Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesVideo Surveillance

How to Get in the Digital Evidence Fast Lane

How new digital evidence management systems are helping organizations speed up investigations and cut costs

By Erick Ceresato
evidence_enews
July 31, 2018

Many incidents today are captured on video. That’s because there is an increasing number of surveillance devices, cellphones and body cameras collecting information. There’s no denying that this video technology is extremely beneficial to organizations that need to solve a crime, identify a suspect or disprove a liability claim. However, with so much evidence available, the process of collecting, managing and sharing video during an investigation has become very expensive and time-consuming.

The Problem with the Old Way of Managing Evidence

Sometimes, operators might spend hours, or even days, compiling evidence from various sources and building cases. In the process, they’re usually juggling many different applications. Even once they have all the information they need, investigators are often required to convert video to specific formats so it can be reviewed. In some cases where video must be shared, the clip includes juveniles or other bystanders. This means operators must also find ways to redact the video to protect privacy, which often involves paying external sources to blur identities.

The process then continues with burning copies of video onto DVDs or USB sticks and either expediting or hand-delivering the digital evidence to necessary parties. Should a DVD get damaged or end up in the wrong hands, the organization could face massive penalties according to new privacy legislation such as the European Union’s General Data Protection Regulation (GDPR). Considering all of this, a single case can cost an organization a significant amount of time and money.

The pains of this process are getting worse. Think of cities and transit authorities that must handle hundreds or thousands of cases in a month. Or, consider other organizations such as retailers, stadiums or hospitals that must keep the evidence for years to protect themselves against liability claims. Storing all this video and keeping hard copies inevitably becomes difficult to maintain.

A New Take on Digital Evidence Management

So, how can an organization effectively manage digital evidence today? How can businesses adhere to protecting privacy, securely keep video for longer periods of time, and even reduce operational costs while managing requests? By using a DEMS.

Short for “digital evidence management system,” DEMS is a new application that is uniquely designed to help organizations manage both the storage and distribution of digital evidence from a variety of sources. A DEMS also makes it easier for businesses to protect data that must remain classified.

Working with a DEMS Boosts Productivity and Security

Using a DEMS makes compiling, sharing and securing video evidence easier. There’s no more burning copies of video to DVDs or USB sticks or delivering the evidence to recipients in physical form.

Everything related to the case such as media, documents and incident data is safely stored in a single application. Should an operator need to retrieve evidence weeks or months later, they can use keywords or any other information such as case numbers to quickly find what they are looking for.

Built-in redaction capabilities help the operator mask any identities that need to be protected. Then, when it’s time to share the video and case details with internal departments such as human resources or risk management, or even external agencies such as local law enforcement or the state attorney’s office, operators can easily add recipients along with their email address. Each authorized individual will receive a secure link to the files, which allows them to access the evidence and other relevant information. Videos can be played directly from a web browser, without any software to install, and without needing to find a workstation with a disk drive.

To keep data secure, each recipient is also assigned permissions. This means that depending on the user’s role, the operator can grant them the ability to view, edit and download case data, or perhaps limit their capabilities to only viewing the video. Every action taken by each user within the application is logged, so that chain of custody is always ensured.

All of this happens without the operator ever needing to leave their desk. That means not only does the organization save countless man hours that can be dedicated to other tasks, but they are also speeding up the investigative process to close cases faster. There is also no more need to buy and hold onto external storage devices, which could get lost or damaged. And since all long-term archives are conveniently and safely stored in the evidence management system, the organization can also free up storage space and reduce their own hardware expenses. A DEMS can truly help an organization boost its team’s productivity while saving costs.

Key Considerations When Shopping for a DEMS

Seeing as this technology is new, organizations must properly evaluate their options. While looking around for a new digital evidence management system, here are a few key considerations that will help:

  1. Built to manage video evidence – It’s important to choose an application that has been specifically tailored to manage video evidence. Video is data-heavy and difficult to store, which a true DEMS is designed to help organizations manage.
  2. Permission-based sharing – Sharing sensitive video must be strictly controlled. After all, an organization’s reputation can be on the line if video ends up in the wrong hands. Choosing a solution that offers customized user permissions and enforces authentication to the application helps to ensure the video stays secure and that the organization is adhering to regulations.
  3. Integration with other applications – Selecting a DEMS that can interface with other applications which are used by security and risk teams such as an incident management system ensures operators won’t have to manually enter information twice. It also helps them compile evidence from other sources such as interview room, surveillance or body-wearable camera systems.
  4. Flexibility of storage requirements – As industry standards and data privacy laws evolve, organizations must be able to adapt. Choosing a solution that allows an organization to define retention periods for certain types of incidents can help save time and ensure policy compliance. Once these requirements are programmed, the system will automatically keep the video for the specified amount of time, giving operators one less thing to think about.
  5. Data privacy and cybersecurity – Organizations must also ensure the solution leverages the latest encryption standards to maintain the privacy and integrity of data within their DEMS platform. This will help safeguard data against malicious actors. Also, working with a vendor that dedicates security staff to administrate and review the architecture and design requirements can be advantageous to any organization. The vendor’s team can help make sure that the solution meets the highest standards of security and will continue to protect an organization from evolving threats.  

Moving Towards Digital Evidence Management

As the amount of data being collected continues to grow, managing the data will become more challenging. Whether an organization is looking to close cases faster, improve the process of managing investigations, or simply reduce manual work, a DEMS can help teams focus on objectives. It’s an easier, more flexible and secure means to collect, manage and share evidence from different sources. One that will continue gaining interest across industries as more businesses experience the benefits of a DEMS first hand.

KEYWORDS: evidence management incident management investigations public private partnerships security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Erick Ceresato is Product Manager at Genetec Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Wireless Access Tech in the Fast Lane

    See More
  • Incorporating automated threat detection in the security operations center (SOC)

    Putting the "global" in GSOCs: How to build a comprehensive digital risk protection approach

    See More
  • metaverse

    How to get ahead of fraud in the metaverse

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • October 8, 2025

    How to Support the Security Guard Force in Challenging Environments

    ON DEMAND: In this webinar, Brian Howell, Vice President, Global Head of Security at ADM, shares how his organization fosters trust among their security guard force to improve security posture and the safety of sites, processes and the officers themselves.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing