Embarking on a remote video monitoring solution, especially third party, can seem like an overwhelming mission. However, with considerable value add to be gained by augmenting your security function, it’s imperative to educate yourself to recognize if it is right for you.

Online Exclusive: Real Talk About Remote Video Monitoring

Embarking on a remote video monitoring solution, especially third party, can seem like an overwhelming mission. However, with considerable value add to be gained by augmenting your security function, it’s imperative to educate yourself to recognize if it is right for you.

Cale Dowell with Thrive IntelligenceWith recent innovations and improved economies of scale, remote video monitoring is becoming a value added service of numerous security companies. As the cost of intelligent cameras becomes more and more budget friendly, companies are starting to dabble in remote video monitoring to capitalize on increased capabilities, amplified intelligence and improved situational awareness.

But what does remote video monitoring actually accomplish, and what type of remote video technology solutions make a difference? Does simply having remote access to your own Closed Circuit Television (CCTV) system accomplish anything? The reality is both simple and complex, and might vary depending on your specific needs as an end user. But, most importantly, the days of dedicated security personnel live monitoring a localized CCTV solution are beginning to dwindle at a rapid pace. The primary cause: cost and advancements to technology.

Unsurprisingly, people are fallible. Much to the disagreement of my nephew, humans are not designed to sit and stare at a video screen all day. And yet, the average cost for a 24/7 onsite individual to monitor a local CCTV feed is often more than $100,000 annually.

As a result, security professionals and end users alike are turning to hybrid solutions leveraging remote video monitoring. Companies no longer have to spend an arm and a leg for onsite personnel to monitor onsite security cameras 24/7. We can stream that feed to a remote location, in many cases at a significant cost savings. But it begs the question: if the onsite individual isn’t any good, why would an offsite professional do any better?

Technological innovations play a role

This is where innovations in technology have come into play. They provide the stimulus needed to analyze suspicious alarms when they trigger. Paired with a robust video solution, these alarms become more valuable because a monitoring service can verify what triggered the alarm remotely. And companies began turning to event based models to make onsite or offsite security professional more effective. However, in the world of real time monitoring, false alarms are the killer. Intrusion alarms and motion detection are examples of antiquated technology. They activate off an extremely simplistic ruleset. The contacts become misaligned, the alarm triggers. Pixilation change in the camera will activate an event. There’s no intelligence to the signal and false alarms are rampant.

But technology has advanced much, much more, providing monitoring personnel the tools to amplify the focus on the valuable intelligence sought. Innovations in video analytics allow operators and end users to get more specific on how and why an event should be triggered, even classifying objects and customizing rulesets within virtual zones. Video analytics provides “smart” technology. And when leveraged with a robust remote monitoring center, video analytics can dramatically impact the level of actionable situational awareness and response. The result: significant reduction of false alarms, quicker intervention, and reduced dependency on labor.

Is remote video monitoring the right fit?

So how do you determine whether or not remote video monitoring is right for you? First, make sure your organization is leveraging innovative technology and not just outsourcing a feed. Simply pawning off your CCTV to a remote site doesn’t mean it will have an impact to your security function. Making use of a technology like video analytics is essential. Second, think about your security holistically. Many corporate end users have a dream to create their own security operations center (SOC) that would monitor all of their security systems and CCTV across a region, nation, or worldwide. However, the vast majority that start down the path of visualizing their own robust monitoring center realize that the capital cost and staffing needs essentially demands they create their own security company within their organization. This is not to say that all corporate users should avoid building their own SOC, but in many cases it isn’t necessary. For example, within our own organization we have several national clients that have successfully re-evaluated their holistic security designs to dramatically increase situational awareness and effective manpower response while reducing annual security expenditures. And since security is generally not a revenue driver, the best option for many major corporations is often to consider a third party provider.

Over the next 5-10 years, we’re going to see an incredible consolidation of security functions amongst some of the world’s largest providers. Many corporate end users are pushing for “one stop shops” that can provide the complete end-to-end physical security solution: equipment needs (intrusion, access control and CCTV), integration and service, manpower, and monitoring. This allows for a more universal approach to security design, with each function playing a key role and working together to maximize the overall value, as opposed to piecemealing the solution across multiple vendors. Pairing those functions with a robust, remote security operations center to monitor and respond to events as they occur will dramatically impact security effectiveness and cost savings.

Many points to consider

So when determining whether video monitoring is right for you, consider whether or not the vendor of choice can provide the full suite of services. And finally, no matter how great the technology might be, it becomes worthless if the people monitoring the events do not have adequate training or the proper disposition to be effective in their response and judgment.

Thus, the most important attributes to consider with respect to remote video monitoring are the following: what does the provider offer, and what do they do in house? Can they also supply manpower, access control, CCTV solutions, etc.? If so, is it through a partnership, or do they actually provide it themselves? And, most importantly, who are the people monitoring events and what kind of training do they receive? Consider asking questions like:

  • Can I take a tour of your security operations center?
  • What type of existing technology can you integrate with?
  • How can you maximize the existing investment in security architecture that we have onsite?
  • How will blending services impact my security budget? What services can you blend for us?
  • Where would you recommend augmentation or reduction of existing man hours (if any)?
  • What certifications do your monitoring personnel have?
  • How can we customize responses to triggered events?
  • What type of redundancies do you have onsite?

When picking a remote video monitoring provider, you should consider a provider that offers more than just the monitoring component. The technology they deploy, the ability to integrate with existing hardware, and their training and certification will be vital to any impact made on your security design and spend.

Embarking on a remote video monitoring solution, especially third party, can seem like an overwhelming mission. However, with considerable value add to be gained by augmenting your security function, it’s imperative to educate yourself to recognize if it is right for you. Ask vendors to help you understand the ins and outs of what they provide. Ask them to educate you on the finer points of how the technology works, and what makes their monitoring center so great. Keep abreast of new technology, and stay involved in the industry to understand what new functions are being developed to improve capabilities and cost control. As always, the best way to impact your security functions is to be proactive and stay on top of what’s simply “new” and what actually works.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.