How Do End Users Monitor Surveillance?

Author: Brian Rhodes, Published on Aug 13, 2012

How actively are surveillance systems monitored? Do end users prefer to passively use surveillance for recording activity, or do they actively monitor surveillance video so they can respond in real time? We asked a group of globally distributed end users how they use their system.

Overview

*** ******** ** ***** ** *** ***** ***: "*** ** you ********* ******* **** ************ *******?", *** ******* *******:

  • ** **** * ********* ******** ********/****: ******** **********
  • ** **** ** ** *** ******* **** **** ******: ******** Review
  • *****: *** ** ****

*** ****** ***** **** *** ****** ** *** ******* ***** on ****** ****. ** ******** *** '****' *** ***** **** many ******* ****** '*******', **** ******* ***********, **** **** **** 100 *******.

Confirmed ***********

***** ******* ****** *** ** ********** ***** **** ************ **** larger ******* *** ******** ** **** ****** ********* ******* *** greater ********** *********. ***** ************ ******* *** ********* *********** ** dedicated ***** **** ******** ******* ****. *******, ** *** ****** counts ***** *******, ** **** *** ********** ** ******* ***** surveillance ** **** ****. ** ******* **** *** *** **** deployments **** ** ******* ** ****, **** ***** ***** ******** with ****** *** ********* ********** **** **** ***** ************ ****.

Detailed *********

******* **** *** ******** ******* ****** ****** ** ****** ****** between ***** *** ******. ** **** *****, *** ******** ***** explaining ********* **** ******* ********** ** ****** ****. ** *** section ***** ** ***** ***** ******* **** *** ****** ******:

**** ** *********:******* *** **** **** ****** **** ***** * ****** **** in *** ******* *** ******** ****, **** **** *** ****** how ******* *** ******* ** ** ****. *** ******** ** answers ******** '******** ******' ** '*** ** ****' ************ ********* the **** *** ********* ** ******** ******* *** ***** ** they ***** ****** **. *** ******** ******* ** **** ******** make **** ********** ******* *******:

  • "** ******'* ******* *** **** ** ****** ******** ** *** and **** ******* *** ***."
  • "** ***'* **** *** ***** *** ******* ** ********** ******* it."
  • "*** ** ******** ******, * *** *** ****** ** ******** one ******* ** ******* ************."
  • "******** ** ******* ** *****."
  • "****** ****** ** **** *** **** ** *******."
  • "** ***'* **** *** ******** ** ***** *** ****** ****"
  • "* **** **** *******. * **** *** ******* ******** *** 20 ***** * **** *** ******."

*******, **** *** ***** **** *** ******** ***** ** ************ is ******** **** ********* *** ******** *** ********** ********. ** possible, *** ***** ***** ****** ** **** ** ****** ******** to ****** ** **** ***** ****** **** ********* ** ************ review ******** *****.

***********:**** *** ***** **** ******** ******* *******, ********** ***** ** the ****** "**** **** *** *******" *****, *** ******** ** do ** ** *********** *********** ** ***********. ******* ******* **** no ******* ** ***** ********** ** ******** ******* ** ************ review *****, **** **** **** *** ****** ** ** ** without ***** *******:

  • "**** **** ** *** ** ******** ************ *** ******* ***********"
  • "** ******* ** * ****** ****** ** ********** **** ** require * **** *****."
  • "****** ******** **"
  • "******** ** **** *** ***. ***** *** ****** ********** **** have ************ ********* ******** ******* */**/***."

********** ** *********:** * ****** ******, *** ***** ***** ********** ****** ******* security *** **** ***** **********. ***** ******* **** ********* **** surveillance ** *** ****** ********* ** **** '********' ****, *** also ********* ******** '**********' ** '**********' **** ************ ******* ** well.

  • "** *** **** ****** ***** ** ****** ** ******** *** risk ***** ** ********."
  • "** *********** ****** ****** *** ******** ********** **** **************"
  • "** **** **** ***** **** **** **** *******, ***** ** video. ** *********."
  • "******** **** ***** *********, ******* ********** ** ***** *****."
  • "********* ********** ** *** ** ********. **** ******** **** ** remove *** ******* ******** *******."
  • "********** ***** *** ******** *********** *******."
  • "*** *** ** **** ****** ** *** *********** ** ******* a **** ******* ** ******** ***** ***** ******* ***** ***."

*************, **** '***** ****' ***** *** ***** **** ********** ** larger *******. ****** ******* ********** ** ****** ***** *****, *** even ** ******** ***** *** ***** ** ********** ** ****** monitoring, ***** *********** *** ********** ***** ** *** ******. ******* characteristic ** ******* ****** *********** *** ***** ******** ** ****** cameras **** ** '******** ********' *****, ***** ****** ******* *** more ****** ** ** ****** ** ********** ***** ***********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Anixter Sales People Selling To End Users on Nov 03, 2016
Anixter's most frequently heard defense of selling to end users is that they used to do it, but not anymore. However, this was undermined by...
The Xiongmai Botnet 'Recall' Will Not Work on Oct 25, 2016
The Xiongmai 'recall' has been the topic of global news, following the unprecedented bot net attacks that use their equipment, among...
No Marketing Gimmick, Sharp Security Robot Targets Professional Market on Oct 17, 2016
Security robots are getting a lot of attention. Unfortunately, this is often for wrong reasons, most spectacularly highlighted by the Knightscope...
Pelco Optera 270° Camera Tested on Sep 06, 2016
Multi-imager cameras are typically 180° or 360°. Pelco has released a fixed 270° versions of their Optera intended to cover exterior building...
Ex-Microsoft Exec Surveillance Startup Nepoware on Sep 02, 2016
Former Microsoft executive Richard Ang says he wanted to build an IoT device, and so he has spent 3 years developing what he says is a more...
Get End User Leads for Just $997 A Month on Aug 31, 2016
Scam or opportunity? As trade mags continue to suffer from the decline of print media, they are scrounging for new ways to make money. Rather than...
Integrators Vs Manufacturers Direct To End Users on Aug 31, 2016
Many manufacturers have increasingly large and hungry sales forces that call on more and more end users. One recent example is Axis ~$20 Billion...
Viakoo Health Monitoring Examined on Aug 26, 2016
Viakoo, the company of ex-Intransa leaders, says they have created a monitoring tool for security networks that is easy to deploy and offers...
Axxon Next VMS 4.0 Tested on Aug 24, 2016
AxxonSoft is one of the biggest VMS vendors (reporting 263,000 channels sold in 2015), especially strong in their home market of Russia, but not...
Bosch Intrusion Detection Profile on Aug 10, 2016
This is a first in a new IPVM series profiling intrusion detection / alarm offerings. In this series, starting with Bosch, we examine: Key...

Most Recent Industry Reports

Hikvision vs Dahua Mobile Apps Tested on Dec 07, 2016
With smartphone use and low-cost video recorders surging, many user's main interface to their surveillance system is their phone. With mobile video...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Axis Partner Elder Care Video Analytics (Smartervision) on Dec 07, 2016
Can video analytics be used to improve the care of the elderly? Axis and a video analytics startup, Smartervision, are working together to do so....
Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...
XiongMai Master Password List Emailed By Chinese Spammer on Dec 05, 2016
XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites. After pledging to recall cameras...
Hikvision Cloud Security Vulnerability Uncovered on Dec 05, 2016
A security researcher uncovered a critical vulnerability in Hikvision's global cloud servers. This vulnerability allowed an attacker to remotely...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Pelco Favorability Results on Dec 02, 2016
This is the first in a series of studies of manufacturer favorability. 100+ integrators rated and explained their views of each manufacturer. We...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact