Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Columns

Incorporating Mobile Surveillance Options

By Keven Marier
Clouds
January 2, 2013

The two-way Motorola radio has been the cornerstone of real-time communications for the emergency response and security industry for nearly a century, and is soon to be complemented by smartphone technology. However, the smartphone isn’t going to be used for real-time voice, but will instead be a “must have” device for surveillance operations. This is because the device can act as eyes in the field; capturing real-time video and bringing situational awareness and immediate evidence collection capabilities to the next level. Emergency and security personnel represent a significant portion of the monthly operational budget for these industries. The smartphone can improve the operational efficiency and response capability of these personnel, which will drive increased investments at a time when some security operations are facing budget cuts. 

These increased “manned” security investments will be seen beginning this year within the mobile surveillance industry. Mobile devices will also be the fastest growing platform for client applications within the physical security industry. However, smartphones and other mobile devices will be used for more than simply viewing video.  They will also serve as management clients and mobile HD video surveillance cameras, using a feature called “video push.” This combination of viewing video, systems management and a powerful HD surveillance camera, all running on platforms from either Apple or Google, will drive networked surveillance industry adoption. Now, for the first time in our industry, security officers will be active mobile components of the surveillance system, instead of passive or reactive operators. 

 

Video Push

Mobile surveillance operations have seen great success with expensive vehicle-based surveillance systems and, in some cities, portable surveillance systems equipped with power supplies, lights and telescoping poles. These mobile units are typically restricted to outdoor environments and frequently offline for extended periods of time. However, now anyone with a smartphone and a video push-enabled application can become a mobile surveillance system. Because people carry these hand-held devices, they can be used in almost any situation, indoors and outdoors, and can instantaneously feed live video between security personnel and a security operations center. The implications of this technology on security operations are potentially revolutionary. No longer do your surveillance cameras have to be in position to capture an event, instead trained security personnel equipped with video push-enabled smartphones go out to meet, record and respond to events in real-time.

 

Point, Press and Record

The enabling component of the video push feature is the HD video camera included in smartphones, which can be attached through the network to a surveillance video recording server or NVR. This feature works just as though you were recording a video clip on your smartphone, except the recording is initiated by the mobile surveillance system application, or “app,” running on your smartphone. You download and install the application from the Apple App Store or Google Android Marketplace. The integration to your smartphone’s video camera allows for a familiar set of configurations controlling the FPS, image quality and other camera parameters. Video push networking can be supported by 3G, 4G or Wi-Fi network connections, and is licensed in the VMS or NVR as a typical network camera device.

 

Remote Systems Management

Surveillance management and administration operations have long been tasks performed while sitting at a desk. Now controlling PTZ’s, triggering device I/O’s and enabling or disabling system events can all be done from a smartphone connected to the network.  These capabilities decentralize command and control functions for immediate security system responses informed and executed directly from the scene of an incident. With the proper training, mobile security personnel become field-based system operators who can more effectively gauge the necessary surveillance system response, such as locking doors, turning on lights or sounding alarms.

 

1+1=3

Mobile viewing clients with video push features are force multipliers, which will immediately benefit all security operations. 2013 is the year when all of the enabling technologies come together for the first time in our industry with smart phones, 4G networks, easy-to-use applications and advanced surveillance functionality.  With these benefits enabled in large part from the continued advancement of networked surveillance systems, “convergence” will enter the mainstream because of these measurable and low-risk operational benefits.   

This article was previously published in the print magazine as "Surveillance Options on the Go."

KEYWORDS: mobile surveillance security officer smartphone security smartphone surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Keven Marier

    How to Implement Advanced Surveillance Training Policies

    See More
  • Clouds

    How to Manage Surveillance Over the Private Cloud

    See More
  • sec strategies feat

    Studying the Pros and Cons of Proprietary Wireless Surveillance

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing