Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityPhysicalTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business ResilienceAccess ManagementVideo Surveillance

Find relevant video faster with AI-powered analytics

By Dan Cremins
AI video surveillance
October 12, 2021

A challenge for any organization deploying Internet Protocol (IP) video surveillance is how to quickly locate people, objects or events of interest in video footage. Efficiently finding vital information and best discerning what is occurring in a camera’s field of view is key. A video surveillance solution with analytics powered by artificial intelligence (AI) can help.

Over the last 20 years, video analytics have evolved from offering basic motion detection to offering analytics powered by AI. This technology achieves greater accuracy than any previous generation of analytics. In many cases, AI-powered analytics can distinguish between a person, an animal or a vehicle. This type of intelligence allows you to spend time only on alarms and investigations that matter most.

There’s no question that AI-powered analytics have evolved far beyond previous generations of analytics to deliver highly reliable object tracking, detection and notification of events. However, the focus is often on the efficacy of this technology, while there has arguably been less discussion about how to best leverage it in real-world applications. Here are some of the ways intelligent analytics can help your organization’s daily operations.

Track high-value or suspicious objects

Object removal detection works by triggering an alarm if an object is removed from a user-defined zone. For example, an art gallery can configure this analytic to apply to an area where there is a high-value object, such as a painting or statue. Furthermore, it can be used for equipment monitoring, such as computers or servers in a sensitive server room. Other examples include using it at a financial institution to protect assets or for watching high-value items put on display by a company at a tradeshow or product exhibition.

Receive alerts about suspicious behavior

Conversely, abandoned object detection triggers an alarm if an object placed within a defined zone remains there for longer than the user-defined time allows. This can be useful at an airport where it can help detect if a suspicious bag is left unattended, which could be a security risk. At a bank, the analytic can be used for detecting objects such as skimming equipment left behind at an ATM.

Loitering detection notifies you in real-time when there is suspicious behavior near your organization. Essentially, it provides notification when moving objects (people or vehicles) remain in a defined zone for longer than the user-defined time allows. For example, banks can configure a defined zone around an ATM and set a timeframe. So, the analytic triggers when a moving person is near the ATM after closing time for longer than the user-defined amount of time.

It can also be used to improve customer service. You can set loitering detection for a waiting room area and have the analytic trigger if a person is sitting more than 15 minutes, for example, to help monitor speed of service.

Finally, a tripwire alarm triggers when people or vehicles cross a virtual line. This can be useful around bank vaults or other highly sensitive areas. With COVID-19 restrictions in place, this analytic can send an alert if a person has entered an area that is now off-limits.

Parking enforcement and customer service

Stopped vehicle detection alerts users when vehicles are stopped near a sensitive area for longer than the user-defined time allows. For example, at a quick-service restaurant, it can alert employees in real-time that a customer has arrived for curbside pick-up. It also provides a visual record of all curbside deliveries for future review and investigation. Other businesses and municipal governments can use the analytic to help with parking laws and enforcement. Additionally, it can be used for monitoring airport curbside drop-offs or vehicles waiting near gates.

Intrusion detection

This triggers an alarm the moment a person or vehicle enters into a defined zone. For example, an organization could place an intrusion rule around an important doorway to monitor traffic in and out. It can also be used for supervising sensitive areas in a warehouse, bank or retail store.

As you can see, AI-powered analytics can serve your organization in numerous ways. With security and compliance being more important than ever for businesses and other organizations, these analytics make this job easier by reducing false alarms and alleviating the burden on users.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: artificial intelligence (AI) asset protection intrusion detection loss prevention risk mitigation threat detection video surveillance cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan cremins 05 cropped

Dan Cremins is March Networks’ Global Leader of Product Management, focused on driving the strategic direction of the company’s video-based business intelligence solutions. Dan has more than 25 years of experience in the video surveillance industry. Previously, he worked at Tyco/American Dynamics, where he held management positions in Application Engineering, Product Management and Business Development. Dan has spoken at leading security events, including ASIS International, and regularly writes articles on a variety of forward-thinking topics related to applications for intelligent video.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • surveillance camera on white wall

    Selecting computing architecture for AI-powered video analytics

    See More
  • artificial intelligence

    New AI-Powered Search Engine Makes it Easier to Find Information in the Fight Against COVID-19

    See More
  • healthcare-cybersecurity-freepik1170x658.jpg

    How to proactively mitigate healthcare threats with wave 2 video analytics

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • December 12, 2024

    AI-Powered Security: Empowering Teams and Protecting Your Future

    ON DEMAND: Discover how artificial intelligence is revolutionizing modern security practices in this webinar “AI-Powered Security: Empowering Your Team, Protecting Your Future.”
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing