magazine Top Systems Integrator.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Middleware’s Value in Converged Networks

    See More
  • Going ‘Green’ in the Security Industry

    See More
  • Video in Focus: Integrating Integrators From Start To Finish

    See More

Related Products

See More Products
  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products

Events

View AllSubmit An Event
  • December 12, 2011

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we'll update you on what is out there for camera viewing software along with our reviews. We'll also look at the Axis Product Selector tool and several other applications that are available today.
  • February 3, 2012

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we’ll update you on what is out there for camera viewing software along with our reviews. We’ll also look at the Axis Product Selector tool and several other applications that are available today.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing