Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesVideo Surveillance

How to Get in the Digital Evidence Fast Lane

How new digital evidence management systems are helping organizations speed up investigations and cut costs

By Erick Ceresato
evidence_enews
July 31, 2018

Many incidents today are captured on video. That’s because there is an increasing number of surveillance devices, cellphones and body cameras collecting information. There’s no denying that this video technology is extremely beneficial to organizations that need to solve a crime, identify a suspect or disprove a liability claim. However, with so much evidence available, the process of collecting, managing and sharing video during an investigation has become very expensive and time-consuming.

The Problem with the Old Way of Managing Evidence

Sometimes, operators might spend hours, or even days, compiling evidence from various sources and building cases. In the process, they’re usually juggling many different applications. Even once they have all the information they need, investigators are often required to convert video to specific formats so it can be reviewed. In some cases where video must be shared, the clip includes juveniles or other bystanders. This means operators must also find ways to redact the video to protect privacy, which often involves paying external sources to blur identities.

The process then continues with burning copies of video onto DVDs or USB sticks and either expediting or hand-delivering the digital evidence to necessary parties. Should a DVD get damaged or end up in the wrong hands, the organization could face massive penalties according to new privacy legislation such as the European Union’s General Data Protection Regulation (GDPR). Considering all of this, a single case can cost an organization a significant amount of time and money.

The pains of this process are getting worse. Think of cities and transit authorities that must handle hundreds or thousands of cases in a month. Or, consider other organizations such as retailers, stadiums or hospitals that must keep the evidence for years to protect themselves against liability claims. Storing all this video and keeping hard copies inevitably becomes difficult to maintain.

A New Take on Digital Evidence Management

So, how can an organization effectively manage digital evidence today? How can businesses adhere to protecting privacy, securely keep video for longer periods of time, and even reduce operational costs while managing requests? By using a DEMS.

Short for “digital evidence management system,” DEMS is a new application that is uniquely designed to help organizations manage both the storage and distribution of digital evidence from a variety of sources. A DEMS also makes it easier for businesses to protect data that must remain classified.

Working with a DEMS Boosts Productivity and Security

Using a DEMS makes compiling, sharing and securing video evidence easier. There’s no more burning copies of video to DVDs or USB sticks or delivering the evidence to recipients in physical form.

Everything related to the case such as media, documents and incident data is safely stored in a single application. Should an operator need to retrieve evidence weeks or months later, they can use keywords or any other information such as case numbers to quickly find what they are looking for.

Built-in redaction capabilities help the operator mask any identities that need to be protected. Then, when it’s time to share the video and case details with internal departments such as human resources or risk management, or even external agencies such as local law enforcement or the state attorney’s office, operators can easily add recipients along with their email address. Each authorized individual will receive a secure link to the files, which allows them to access the evidence and other relevant information. Videos can be played directly from a web browser, without any software to install, and without needing to find a workstation with a disk drive.

To keep data secure, each recipient is also assigned permissions. This means that depending on the user’s role, the operator can grant them the ability to view, edit and download case data, or perhaps limit their capabilities to only viewing the video. Every action taken by each user within the application is logged, so that chain of custody is always ensured.

All of this happens without the operator ever needing to leave their desk. That means not only does the organization save countless man hours that can be dedicated to other tasks, but they are also speeding up the investigative process to close cases faster. There is also no more need to buy and hold onto external storage devices, which could get lost or damaged. And since all long-term archives are conveniently and safely stored in the evidence management system, the organization can also free up storage space and reduce their own hardware expenses. A DEMS can truly help an organization boost its team’s productivity while saving costs.

Key Considerations When Shopping for a DEMS

Seeing as this technology is new, organizations must properly evaluate their options. While looking around for a new digital evidence management system, here are a few key considerations that will help:

  1. Built to manage video evidence – It’s important to choose an application that has been specifically tailored to manage video evidence. Video is data-heavy and difficult to store, which a true DEMS is designed to help organizations manage.
  2. Permission-based sharing – Sharing sensitive video must be strictly controlled. After all, an organization’s reputation can be on the line if video ends up in the wrong hands. Choosing a solution that offers customized user permissions and enforces authentication to the application helps to ensure the video stays secure and that the organization is adhering to regulations.
  3. Integration with other applications – Selecting a DEMS that can interface with other applications which are used by security and risk teams such as an incident management system ensures operators won’t have to manually enter information twice. It also helps them compile evidence from other sources such as interview room, surveillance or body-wearable camera systems.
  4. Flexibility of storage requirements – As industry standards and data privacy laws evolve, organizations must be able to adapt. Choosing a solution that allows an organization to define retention periods for certain types of incidents can help save time and ensure policy compliance. Once these requirements are programmed, the system will automatically keep the video for the specified amount of time, giving operators one less thing to think about.
  5. Data privacy and cybersecurity – Organizations must also ensure the solution leverages the latest encryption standards to maintain the privacy and integrity of data within their DEMS platform. This will help safeguard data against malicious actors. Also, working with a vendor that dedicates security staff to administrate and review the architecture and design requirements can be advantageous to any organization. The vendor’s team can help make sure that the solution meets the highest standards of security and will continue to protect an organization from evolving threats.  

Moving Towards Digital Evidence Management

As the amount of data being collected continues to grow, managing the data will become more challenging. Whether an organization is looking to close cases faster, improve the process of managing investigations, or simply reduce manual work, a DEMS can help teams focus on objectives. It’s an easier, more flexible and secure means to collect, manage and share evidence from different sources. One that will continue gaining interest across industries as more businesses experience the benefits of a DEMS first hand.

KEYWORDS: evidence management incident management investigations public private partnerships security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Erick Ceresato is Product Manager at Genetec Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Incorporating automated threat detection in the security operations center (SOC)

    Putting the "global" in GSOCs: How to build a comprehensive digital risk protection approach

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    Digital Risk Protection Services – Understanding their value and how to select the right solution

    See More
  • Exclusives Feature Image

    How to Provide Usable Evidence that Stands Up in Court

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s in europe.jpg

    Surveillance in Europe

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!