Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityPhysicalTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business ResilienceAccess ManagementVideo Surveillance

Find relevant video faster with AI-powered analytics

By Dan Cremins
AI video surveillance
October 12, 2021

A challenge for any organization deploying Internet Protocol (IP) video surveillance is how to quickly locate people, objects or events of interest in video footage. Efficiently finding vital information and best discerning what is occurring in a camera’s field of view is key. A video surveillance solution with analytics powered by artificial intelligence (AI) can help.

Over the last 20 years, video analytics have evolved from offering basic motion detection to offering analytics powered by AI. This technology achieves greater accuracy than any previous generation of analytics. In many cases, AI-powered analytics can distinguish between a person, an animal or a vehicle. This type of intelligence allows you to spend time only on alarms and investigations that matter most.

There’s no question that AI-powered analytics have evolved far beyond previous generations of analytics to deliver highly reliable object tracking, detection and notification of events. However, the focus is often on the efficacy of this technology, while there has arguably been less discussion about how to best leverage it in real-world applications. Here are some of the ways intelligent analytics can help your organization’s daily operations.

Track high-value or suspicious objects

Object removal detection works by triggering an alarm if an object is removed from a user-defined zone. For example, an art gallery can configure this analytic to apply to an area where there is a high-value object, such as a painting or statue. Furthermore, it can be used for equipment monitoring, such as computers or servers in a sensitive server room. Other examples include using it at a financial institution to protect assets or for watching high-value items put on display by a company at a tradeshow or product exhibition.

Receive alerts about suspicious behavior

Conversely, abandoned object detection triggers an alarm if an object placed within a defined zone remains there for longer than the user-defined time allows. This can be useful at an airport where it can help detect if a suspicious bag is left unattended, which could be a security risk. At a bank, the analytic can be used for detecting objects such as skimming equipment left behind at an ATM.

Loitering detection notifies you in real-time when there is suspicious behavior near your organization. Essentially, it provides notification when moving objects (people or vehicles) remain in a defined zone for longer than the user-defined time allows. For example, banks can configure a defined zone around an ATM and set a timeframe. So, the analytic triggers when a moving person is near the ATM after closing time for longer than the user-defined amount of time.

It can also be used to improve customer service. You can set loitering detection for a waiting room area and have the analytic trigger if a person is sitting more than 15 minutes, for example, to help monitor speed of service.

Finally, a tripwire alarm triggers when people or vehicles cross a virtual line. This can be useful around bank vaults or other highly sensitive areas. With COVID-19 restrictions in place, this analytic can send an alert if a person has entered an area that is now off-limits.

Parking enforcement and customer service

Stopped vehicle detection alerts users when vehicles are stopped near a sensitive area for longer than the user-defined time allows. For example, at a quick-service restaurant, it can alert employees in real-time that a customer has arrived for curbside pick-up. It also provides a visual record of all curbside deliveries for future review and investigation. Other businesses and municipal governments can use the analytic to help with parking laws and enforcement. Additionally, it can be used for monitoring airport curbside drop-offs or vehicles waiting near gates.

Intrusion detection

This triggers an alarm the moment a person or vehicle enters into a defined zone. For example, an organization could place an intrusion rule around an important doorway to monitor traffic in and out. It can also be used for supervising sensitive areas in a warehouse, bank or retail store.

As you can see, AI-powered analytics can serve your organization in numerous ways. With security and compliance being more important than ever for businesses and other organizations, these analytics make this job easier by reducing false alarms and alleviating the burden on users.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: artificial intelligence (AI) asset protection intrusion detection loss prevention risk mitigation threat detection video surveillance cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan cremins 05 cropped

Dan Cremins is March Networks’ Global Leader of Product Management, focused on driving the strategic direction of the company’s video-based business intelligence solutions. Dan has more than 25 years of experience in the video surveillance industry. Previously, he worked at Tyco/American Dynamics, where he held management positions in Application Engineering, Product Management and Business Development. Dan has spoken at leading security events, including ASIS International, and regularly writes articles on a variety of forward-thinking topics related to applications for intelligent video.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • surveillance camera on white wall

    Selecting computing architecture for AI-powered video analytics

    See More
  • artificial intelligence

    New AI-Powered Search Engine Makes it Easier to Find Information in the Fight Against COVID-19

    See More
  • healthcare-cybersecurity-freepik1170x658.jpg

    How to proactively mitigate healthcare threats with wave 2 video analytics

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • May 7, 2026

    Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

    ON DEMAND: In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.
  • June 10, 2026

    Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

    Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing