Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

How Monitored Video Alarms Deliver Insurance Discounts

By Diane Ritchey
April 1, 2012
Alarm

Monitoring makes a difference.  Surveillance is not a monitored Video Intrusion Alarm. Security video and DVRs (whether on-site or the newer DVRs in the cloud) provide remote viewing and document what has happened – but their primary use isn’t catching burglars.

New video alarm technologies and priority response policies have increased the arrest rates for burglar alarms over a thousandfold.  

Because the most recent stock market crash killed the “investment income” business model driving insurance profits, underwriters are now forced to make money the old-fashioned way, reducing claims and losses, and they need partners. They need partners and are turning to video verified alarms monitored by central stations. The good news is that this means “improved security and arrests” can now translate to “reduced insurance premiums” and even access to insurance coverage that has previously been impossible to obtain. Monitored video alarm systems are making arrests and changing the business model for property/casualty underwriting; insurance companies have a financial gun to their heads, and they need to change or face the consequences. They are changing.

 

Video Intrusion Alarms

The tsunami of false alarms from traditional systems means police no longer respond in many areas of the country.  Detroit and San Jose announced that their police will no longer respond to a traditional alarm system;  they only respond to verified alarms. Even in areas where police do respond, they view traditional alarms as a nuisance because more than 98 percent are not actual crimes. Video alarms are different – a virtual eyewitness to a crime. Video verification delivers a video clip of what caused the alarm to the monitoring station for immediate review and dispatch. The goal is to catch criminals in the act, and it works.

A recent case study on their success appeared in the March 2012 issue of Police Chief Magazine, “Arresting Results: How One District Achieved a 70 Percent Closure Rate with Video Alarms.”  The story describes how budget-strapped Detroit protected 30 school buildings with wireless video intrusion alarms for the cost of a single surveillance system. MotionViewers sent the video clips to the monitoring station for immediate review – and Detroit police arrested more than 100 people for an amazing 70 percent arrest rate. They saved millions of dollars in insurance losses from vandalism and theft.  

In February, the Los Angeles Sheriff’s Dept. announced to an alarm industry meeting at the Los Angeles Police Academy that their 911 dispatch center had implemented priority response to video alarms; encouraging the industry to upgrade their customers for improved service. Lt. John Cannon shared that initial results for the Los Angeles Sheriff’s Dept. showed a 19 percent arrest rate for video alarms. In contrast, traditional alarm systems have one or two arrests for every 10,000 alarms, according to most studies. A survey of both police and sheriffs completed in the summer of 2011 showed that 97 percent of law enforcement support priority response to video verified alarms.

While false alarms may be an issue for law enforcement, arrest rates drive insurers. For an underwriter, a single arrest can prevent an additional 50 burglaries by professional thieves. This has the insurance industry’s attention.

  

Insurance Discounts

Sterling Grant & Associates offer commercial customers up to a 30 percent discount on their insurance rates if they install the Sterling Crime Free Program a comprehensive risk reduction program that includes Videofied alarms. This program provides an on-site risk assessment survey, an individualized safety and security plan, training for employees and tenants and an expert witness program. The results are reduced criminal activity and premises liability, and decreased claims severity. Police Chief Kevin Kotsur credits the program for a 13-percent crime reduction in Avondale, Ariz.

Working with the security integrators, Sterling Grant specifies video alarm systems that provide adequate protection to mitigate risk from the perspective of the insurer. While this may seem like “common sense,” the last 40 years, loss prevention has not been the major driver in the insurance market. Good security people make a “unilateral best guess” to design and sell a good system – but insurers have not been at the table educating the alarm industry where their greatest risk and losses were. Sterling has taken the initiative to partner with security companies to better understand and address the areas of risk – and their customers are rewarded with lower
insurance rates.

There are some types of insurance coverage that simply cannot be obtained that this partnership makes possible. One example is copper theft. Because recovery is impossible with copper theft claims, the insurers are now inserting a “precious metals exclusion” into their contracts that excludes copper theft claims. The problem is that the theft of $800 of copper may result in a $79,000 claim due to the cost of repairing the walls, wiring, plumbing and more. The only real solution is catching the crooks in the act. Now, Sterling Grant is able to offer policies that remove the precious metal exclusion and underwrite copper theft, resulting in a slightly more expensive policy that actually provides.

KEYWORDS: monitoring security alarm security insurance security technology underwriting

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Make Unreliable Video Reliable

    See More
  • Understanding Cyber Insurance

    See More
  • Virtual or Traditional? How Either Guarding Solution Can Solve Business Problems

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing