How Do End Users Monitor Surveillance?

Author: Brian Rhodes, Published on Aug 13, 2012

How actively are surveillance systems monitored? Do end users prefer to passively use surveillance for recording activity, or do they actively monitor surveillance video so they can respond in real time? We asked a group of globally distributed end users how they use their system.

Overview

*** ******** ** ***** ** *** ***** ***: "*** ** you ********* ******* **** ************ *******?", *** ******* *******:

  • ** **** * ********* ******** ********/****: ******** **********
  • ** **** ** ** *** ******* **** **** ******: ******** Review
  • *****: *** ** ****

*** ****** ***** **** *** ****** ** *** ******* ***** on ****** ****. ** ******** *** '****' *** ***** **** many ******* ****** '*******', **** ******* ***********, **** **** **** 100 *******.

 

 

Confirmed ***********

***** ******* ****** *** ** ********** ***** **** ************ **** larger ******* *** ******** ** **** ****** ********* ******* *** greater ********** *********. ***** ************ ******* *** ********* *********** ** dedicated ***** **** ******** ******* ****. *******, ** *** ****** counts ***** *******, ** **** *** ********** ** ******* ***** surveillance ** **** ****. ** ******* **** *** *** **** deployments **** ** ******* ** ****, **** ***** ***** ******** with ****** *** ********* ********** **** **** ***** ************ ****.

Detailed *********

******* **** *** ******** ******* ****** ****** ** ****** ****** between ***** *** ******. ** **** *****, *** ******** ***** explaining ********* **** ******* ********** ** ****** ****. ** *** section ***** ** ***** ***** ******* **** *** ****** ******:

**** ** *********:******* *** **** **** ****** **** ***** * ****** **** in *** ******* *** ******** ****, **** **** *** ****** how ******* *** ******* ** ** ****. *** ******** ** answers ******** '******** ******' ** '*** ** ****' ************ ********* the **** *** ********* ** ******** ******* *** ***** ** they ***** ****** **. *** ******** ******* ** **** ******** make **** ********** ******* *******:

  • "** ******'* ******* *** **** ** ****** ******** ** *** and **** ******* *** ***."
  • "** ***'* **** *** ***** *** ******* ** ********** ******* it."
  • "*** ** ******** ******, * *** *** ****** ** ******** one ******* ** ******* ************."
  • "******** ** ******* ** *****."
  • "****** ****** ** **** *** **** ** *******."
  • "** ***'* **** *** ******** ** ***** *** ****** ****"
  • "* **** **** *******. * **** *** ******* ******** *** 20 ***** * **** *** ******."

*******, **** *** ***** **** *** ******** ***** ** ************ is ******** **** ********* *** ******** *** ********** ********. ** possible, *** ***** ***** ****** ** **** ** ****** ******** to ****** ** **** ***** ****** **** ********* ** ************ review ******** *****.

***********:**** *** ***** **** ******** ******* *******, ********** ***** ** the ****** "**** **** *** *******" *****, *** ******** ** do ** ** *********** *********** ** ***********. ******* ******* **** no ******* ** ***** ********** ** ******** ******* ** ************ review *****, **** **** **** *** ****** ** ** ** without ***** *******:

  • "**** **** ** *** ** ******** ************ *** ******* ***********"
  • "** ******* ** * ****** ****** ** ********** **** ** require * **** *****."
  • "****** ******** **"
  • "******** ** **** *** ***. ***** *** ****** ********** **** have ************ ********* ******** ******* */**/***."

********** ** *********:** * ****** ******, *** ***** ***** ********** ****** ******* security *** **** ***** **********. ***** ******* **** ********* **** surveillance ** *** ****** ********* ** **** '********' ****, *** also ********* ******** '**********' ** '**********' **** ************ ******* ** well.

  • "** *** **** ****** ***** ** ****** ** ******** *** risk ***** ** ********."
  • "** *********** ****** ****** *** ******** ********** **** **************"
  • "** **** **** ***** **** **** **** *******, ***** ** video. ** *********."
  • "******** **** ***** *********, ******* ********** ** ***** *****."
  • "********* ********** ** *** ** ********. **** ******** **** ** remove *** ******* ******** *******."
  • "********** ***** *** ******** *********** *******."
  • "*** *** ** **** ****** ** *** *********** ** ******* a **** ******* ** ******** ***** ***** ******* ***** ***."

*************, **** '***** ****' ***** *** ***** **** ********** ** larger *******. ****** ******* ********** ** ****** ***** *****, *** even ** ******** ***** *** ***** ** ********** ** ****** monitoring, ***** *********** *** ********** ***** ** *** ******. ******* characteristic ** ******* ****** *********** *** ***** ******** ** ****** cameras **** ** '******** ********' *****, ***** ****** ******* *** more ****** ** ** ****** ** ********** ***** ***********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
IP Network Hardware for Surveillance Guide on May 02, 2018
Video surveillance systems depend on IP networking equipment. In this guide, we explain the key pieces of equipment and features, explaining where...
FLIR Launches Saros on May 01, 2018
Has FLIR solved the video intrusion / remote monitoring problem or have they created an overkill, overly expensive device? FLIR has launched...
Anixter Acquires 'PSIM Platform Inner Range - "Heart of Our Technology Differentiation" on Apr 30, 2018
Anixter Security has made a bold move, acquiring what it calls a PSIM platform as part of a $150 million deal, with Anixter's CEO Bob...
Netwatch / NMC Mega Deal Targets Global Remote Video Monitoring on Apr 27, 2018
Big money has entered the remote video monitoring market. While remote video monitoring has been done for more than a decade, the market has...
Amazon Enters Home Security Services on Apr 26, 2018
Move over ADT? It is certainly what investors have feared for ADT, especially since Amazon acquired Ring. [Update: We spoke with Amazon and have...
Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...
Key Control For Access Control Tutorial on Apr 16, 2018
End users spend thousands on advanced systems to keep themselves secure, but regularly neglect one of the lest expensive yet most important aspects...
Alarm.com Business Market Expansion on Apr 13, 2018
Alarm.com has millions of subscribers, but the company has traditionally been mostly a residential/home focused offering.  ADC's new Smart Business...
GDPR For Video Surveillance Guide on Apr 12, 2018
The European Union’s General Data Protection Regulation (GDPR) comes into force on May 25, but there is much confusion and no clear guidelines on...

Most Recent Industry Reports

Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...
Dahua 12MP Fisheye Camera Tested (NK8BR4) on May 16, 2018
Continuing our coverage of 12MP sensor fisheye cameras, we bought and tested the Dahua NK8BR4, examining: Default vs. Optimized...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Top Benefits Of Attending Trade Shows (Statistics) on May 15, 2018
150 integrators told IPVM: What are the top benefits of going to trade shows? The clear top 2 responses in order: (1) Networking (2) New...
Measuring For Security Installation Guide on May 15, 2018
Accurate measurement is a fundamental skill, yet many installers do not know how to do it. Using these tools are a key skill needed for security...
Arecont Files Ch.11, Agrees To Sell To Turnaround Specialist on May 14, 2018
The long-anticipated sale of Arecont Vision is finally happening. After raising $80 million in debt in 2014, a failed sale in 2017 and the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact