Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Finding the Right Technology to Unlock Cloud and Mobile Surveillance

By Bob Liscouski
May 1, 2015

Businesses have listened to staff and abandoned in-house developed tools in favor of consumer products and ubiquitous software-as-a-service (SaaS) capabilities. They want to exploit the benefits that extensive R&D and manufacturing can bring and are willing to trade off the minor compromises that come with standardized solutions. Also, security managers are starting to ask why sites can’t be secured in the time it takes to add a Dropcam to their home network…

The surveillance industry is yet to make a wholesale shift to adopt consumer technology, but more optimized, agile and cost-effective solutions will be hard to resist for long. Users are looking to “wireless video” to access the benefits of lower deployment costs, rapid rollout and redeployment. They also want to adopt cloud services to cut capital expenditure and scale operational costs up and down, as their surveillance needs change. But there are plenty of challenges to overcome.

When mobile, we are traveling through a patchwork of 2G, 3G and LTE coverage of variable quality and latency. In high-density urban environments, even with good 3G or LTE coverage, we encounter congested networks. Looking into the future, when the LTE roll out is complete, enterprise security leaders can still expect inconsistent coverage and the congestion that results from the increasing demands placed on mobile networks. So how can we deliver an acceptable, consistent video capability when the available bandwidth fluctuates by location and as congestion varies throughout the day?

Even using Wi-Fi on a fixed site, deploying multiple high definition (HD) cameras into a single area can overwhelm the network bandwidth. This means that cameras need an expert technician to deploy and configure them to use non-overlapping Wi-Fi networks. Having deployed the camera, try pushing HD surveillance video over the corporate network and watch the reaction of the IT team. Continued demands for HD and Ultra HD cameras present even greater problems: a typical 1GBps network link might support only 30 cameras and will fill up many terabytes of storage each day. 

Some of today’s most interesting technology companies are tackling the shortcomings of consumer surveillance offerings, yet leveraging the power of mass-market consumer electronics to build better devices and services for less, sharing the development costs over millions of customers.

But where are the pioneers going to come from for this transformation? The broadcast video market has faced these issues for years but adopted a brute force approach, such as bonding cellular lines in multi-SIM modems. However, the associated operational costs are too high for general
security use.

Law enforcement has led the charge to wireless video to underpin their surveillance operations. However, agencies are now realizing that the race to HD and LTE networks has created a monthly bill shock. This has forced them quickly into solutions that feature adaptive bandwidth technologies, dynamically adjusting video to the available network bandwidth for live surveillance, while offering access to unconstrained, full-resolution video when needed in the courtroom.

Dynamic law enforcement operations offer other lessons for the way forward. With field-based staff increasingly armed with tablets and smartphones, video consumption is no longer limited to the control room. As such, downlink becomes as much of an issue as uplink. Can your infrastructure handle multiple concurrent users that all want to access video remotely – often over cellular networks? Imagine finding out it doesn’t, just at the point a major incident occurs.

Greater access to video also places greater emphasis on filtering content to ensure that co-workers are viewing the right video, without being overburdened with false alarms or incidents that are already being addressed by other colleagues. Technology companies are responding with video analytics that can be used to classify and route content to the right people at the right time. This will also help in addressing transmission and storage problems, by limiting the streaming of video to situations that require active monitoring, using highly intelligent exception-based routing.

Finally, if video originates on commercial cellular networks, why bring it onto corporate networks? Moving video storage and analysis to the cloud, coupled with intelligent edge-based storage in the most constrained bandwidth environments, takes the back-end network challenge away from an organization. Focused cloud solution providers can then help extract greater value and operational efficiencies from the video that is collected – unlocking its value as an asset. Equally sensitive data held in financial ledgers, HR records and other management systems has already moved into the cloud. Isn’t it time for a more intelligent, outsourced approach for surveillance and security?   

KEYWORDS: cloud security mobile surveillance security technology video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob Liscouski has more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group. Liscouski and ISG have founded four additional firms — Steel City Re, Edge360, Axio Global and Convergent Risk Group.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Right-Sizing Technology for Agile Surveillance Success

    See More
  • How to Use Smarter Surveillance to Close Intelligence Gaps

    See More
  • How the Internet of Things Impacts Surveillance

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing