Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical SecurityVideo Surveillance

Video monitoring goes from reactive to proactive

A look at how artificial intelligence-powered analytics are breathing new life into a tried-and-true solution

By Justin Wilmas
video-surveillance-fp-1170x658v578.jpg

Image by perig76 via Freepik

August 5, 2022

For all the advancements the video surveillance industry has seen over the past two decades — the widespread shift from analog to IP, increasing acceptance and use of cloud-based platforms, and proliferation of high-resolution cameras driven by the commoditization of video hardware — the job of monitoring surveillance feeds has changed relatively little. 


Sure, some of these advancements have greatly aided security operators in quickly distinguishing between benign incidents and actual intrusions. Still, video monitoring remains a largely reactive tool to address incidents after they have already occurred. 


This is not necessarily bad, as reducing nuisance alarms remains one of the hallmarks of good security monitoring. It's also become clear that preventing unnecessary responses from first responders is no longer a "nice to have" feature for business owners in large swaths of the country. 


Many local counties and municipalities have sought to recoup the costs associated with such responses by imposing false alarm fines. Though both the dollar amount and guidelines as to when and how these fines can be levied varies, the financial impact can certainly add up over time and result in strained relations between the organization and local authorities.  


For those with in-house or contract guards, the need to reduce the number of nuisance alarms is also significant. The virtual firehose of data being generated by today's security systems has resulted in an increasing number of businesses leveraging video monitoring to reduce the response burden on security staff and avoid having to dispatch personnel to the outskirts of a facility or campus because an environmental factor triggered a perimeter intrusion sensor. 


However, what if there was a way to leverage the benefits of traditional video monitoring and take them to another level through advanced technology? That's exactly what today's intelligent video analytics are bringing to the table with the advent of proactive video monitoring.  

 

Proactive Video Monitoring: Not Your Grandfather's CCTV 

The current crop of video analytics, which are powered by deep learning algorithms with the ability to "learn" and provide levels of object detection and recognition not previously seen in the industry — a new product category that has collectively come to be known as artificial intelligence (AI) analytics — are revolutionizing video surveillance capabilities. 


No longer are cameras reduced to mere post-event forensic analysis tools, but rather solutions that can help organizations mitigate threats before they materialize. When you combine AI analytics with traditional video monitoring — adding a human-in-the-loop to provide a variety of near-instantaneous responses — you end up with an entirely new industry service paradigm known as proactive video monitoring. 


For comparison, let's take a look at how a typical security incident is handled with traditional video monitoring versus this new proactive methodology. Historically, if an intruder were to breach a perimeter fence or an exterior door, an alert would be generated by a motion detector or a door contact sensor and sent to the console of a security operator, who then has to pull up the feeds of nearby cameras to determine if the alarm is genuine and proceed with the appropriate response protocols — calling the police, exporting a video clip of the crime, etc. 


With proactive video monitoring, this same security operator in the above scenario would — through the use of AI — receive a prioritized alert from the system and immediately begin assessing and verifying the threat, allowing for the ability for intervention specialists to quickly and effectively intervene with live, personalized audio to notify the intruder that they are being monitored and that the authorities will be notified should they proceed any further. 


The goal of security has and always will be to prevent the loss of life and property. Still, the limitations of traditional solutions have reduced the efforts of many businesses to pick up the pieces of an incident after the fact. Even the process of incident reporting, which is still required regardless of what monitoring solution you use, is streamlined with proactive video monitoring. Creating these reports, which can be both time and labor-intensive, can now be generated within a day using proactive video monitoring and distributed to the appropriate internal and external authorities. 

 

Not Just an SMB Solution 

Though many small- and mid-sized (SMB) businesses are currently taking advantage of proactive video monitoring for their after-hours security needs, the solution is not just for the SMB market. In fact, perhaps nowhere else is the technology more needed today than in the enterprise environment. 


Having a distributed geographic footprint across cities, states, and even countries makes staying ahead of threats paramount. Many internal security teams simply don't have the technology or staffing to respond to every alarm on their watch, and it is a well-known fact that an ever-growing number of security personnel have become desensitized to alerts, given their pervasiveness today. 


That makes having trained, dedicated video monitoring personnel that can respond to potential threats before they become full-blown acts of theft or violence critical in today's enterprises. Of course, not every facility within an organization's purview may need the full force that proactive video monitoring brings to bear, but it is certainly worth examining what properties may need the enhanced benefits of such an offering. 


One recent example of how the service played a critical role for enterprises was at the onset of the COVID-19 pandemic. As businesses and their personnel vacated offices virtually overnight, the best way to check in on facilities became through remote video solutions. 


With guards unable to physically man their posts, proactive video monitoring provided a way to still have a human presence, albeit remote, at facilities worldwide to ensure that thieves and other nefarious actors didn't take advantage of an already stressful situation. 

Video surveillance technology has come a long way in recent years. The days of analytics overpromising and underdelivering are over. It's time to take the leap and see how proactive video monitoring can address your biggest security challenge.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: alarm monitoring artificial intelligence (AI) loss prevention surveillance video monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Justin Wilmas has more than 15 years of experience solving security challenges for end users and channel partners in the most significant industry verticals. Throughout his career, he has consistently broken new ground in driving business growth for a number of industry leaders, while helping customers implement holistic enterprise security solutions that minimize risk, and achieve compliance and operational efficiencies. Currently President of Netwatch Systems, Justin continues to maintain his focus on creating a positive team environment as he has at companies including Quantum Secure, AMAG Technology and Pelco. 


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • construction site

    Why construction sites need proactive security

    See More
  • computer

    Move surveillance to a proactive security strategy with video analytics

    See More
  • cctv

    Leveraging video surveillance for proactive security

    See More

Events

View AllSubmit An Event
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!