Embarking on a remote video monitoring solution, especially third party, can seem like an overwhelming mission. However, with considerable value add to be gained by augmenting your security function, it’s imperative to educate yourself to recognize if it is right for you.

Online Exclusive: Real Talk About Remote Video Monitoring

Embarking on a remote video monitoring solution, especially third party, can seem like an overwhelming mission. However, with considerable value add to be gained by augmenting your security function, it’s imperative to educate yourself to recognize if it is right for you.

Cale Dowell with Thrive IntelligenceWith recent innovations and improved economies of scale, remote video monitoring is becoming a value added service of numerous security companies. As the cost of intelligent cameras becomes more and more budget friendly, companies are starting to dabble in remote video monitoring to capitalize on increased capabilities, amplified intelligence and improved situational awareness.

But what does remote video monitoring actually accomplish, and what type of remote video technology solutions make a difference? Does simply having remote access to your own Closed Circuit Television (CCTV) system accomplish anything? The reality is both simple and complex, and might vary depending on your specific needs as an end user. But, most importantly, the days of dedicated security personnel live monitoring a localized CCTV solution are beginning to dwindle at a rapid pace. The primary cause: cost and advancements to technology.

Unsurprisingly, people are fallible. Much to the disagreement of my nephew, humans are not designed to sit and stare at a video screen all day. And yet, the average cost for a 24/7 onsite individual to monitor a local CCTV feed is often more than $100,000 annually.

As a result, security professionals and end users alike are turning to hybrid solutions leveraging remote video monitoring. Companies no longer have to spend an arm and a leg for onsite personnel to monitor onsite security cameras 24/7. We can stream that feed to a remote location, in many cases at a significant cost savings. But it begs the question: if the onsite individual isn’t any good, why would an offsite professional do any better?

Technological innovations play a role

This is where innovations in technology have come into play. They provide the stimulus needed to analyze suspicious alarms when they trigger. Paired with a robust video solution, these alarms become more valuable because a monitoring service can verify what triggered the alarm remotely. And companies began turning to event based models to make onsite or offsite security professional more effective. However, in the world of real time monitoring, false alarms are the killer. Intrusion alarms and motion detection are examples of antiquated technology. They activate off an extremely simplistic ruleset. The contacts become misaligned, the alarm triggers. Pixilation change in the camera will activate an event. There’s no intelligence to the signal and false alarms are rampant.

But technology has advanced much, much more, providing monitoring personnel the tools to amplify the focus on the valuable intelligence sought. Innovations in video analytics allow operators and end users to get more specific on how and why an event should be triggered, even classifying objects and customizing rulesets within virtual zones. Video analytics provides “smart” technology. And when leveraged with a robust remote monitoring center, video analytics can dramatically impact the level of actionable situational awareness and response. The result: significant reduction of false alarms, quicker intervention, and reduced dependency on labor.

Is remote video monitoring the right fit?

So how do you determine whether or not remote video monitoring is right for you? First, make sure your organization is leveraging innovative technology and not just outsourcing a feed. Simply pawning off your CCTV to a remote site doesn’t mean it will have an impact to your security function. Making use of a technology like video analytics is essential. Second, think about your security holistically. Many corporate end users have a dream to create their own security operations center (SOC) that would monitor all of their security systems and CCTV across a region, nation, or worldwide. However, the vast majority that start down the path of visualizing their own robust monitoring center realize that the capital cost and staffing needs essentially demands they create their own security company within their organization. This is not to say that all corporate users should avoid building their own SOC, but in many cases it isn’t necessary. For example, within our own organization we have several national clients that have successfully re-evaluated their holistic security designs to dramatically increase situational awareness and effective manpower response while reducing annual security expenditures. And since security is generally not a revenue driver, the best option for many major corporations is often to consider a third party provider.

Over the next 5-10 years, we’re going to see an incredible consolidation of security functions amongst some of the world’s largest providers. Many corporate end users are pushing for “one stop shops” that can provide the complete end-to-end physical security solution: equipment needs (intrusion, access control and CCTV), integration and service, manpower, and monitoring. This allows for a more universal approach to security design, with each function playing a key role and working together to maximize the overall value, as opposed to piecemealing the solution across multiple vendors. Pairing those functions with a robust, remote security operations center to monitor and respond to events as they occur will dramatically impact security effectiveness and cost savings.

Many points to consider

So when determining whether video monitoring is right for you, consider whether or not the vendor of choice can provide the full suite of services. And finally, no matter how great the technology might be, it becomes worthless if the people monitoring the events do not have adequate training or the proper disposition to be effective in their response and judgment.

Thus, the most important attributes to consider with respect to remote video monitoring are the following: what does the provider offer, and what do they do in house? Can they also supply manpower, access control, CCTV solutions, etc.? If so, is it through a partnership, or do they actually provide it themselves? And, most importantly, who are the people monitoring events and what kind of training do they receive? Consider asking questions like:

  • Can I take a tour of your security operations center?
  • What type of existing technology can you integrate with?
  • How can you maximize the existing investment in security architecture that we have onsite?
  • How will blending services impact my security budget? What services can you blend for us?
  • Where would you recommend augmentation or reduction of existing man hours (if any)?
  • What certifications do your monitoring personnel have?
  • How can we customize responses to triggered events?
  • What type of redundancies do you have onsite?

When picking a remote video monitoring provider, you should consider a provider that offers more than just the monitoring component. The technology they deploy, the ability to integrate with existing hardware, and their training and certification will be vital to any impact made on your security design and spend.

Embarking on a remote video monitoring solution, especially third party, can seem like an overwhelming mission. However, with considerable value add to be gained by augmenting your security function, it’s imperative to educate yourself to recognize if it is right for you. Ask vendors to help you understand the ins and outs of what they provide. Ask them to educate you on the finer points of how the technology works, and what makes their monitoring center so great. Keep abreast of new technology, and stay involved in the industry to understand what new functions are being developed to improve capabilities and cost control. As always, the best way to impact your security functions is to be proactive and stay on top of what’s simply “new” and what actually works.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.