Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Using Wireless Surveillance for Tough Applications

By Bill Zalud
Wireless devices with security camera views
While cameras on the Dolphin Precision Investment Castings campus are traditionally hard-wired, images can be received wirelessly on staff smartphones.
new wireless emergency phone tower,
Wireless capabilities can link video with other security systems. Here a new wireless emergency phone tower, which also supports solar and day-night switching power configurations, can work in tandem with video on a campus.
180 degree field of view cameras
Emerging camera approaches, coupled with higher resolution needs, make technology such as 180 degree field of view cameras integrated with versatile video management systems attractive to enterprises and government agencies. This is in addition to the myriad ways that security video can be transmitted.
Wireless devices with security camera views
new wireless emergency phone tower,
180 degree field of view cameras
January 2, 2013

First of all, it is better to hard-wire security video, especially when it comes to megapixel cameras.

But there are times, locations and missions where wireless makes the best sense.

Scott King has figured out a way to mix and match wired and wireless.

As the lieutenant for the Pittsboro, Ind., police department, he operates a city surveillance project that uses technology to help monitor potential problem areas including a public park. “We have seven cameras in the park area. Six are wired and one is wireless,” King says. The wireless unit is in a park shelter location where wireless works better. “We worked with Avigilon on converting six existing analog cameras to digital output with encoders and set up the wireless camera.”

While not constantly monitored, the cameras’ output is recorded and live, and recorded images can be viewed through a laptop or on a smartphone. The design has “already helped us solve two crimes in addition to the deterrence effect,” points out King.

A more extensive wireless installation is used by the city of Freeport, Texas, which had ADT Integrated Solutions provide and install a wireless video surveillance system to help reduce crime in a public housing project and a marina. Among phases to help protect critical infrastructure in one of the nation’s largest ports and home to the fourth largest oil reserve and 29 chemical companies, the city uses a wireless mesh network to transmit video from IP-based cameras located throughout the city to be recorded in the city hall and monitored 24/7 in the nearby Freeport Police Department headquarters.

 

A Logistics Challenge Solved

Ty Morrow, chief of police for Freeport, points out that “Freeport is basically an island that is home to assets of critical importance to the nation’s economy. This wireless video surveillance system will help us do our job of providing public safety by adding extra ‘eyes’ in the field.”

The city decided on a wireless network system because it was logistically difficult and expensive to run fiber to all the areas that needed to be under surveillance. The geographical layout of Freeport, as a port town on the coast, doesn’t have fiber running throughout the city and it doesn’t have access to fiber or T1 lines, so the next best solution was to design a wireless solution.

 But in Orlando, Fla., which has a lot of city fiber installed primarily by the traffic department, wireless mesh fills the “fiber gap.” One wireless example is at Lake Eola, a city park in the downtown area. The head-end mesh node is connected to city fiber, which backhauls video to the police monitoring center. This mesh node, with its two antennas – one per radio, aggregates the wireless video traffic from camera/mesh node locations around the lake.

Wireless video technology has matured.

But it may prove challenging when working with higher resolution video and more demanding video applications such as license plate recognition, facial recognition or thermal analysis. Still, as enterprise security leaders move to using IP-based surveillance cameras, the use of industrial wireless Ethernet is a more natural fit.

 

Aiming at Mobility

There are also an increasing number of wireless video uses, such as wireless video on trains, subways and other mass transit situations.

And wireless video can integrate with wireless access control systems.

For example, Phoenix-based Dolphin Precision Investment Castings, with a 13-acre, multi-building campus, has a campus-wide security system that covers everything from access control to perimeter detection with software and remote monitoring needs. Says Kris Richins, facilities manager and engineer for Dolphin, the company canceled a physical on-site security officer contract in favor of the multi-faceted security system, which includes 16 cameras and a DVR at its core. It added MobileCamViewer for remote monitoring during non-business hours to further reduce costs and expedite return on investment.

The design “allows us to remotely check our cameras over our iPhones and Androids when we are contacted by the alarm company,” says Richins.  “We can immediately confirm if there is enough evidence to call the police without having to be near a computer with an Internet connection.  With an average distance of 18 miles from our homes to the campus, we are also eliminating many back and forth trips for no reason.”

Richins adds that their fixed cameras are positioned indoors and outdoors, focused on employee turnstiles, lobbies, loading docks, parking lots and general building perimeters. This allows them to get a view of everything that is happening throughout the most heavily trafficked campus areas, including breezeways between buildings.

 

Remote Look-in Capability

“Mobile surveillance is very valuable in a campus setting with a lot of exposed areas in and around the buildings,” says Richins.  “The cameras themselves offer a visual deterrent, but the signage that points to around-the-clock monitoring through remote surveillance goes a long way.  I think it’s a very critical component of modern security systems.”

Another twist on wireless: Talk-A-Phone has designed a wireless version of its Eco Tower emergency phone tower, which also supports solar and day-night switching power configurations. The tower can be deployed in remote areas with a cellular or VoIP wireless interface.

 

This article was originally published in the print magazine as "Wired or Wireless? Video Picture Diversifies."


 

See More with Less

In addition to options in transmitting security video, there also are increased ways to cost effectively bring more video data to enterprise security leaders, sometimes with unique cameras that can capture more view. For example, Salient Systems has integrated Scallop Imaging cameras with its video management system platform.  The camera generates seven megapixel resolution across a panoramic, 180 degree field of view, with H.264 compression and Power over Ethernet.

KEYWORDS: mobile surveillance security apps surveillance cameras wireless cameras wireless surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Guy Grace, heading security and emergency planning at the Littleton Public Schools

    Using Day/Night Cameras for 24/7 Surveillance

    See More
  • University of Kansas shop

    Using Asset Tracking for Security and Business

    See More
  • Wried or Wireless?

    Adopting Wireless Video to Tackle Covert Surveillance Operations

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products

Events

View AllSubmit An Event
  • December 12, 2011

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we'll update you on what is out there for camera viewing software along with our reviews. We'll also look at the Axis Product Selector tool and several other applications that are available today.
  • February 3, 2012

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we’ll update you on what is out there for camera viewing software along with our reviews. We’ll also look at the Axis Product Selector tool and several other applications that are available today.
View AllSubmit An Event
×
While cameras on the Dolphin Precision Investment Castings campus are traditionally hard-wired, images can be received wirelessly on staff smartphones.
Wireless capabilities can link video with other security systems. Here a new wireless emergency phone tower, which also supports solar and day-night switching power configurations, can work in tandem with video on a campus.
Emerging camera approaches, coupled with higher resolution needs, make technology such as 180 degree field of view cameras integrated with versatile video management systems attractive to enterprises and government agencies. This is in addition to the myriad ways that security video can be transmitted.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!