Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Predicting the Top 5 Video Surveillance Trends for 2014

By Christopher Lindenau
camera
January 14, 2014

Video surveillance continues to be an evolving market, and its innovations serve as the cornerstone of many security departments. The following are five predictions for what’s over the security horizon as we leave 2013 and start 2014.

Increased Frequency of Federated Private and Public Surveillance Systems

If you’re not familiar with federated surveillance, then think New York City’s “Domain Awareness.” Dubbed the “dashboard,” the system links approximately 6,000 cameras and radiation detectors to combat terrorism and speed up response time. The NYPD’s one-of-a-kind system scans every license plate of every car crossing the bridges and tunnels into lower Manhattan and compares them to a terror watch list; police can even tell the system to scan for people based on the color of their hat or coat.

London may be the city with the most cameras in operation for surveillance. But London’s cameras aren’t federated, or networked in a cohesive way. In the wake of the Boston Marathon bombings, detectives went on foot to storefronts along the race’s finish line to obtain video footage they hoped would capture images of the bombers because a federated system wasn’t in place. Look for cities like London, Boston and others to install systems like New York City’s Domain Awareness.

Growth of Thermal Imaging in the Commercial Surveillance Sector

Thermal imaging systems are being used for transit systems. Expect that use to grow. For example, instead of a burglar alarm, a thermal system can pick up the heat signature of a passenger who has fallen on the tracks and then use the alarm output of the camera to trigger an alert for the passenger car to stop, without an operator having to visually confirm that a passenger is on the tracks. In traffic applications, police departments can tap thermal imaging to trigger a camera if a motorist runs a red light, instead of relying on ground loops. For airports, thermal imaging systems can spot avian interference at night, in shadows or through weather that obstructs visible light or IR-illuminated cameras. Thermal cameras will help prevent collisions, count passengers and can also be used to ensure appropriate staffing exists during peak times of the day.

Also expect to see thermal imaging system suppliers adapt their technology to fit into an array of complex IT platforms. Standard protocols like ONVIF will allow more manufacturers of thermal cameras to integrate with the customer’s chosen video management software.

The cost of thermal imaging cameras, which ranges from $4,500 for wide angle 320x240 resolution cameras to more than $25,000 for long-range VGA models, will drop.

An Increase in VSaaS

Video Security as a Service has not been overwhelmingly successful so far, and the reasons include bad pricing models and restricted bandwidth. But, finally, VSaaS seems to be gaining momentum in the surveillance market because it takes most of the infrastructure out of recording and viewing video. The limitation now is scalability. In fact, it’s hard to scale when every camera redirects its video data to the Web, instead of a local network recording device. By and large, the cons outweigh the benefits because the infrastructure needed to support this data rate does not exist; but, this is changing. 

Increased presence of cellular ISPs in surveillance applications

Simply put, cable is costly. Cellular providers (ISPs) are improving bandwidth capacity daily. The evolution from 3G to WiMAX and then LTE (Long Term Evolution) shows how upload speeds have grown. Since ISPs monetize bandwidth, it makes bandwidth-consuming media such as security cameras expensive to maintain on cellular networks.

Look for an uptick in one or more of these three things:

First, reductions in bandwidth consumption of cameras through more efficient data compression methods like H.265.  Second, the cost per megabyte of data is decreasing on cellular networks. Third, many end users consider their surveillance system a part of their overall IT budget, which – like switches, computers, and software updates – needs updating on its own. This has shifted many surveillance procurements from capital budget line items to more discretionary, operational budget line items. With this shift is a great likelihood that the end user is not averse to paying a monthly network utilization fee to a cellular ISP. 

2014 could be the year in which any of these three things could happen in greater earnest, creating increased interest in surveillance over cellular connections.   

Increased prevalence of edge computing

Edge computing is an IT philosophy advocating for the camera as the place where video data is stored and processed, instead of on centrally managed servers. For operators of security systems, “edge recording” allows the burden of video analytic data processing to occur at the camera, thereby decreasing the processing demand on the server, and enhancing the camera’s ability to sort data according to events. Common events would be an object left behind on a rail platform, an intruder’s presence at a perimeter fence line, or movement in the wrong direction on a road. Data sorted due to motion analytics can be stored locally and transmitted to the recording device only after an event has been confirmed. This dramatically reduces bandwidth consumption and decreases the likelihood that data will be lost due to a network connection failure. “Redundancy,” as this is known, is of paramount importance to surveillance operators everywhere, especially in critical infrastructure applications.    

Look for more IT and security managers to adopt edge computing strategies for their security infrastructure in 2014.

KEYWORDS: security dashboards surveillance in 2014 video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Christopher Lindenau is the director of sales and marketing for Sensor and Surveillance Systems at Moog Inc. He is a graduate of the U.S. Naval Academy and holds an MBA from the Georgia Institute of Technology. Chris can be reached at clindenau@moog.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video-surveillance-1170-freepik.jpg

    5 trends in video surveillance for 2022

    See More
  • smb_surveillance

    5 Top Points for Choosing an SMB Video Surveillance System

    See More
  • surveillance camera

    5 video surveillance trends to watch in 2023

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!