Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Physical » Video Surveillance

Video Surveillance
Video Surveillance RSS Feed RSS

Boosting Detection with Video Analytics

Can a high-tech, high-cost video surveillance system be wasted on its monitors?
August 1, 2014

According to Royce Jeffries, the VP of Security Risk Management for Cornhusker Bank, the area had been affected by “lane gang crimes” – thieves break into vehicles or homes to take wallets and checkbooks. Then they drive to the bank with a check and the account holder’s ID, go to the furthest drive-through lane, often in disguise, and try to cash checks.


Read More

In Defense of Post-9/11 Surveillance

The disclosures by Edward Snowden over the past year have raised the public’s awareness about the U.S. Government’s surveillance tactics and capabilities to defend our nation against another 9/11 magnitude attack.
Bob Liscouski
August 1, 2014

Surveillance was performed by putting people on the street and watching from parked cars and vans disguised at Bell Telephone service vehicles with portholes cut out for still cameras.


Read More

Choosing the Right IP Video Storage for Your Enterprise

Johnson Yang
July 8, 2014
The migration from analog to digital has been on the rise for several years and thanks to new computer technologies, video over IP is more prevalent today.
Read More

Maintaining Awareness with Day/Night Cameras

River Islands has been advertised as the ideal place to raise a family because of extensive surveillance technology, security checkpoints and other policing strategies.
diane-2016-200.jpg
Diane Ritchey
July 1, 2014

Violent crime has either steadily declined or increased, depending upon the part of the country, although consistent budget cuts are one reason that lawmakers in some municipalities have been forced to hire fewer police officers when new camera equipment will do.


Read More

Adapting Surveillance and Video Analytics for High-Stakes Ports

Surveillance and ports seem to go hand in hand
Claire Meyer
July 1, 2014

According to Greg DeCanio, the Chief of Law Enforcement at LIMA, the new video management system provides airport security personnel with “the ability to access video at our computers, making us more efficient and letting us monitor activity for security and law enforcement purposes at the touch of a button.”


Read More

Adopting Wireless Video to Tackle Covert Surveillance Operations

Crime and vandalism are down with wireless video.
diane-2016-200.jpg
Diane Ritchey
June 1, 2014

The results have been amazing: over the course of six months, more than 100 arrests have been made for outstanding warrants, gun violations, underage drinking, drug possession and robbery. Crime and vandalism are down; hikers and bikers feel safe again visiting the area.


Read More

How to Make Unreliable Video Reliable

At any given time, 30 percent of an IP video network does not work properly.
diane-2016-200.jpg
Diane Ritchey
June 1, 2014

Viakoo detects and alerts customers to anything that threatens, degrades or stops a video stream from the camera across the network to the recording disks; every 20- minutes. It also points to the probable cause and what corrective action should be taken


Read More

Using Security Convergence to Enable the Enterprise

Enterprises realize tremendous benefits from this convergence as well as some serious downsides, but the trend is irreversible.
Bob Liscouski
June 1, 2014

The concept of remote decision making, while necessary in 2000, is not necessary today. Let’s use the significant security and power of existing IT networks, let it all be managed by IT and let security get back to their primary job, deciding who should get in and responding to those who should not.


Read More

Adding Function, Lowering Cost with Video Management

It’s an ongoing and inevitable conundrum for security systems managers: not all end users are experts.
Claire Meyer
May 1, 2014

The Town of Addison, Texas, is also seeing a return on its surveillance investment through easier-to-manage VMS. After a routine camera filter-and-replace, the Town’s IT department replaced cameras at three locations throughout the community: a 150,000 square-foot Athletic Club , a 44,000 square-foot Conference and Theatre Centre , and the 20-acre Addison Circle Park.


Read More

Making Surveillance a Business Intelligence Necessity

There are two types of successful CSOs today: those that have cross-purposed their investment in video surveillance, and those that will.
Bob Liscouski
May 1, 2014

In business, anomalies (events that differ from the norm) should get your attention. From a loss prevention perspective, one of the most effective ways to counter theft and fraud is to identify and track POS transactions that differ from the norm.


Read More
Previous 1 2 … 137 138 139 140 141 142 143 144 145 … 157 158 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing