Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Video Surveillance by Design

By Nathan Dinning
camera compare
Image courtesy of March Networks
October 31, 2017

Years ago, installing a new surveillance system often meant finding a comfortable trade-off between improved security and the amount of hardware you were willing to look at on a daily basis.

Most security cameras were large, bulky devices, and few options existed for housing colors and mounts.

These days, however, things have changed. It’s now possible to have both a well-functioning security product, and one that looks great at the same time. You can find a variety of surveillance cameras that are designed to blend in with your business landscape.

More organizations are purchasing these products, not only because they’re less obtrusive, but also because they are full-featured IP cameras with all the same functionality as their larger, less aesthetically pleasing counterparts.

Who Says You Can’t Have It All?

Just think about how other forms of technology have evolved over the decades.

When cellphones were first introduced, the clunky handheld devices barely fit in your briefcase, never mind your coat pocket. Now, mobile phones have smaller, sleek designs and more features than we ever thought possible. You can send an email or text, take a photo, and even provision an NVR with your mobile device.

The same trend is happening in video surveillance. Security cameras now come in smaller sizes and are designed with a greater focus on their overall aesthetic impact. And even though the camera body size may be small, many of these devices still deliver high resolution video and features like High Dynamic Range and integrated infrared LEDs for advanced nighttime surveillance.

This is great news for businesses that have invested in modern, minimalistic designs that best reflect their brands and where a big, heavy security camera would look out of place.

Style-conscious and discreet
So how discreet are these cameras? Just look at the devices in our comparative example in Image 1 above.

The camera on the left is a typical indoor dome, something you might find in any bank or retail location. It’s just over 5 inches / 13 centimeters in diameter – not large at all for a surveillance camera.

The discreet camera on the right, however, is half the size, at just 2.3 inches / 5.8 centimeters in diameter. And because this camera has a modular design, its encoder can be concealed inside a ceiling or wall, so just the dome is visible.

Installed in the right location, the discreet dome is barely noticeable, but it still delivers incredibly clear, 4 megapixel images – just the right amount to see facial features, details on merchandise or bill denominations at the point-of-sale (POS).

Blending in with Your Business

The idea behind this contemporary, much more compact camera design is that your video surveillance should blend in with your business aesthetic. To be clear, these are not hidden cameras, but they’re not exactly overt either. Mounted to a ceiling or wall, a discreet camera can meld seamlessly with your business décor, making it a very inconspicuous form of surveillance.

And there can be security advantages to that, too. While highly visible security cameras can be a deterrent to criminals, forcing them to think twice about committing a crime, discreet cameras can capture activity that might otherwise not have taken place. People act differently when they know a camera is watching; if they are unaware of the camera, you may just capture the unexpected.

KEYWORDS: covert security security aesthetics security technology surveillance technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nathan Dinning has more than a decade of experience in the security industry, primarily focused on surveillance camera technology and imaging. In his current role as March Networks’ edge devices product manager, he is responsible for executing the company’s IP camera and encoder strategy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Infrared Camera IR enabled animated gif March Networks Security Magazine October 2017

    Shedding Light on Infrared Camera Technology

    See More
  • street camera

    How Blossoming Video Surveillance Market Is Being Driven by Cloud, AI Adoption

    See More
  • Video Surveillance Storage Market to Exceed $5.6 Billion by 2013

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing