Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical SecurityVideo Surveillance

Video monitoring goes from reactive to proactive

A look at how artificial intelligence-powered analytics are breathing new life into a tried-and-true solution

By Justin Wilmas
video-surveillance-fp-1170x658v578.jpg

Image by perig76 via Freepik

August 5, 2022

For all the advancements the video surveillance industry has seen over the past two decades — the widespread shift from analog to IP, increasing acceptance and use of cloud-based platforms, and proliferation of high-resolution cameras driven by the commoditization of video hardware — the job of monitoring surveillance feeds has changed relatively little. 


Sure, some of these advancements have greatly aided security operators in quickly distinguishing between benign incidents and actual intrusions. Still, video monitoring remains a largely reactive tool to address incidents after they have already occurred. 


This is not necessarily bad, as reducing nuisance alarms remains one of the hallmarks of good security monitoring. It's also become clear that preventing unnecessary responses from first responders is no longer a "nice to have" feature for business owners in large swaths of the country. 


Many local counties and municipalities have sought to recoup the costs associated with such responses by imposing false alarm fines. Though both the dollar amount and guidelines as to when and how these fines can be levied varies, the financial impact can certainly add up over time and result in strained relations between the organization and local authorities.  


For those with in-house or contract guards, the need to reduce the number of nuisance alarms is also significant. The virtual firehose of data being generated by today's security systems has resulted in an increasing number of businesses leveraging video monitoring to reduce the response burden on security staff and avoid having to dispatch personnel to the outskirts of a facility or campus because an environmental factor triggered a perimeter intrusion sensor. 


However, what if there was a way to leverage the benefits of traditional video monitoring and take them to another level through advanced technology? That's exactly what today's intelligent video analytics are bringing to the table with the advent of proactive video monitoring.  

 

Proactive Video Monitoring: Not Your Grandfather's CCTV 

The current crop of video analytics, which are powered by deep learning algorithms with the ability to "learn" and provide levels of object detection and recognition not previously seen in the industry — a new product category that has collectively come to be known as artificial intelligence (AI) analytics — are revolutionizing video surveillance capabilities. 


No longer are cameras reduced to mere post-event forensic analysis tools, but rather solutions that can help organizations mitigate threats before they materialize. When you combine AI analytics with traditional video monitoring — adding a human-in-the-loop to provide a variety of near-instantaneous responses — you end up with an entirely new industry service paradigm known as proactive video monitoring. 


For comparison, let's take a look at how a typical security incident is handled with traditional video monitoring versus this new proactive methodology. Historically, if an intruder were to breach a perimeter fence or an exterior door, an alert would be generated by a motion detector or a door contact sensor and sent to the console of a security operator, who then has to pull up the feeds of nearby cameras to determine if the alarm is genuine and proceed with the appropriate response protocols — calling the police, exporting a video clip of the crime, etc. 


With proactive video monitoring, this same security operator in the above scenario would — through the use of AI — receive a prioritized alert from the system and immediately begin assessing and verifying the threat, allowing for the ability for intervention specialists to quickly and effectively intervene with live, personalized audio to notify the intruder that they are being monitored and that the authorities will be notified should they proceed any further. 


The goal of security has and always will be to prevent the loss of life and property. Still, the limitations of traditional solutions have reduced the efforts of many businesses to pick up the pieces of an incident after the fact. Even the process of incident reporting, which is still required regardless of what monitoring solution you use, is streamlined with proactive video monitoring. Creating these reports, which can be both time and labor-intensive, can now be generated within a day using proactive video monitoring and distributed to the appropriate internal and external authorities. 

 

Not Just an SMB Solution 

Though many small- and mid-sized (SMB) businesses are currently taking advantage of proactive video monitoring for their after-hours security needs, the solution is not just for the SMB market. In fact, perhaps nowhere else is the technology more needed today than in the enterprise environment. 


Having a distributed geographic footprint across cities, states, and even countries makes staying ahead of threats paramount. Many internal security teams simply don't have the technology or staffing to respond to every alarm on their watch, and it is a well-known fact that an ever-growing number of security personnel have become desensitized to alerts, given their pervasiveness today. 


That makes having trained, dedicated video monitoring personnel that can respond to potential threats before they become full-blown acts of theft or violence critical in today's enterprises. Of course, not every facility within an organization's purview may need the full force that proactive video monitoring brings to bear, but it is certainly worth examining what properties may need the enhanced benefits of such an offering. 


One recent example of how the service played a critical role for enterprises was at the onset of the COVID-19 pandemic. As businesses and their personnel vacated offices virtually overnight, the best way to check in on facilities became through remote video solutions. 


With guards unable to physically man their posts, proactive video monitoring provided a way to still have a human presence, albeit remote, at facilities worldwide to ensure that thieves and other nefarious actors didn't take advantage of an already stressful situation. 

Video surveillance technology has come a long way in recent years. The days of analytics overpromising and underdelivering are over. It's time to take the leap and see how proactive video monitoring can address your biggest security challenge.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: alarm monitoring artificial intelligence (AI) loss prevention surveillance video monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Justin Wilmas has more than 15 years of experience solving security challenges for end users and channel partners in the most significant industry verticals. Throughout his career, he has consistently broken new ground in driving business growth for a number of industry leaders, while helping customers implement holistic enterprise security solutions that minimize risk, and achieve compliance and operational efficiencies. Currently President of Netwatch Systems, Justin continues to maintain his focus on creating a positive team environment as he has at companies including Quantum Secure, AMAG Technology and Pelco. 


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • construction site

    Why construction sites need proactive security

    See More
  • doctor in hospital

    Strategies for implementing proactive & reactive mass notification

    See More
  • FutureSentry

    Be Proactive, Not Reactive – With Your Perimeter Security

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing