How Do End Users Monitor Surveillance?

Author: Brian Rhodes, Published on Aug 13, 2012

How actively are surveillance systems monitored? Do end users prefer to passively use surveillance for recording activity, or do they actively monitor surveillance video so they can respond in real time? We asked a group of globally distributed end users how they use their system.

Overview

*** ******** ** ***** ** *** ***** ***: "*** ** you ********* ******* **** ************ *******?", *** ******* *******:

  • ** **** * ********* ******** ********/****: ******** **********
  • ** **** ** ** *** ******* **** **** ******: ******** Review
  • *****: *** ** ****

*** ****** ***** **** *** ****** ** *** ******* ***** on ****** ****. ** ******** *** '****' *** ***** **** many ******* ****** '*******', **** ******* ***********, **** **** **** 100 *******.

Confirmed ***********

***** ******* ****** *** ** ********** ***** **** ************ **** larger ******* *** ******** ** **** ****** ********* ******* *** greater ********** *********. ***** ************ ******* *** ********* *********** ** dedicated ***** **** ******** ******* ****. *******, ** *** ****** counts ***** *******, ** **** *** ********** ** ******* ***** surveillance ** **** ****. ** ******* **** *** *** **** deployments **** ** ******* ** ****, **** ***** ***** ******** with ****** *** ********* ********** **** **** ***** ************ ****.

Detailed *********

******* **** *** ******** ******* ****** ****** ** ****** ****** between ***** *** ******. ** **** *****, *** ******** ***** explaining ********* **** ******* ********** ** ****** ****. ** *** section ***** ** ***** ***** ******* **** *** ****** ******:

**** ** *********:******* *** **** **** ****** **** ***** * ****** **** in *** ******* *** ******** ****, **** **** *** ****** how ******* *** ******* ** ** ****. *** ******** ** answers ******** '******** ******' ** '*** ** ****' ************ ********* the **** *** ********* ** ******** ******* *** ***** ** they ***** ****** **. *** ******** ******* ** **** ******** make **** ********** ******* *******:

  • "** ******'* ******* *** **** ** ****** ******** ** *** and **** ******* *** ***."
  • "** ***'* **** *** ***** *** ******* ** ********** ******* it."
  • "*** ** ******** ******, * *** *** ****** ** ******** one ******* ** ******* ************."
  • "******** ** ******* ** *****."
  • "****** ****** ** **** *** **** ** *******."
  • "** ***'* **** *** ******** ** ***** *** ****** ****"
  • "* **** **** *******. * **** *** ******* ******** *** 20 ***** * **** *** ******."

*******, **** *** ***** **** *** ******** ***** ** ************ is ******** **** ********* *** ******** *** ********** ********. ** possible, *** ***** ***** ****** ** **** ** ****** ******** to ****** ** **** ***** ****** **** ********* ** ************ review ******** *****.

***********:**** *** ***** **** ******** ******* *******, ********** ***** ** the ****** "**** **** *** *******" *****, *** ******** ** do ** ** *********** *********** ** ***********. ******* ******* **** no ******* ** ***** ********** ** ******** ******* ** ************ review *****, **** **** **** *** ****** ** ** ** without ***** *******:

  • "**** **** ** *** ** ******** ************ *** ******* ***********"
  • "** ******* ** * ****** ****** ** ********** **** ** require * **** *****."
  • "****** ******** **"
  • "******** ** **** *** ***. ***** *** ****** ********** **** have ************ ********* ******** ******* */**/***."

********** ** *********:** * ****** ******, *** ***** ***** ********** ****** ******* security *** **** ***** **********. ***** ******* **** ********* **** surveillance ** *** ****** ********* ** **** '********' ****, *** also ********* ******** '**********' ** '**********' **** ************ ******* ** well.

  • "** *** **** ****** ***** ** ****** ** ******** *** risk ***** ** ********."
  • "** *********** ****** ****** *** ******** ********** **** **************"
  • "** **** **** ***** **** **** **** *******, ***** ** video. ** *********."
  • "******** **** ***** *********, ******* ********** ** ***** *****."
  • "********* ********** ** *** ** ********. **** ******** **** ** remove *** ******* ******** *******."
  • "********** ***** *** ******** *********** *******."
  • "*** *** ** **** ****** ** *** *********** ** ******* a **** ******* ** ******** ***** ***** ******* ***** ***."

*************, **** '***** ****' ***** *** ***** **** ********** ** larger *******. ****** ******* ********** ** ****** ***** *****, *** even ** ******** ***** *** ***** ** ********** ** ****** monitoring, ***** *********** *** ********** ***** ** *** ******. ******* characteristic ** ******* ****** *********** *** ***** ******** ** ****** cameras **** ** '******** ********' *****, ***** ****** ******* *** more ****** ** ** ****** ** ********** ***** ***********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Pelco Optera 270° Camera Tested on Sep 06, 2016
Multi-imager cameras are typically 180° or 360°. Pelco has released a fixed 270° versions of their Optera intended to cover exterior building...
Ex-Microsoft Exec Surveillance Startup Nepoware on Sep 02, 2016
Former Microsoft executive Richard Ang says he wanted to build an IoT device, and so he has spent 3 years developing what he says is a more...
Get End User Leads for Just $997 A Month on Aug 31, 2016
Scam or opportunity? As trade mags continue to suffer from the decline of print media, they are scrounging for new ways to make money. Rather than...
Integrators Vs Manufacturers Direct To End Users on Aug 31, 2016
Many manufacturers have increasingly large and hungry sales forces that call on more and more end users. One recent example is Axis ~$20 Billion...
Viakoo Health Monitoring Examined on Aug 26, 2016
Viakoo, the company of ex-Intransa leaders, says they have created a monitoring tool for security networks that is easy to deploy and offers...
Axxon Next VMS 4.0 Tested on Aug 24, 2016
AxxonSoft is one of the biggest VMS vendors (reporting 263,000 channels sold in 2015), especially strong in their home market of Russia, but not...
Bosch Intrusion Detection Profile on Aug 10, 2016
This is a first in a new IPVM series profiling intrusion detection / alarm offerings. In this series, starting with Bosch, we examine: Key...
Something TERRIBLY WRONG In The Home Security Industry on Aug 08, 2016
Who is terribly wrong? The $57 million Silicon Valley funded startup, SimpliSafe or the security trade magazine that is 'mad as...
Logipix 20MP, 140MP and 200MP Cameras Examined on Jul 20, 2016
Looking for an Avigilon alternative? Logipix, based in Hungary, has created their own super high resolution end-to-end solution, featuring 20MP -...
Feenics Hosted Access Control Tested on Jul 07, 2016
In the access market, new entrants are uncommon. Because of that, newcomer hosted access vendor Feenics has gained the curiosity of many. A...

Most Recent Industry Reports

Camera Calculator Class and IPVM Member Orientation October 2016 on Sep 28, 2016
Members, learn how to better design video surveillance systems and get the most out of your IPVM memberships with 2 upcoming live classes. Both...
Axis 4MP Camera Tested (M3046-V) on Sep 28, 2016
Axis has brought 4MP to its camera line in the new M3046-V, the highest resolution model in their revamped M30 series. We bought and tested this...
Hiring Spree At Aimetis 6 Months After Being Acquired on Sep 28, 2016
Aimetis was acquired in April 2016, and is now expanding almost all of their departments, hiring employees from Axis and other industry...
Camio Natural Language Processing Tested on Sep 27, 2016
The ex-Googler led team from Camio has advanced its video monitoring offering to include natural language processing. Camio ingests video,...
Access Door Controller Configuration Guide on Sep 27, 2016
Properly configuring access control door controllers is key to a professional system. These devices have fundamental settings that must be...
Hacked Dahua Cameras Drive Massive Cyber Attack on Sep 27, 2016
Cyber attacks are accelerating and IP cameras are behind many of them. Worse, last week, a 'massive' attack was carried out using numerous Dahua...
Axis Secretly Paid Anixter Sales People To Push Axis NVRs on Sep 26, 2016
Internal Axis communication shows how Axis paid Anixter and Tri-Ed sales people with secret bonuses to push Axis NVRs. In this report, we examine...
VLANs for Video Surveillance Tutorial on Sep 26, 2016
Many people confidently say to 'use VLANs' as an answer to IP video networking problems and as a way to signal expertise. But how should VLANs be...
Ambarella CEO Admits H.265 and 4K Not Popular on Sep 26, 2016
Ambarella is the main chip provider for high-end surveillance cameras driving higher resolution and new CODECs. While Ambarella has been pushing...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact