How Do End Users Monitor Surveillance?

Author: Brian Rhodes, Published on Aug 13, 2012

How actively are surveillance systems monitored? Do end users prefer to passively use surveillance for recording activity, or do they actively monitor surveillance video so they can respond in real time? We asked a group of globally distributed end users how they use their system.

Overview

*** ******** ** ***** ** *** ***** ***: "*** ** you ********* ******* **** ************ *******?", *** ******* *******:

  • ** **** * ********* ******** ********/****: ******** **********
  • ** **** ** ** *** ******* **** **** ******: ******** Review
  • *****: *** ** ****

*** ****** ***** **** *** ****** ** *** ******* ***** on ****** ****. ** ******** *** '****' *** ***** **** many ******* ****** '*******', **** ******* ***********, **** **** **** 100 *******.

 

 

Confirmed ***********

***** ******* ****** *** ** ********** ***** **** ************ **** larger ******* *** ******** ** **** ****** ********* ******* *** greater ********** *********. ***** ************ ******* *** ********* *********** ** dedicated ***** **** ******** ******* ****. *******, ** *** ****** counts ***** *******, ** **** *** ********** ** ******* ***** surveillance ** **** ****. ** ******* **** *** *** **** deployments **** ** ******* ** ****, **** ***** ***** ******** with ****** *** ********* ********** **** **** ***** ************ ****.

Detailed *********

******* **** *** ******** ******* ****** ****** ** ****** ****** between ***** *** ******. ** **** *****, *** ******** ***** explaining ********* **** ******* ********** ** ****** ****. ** *** section ***** ** ***** ***** ******* **** *** ****** ******:

**** ** *********:******* *** **** **** ****** **** ***** * ****** **** in *** ******* *** ******** ****, **** **** *** ****** how ******* *** ******* ** ** ****. *** ******** ** answers ******** '******** ******' ** '*** ** ****' ************ ********* the **** *** ********* ** ******** ******* *** ***** ** they ***** ****** **. *** ******** ******* ** **** ******** make **** ********** ******* *******:

  • "** ******'* ******* *** **** ** ****** ******** ** *** and **** ******* *** ***."
  • "** ***'* **** *** ***** *** ******* ** ********** ******* it."
  • "*** ** ******** ******, * *** *** ****** ** ******** one ******* ** ******* ************."
  • "******** ** ******* ** *****."
  • "****** ****** ** **** *** **** ** *******."
  • "** ***'* **** *** ******** ** ***** *** ****** ****"
  • "* **** **** *******. * **** *** ******* ******** *** 20 ***** * **** *** ******."

*******, **** *** ***** **** *** ******** ***** ** ************ is ******** **** ********* *** ******** *** ********** ********. ** possible, *** ***** ***** ****** ** **** ** ****** ******** to ****** ** **** ***** ****** **** ********* ** ************ review ******** *****.

***********:**** *** ***** **** ******** ******* *******, ********** ***** ** the ****** "**** **** *** *******" *****, *** ******** ** do ** ** *********** *********** ** ***********. ******* ******* **** no ******* ** ***** ********** ** ******** ******* ** ************ review *****, **** **** **** *** ****** ** ** ** without ***** *******:

  • "**** **** ** *** ** ******** ************ *** ******* ***********"
  • "** ******* ** * ****** ****** ** ********** **** ** require * **** *****."
  • "****** ******** **"
  • "******** ** **** *** ***. ***** *** ****** ********** **** have ************ ********* ******** ******* */**/***."

********** ** *********:** * ****** ******, *** ***** ***** ********** ****** ******* security *** **** ***** **********. ***** ******* **** ********* **** surveillance ** *** ****** ********* ** **** '********' ****, *** also ********* ******** '**********' ** '**********' **** ************ ******* ** well.

  • "** *** **** ****** ***** ** ****** ** ******** *** risk ***** ** ********."
  • "** *********** ****** ****** *** ******** ********** **** **************"
  • "** **** **** ***** **** **** **** *******, ***** ** video. ** *********."
  • "******** **** ***** *********, ******* ********** ** ***** *****."
  • "********* ********** ** *** ** ********. **** ******** **** ** remove *** ******* ******** *******."
  • "********** ***** *** ******** *********** *******."
  • "*** *** ** **** ****** ** *** *********** ** ******* a **** ******* ** ******** ***** ***** ******* ***** ***."

*************, **** '***** ****' ***** *** ***** **** ********** ** larger *******. ****** ******* ********** ** ****** ***** *****, *** even ** ******** ***** *** ***** ** ********** ** ****** monitoring, ***** *********** *** ********** ***** ** *** ******. ******* characteristic ** ******* ****** *********** *** ***** ******** ** ****** cameras **** ** '******** ********' *****, ***** ****** ******* *** more ****** ** ** ****** ** ********** ***** ***********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

IP Camera Specification / RFP Guide 2017 on Aug 14, 2017
RFPs are hard. Do them 'right' and it takes a lot of knowledge and time. Do them 'wrong' and you can be (a) unwittingly locked into a specific...
Babel Street Global Threat Monitoring Tool Examined on Jul 27, 2017
Intelligence on potential threats and terrorist attacks can often be found online hours, or days, before an actual event, particularly in obscure...
Bosch G-Series Intrusion Tested on Jul 26, 2017
Bosch is one of the biggest names in intrusion, and the company's G-Series panels are their most advanced commercial and high-security panels. But...
Alarm.com Tested on Jul 13, 2017
Alarm.com has become the dominant force in smart home / remote service platform, with ~70% market share, combining their own traditional offering...
Genetec Mission Control Tested on Jul 13, 2017
Genetec continues to move up market with their Mission Control, "Decision Support System", bringing PSIM-like procedures and incident management to...
Smoke Detectors Guide on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
"The Armed Robbery Epidemic" - NRF on Jul 06, 2017
The National Retail Federation (NRF) Protect 2017 featured a session titled: "The Armed Robbery Epidemic: How to Stay Safe". IPVM attended this...
Hikvision USA Hires VP of Business Development on Jul 05, 2017
Hikvision USA is expanding again, this time in its drive to move up market to larger integrators and end users. In this note, we analyze...
ESX 2017 Final Show Report on Jun 16, 2017
The ESX (Electronic Security Expo) day 3 / Thursday is done and the exhibits are over. IPVM was in Nashville covering it in-depth. Below covers...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...

Most Recent Industry Reports

Avigilon CEO Attacks Asian Companies Cyber Insecurity on Aug 18, 2017
Avigilon CEO is taking aim at their Asian competitors. And he is going directly after these company's cyber security issues. In this note, we...
Sony Next Gen HD Dome Camera Tested (SNC-EM642R) on Aug 18, 2017
Sony has released their latest generation, claiming improved WDR and low light, increased IR range, and more. We tested the SNC-EM642R outdoor IR...
IP Networking Course September 2017 on Aug 17, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Knightscope Raises $10 Million With $3,320 Average Per Investor on Aug 17, 2017
Congrats to Knightscope. And condolences to their legion of little investors. Knightscope has disclosed they have raised $10+ million from their...
Axis and Arecont Legal Conflict Over Multi-Imager Cameras on Aug 17, 2017
Arecont threatened Axis. Axis has responded by moving to invalidate an Arecont patent. It is an important contest. Multi-imagers are Arecont's...
Directory Of Consumer Security Cameras on Aug 16, 2017
The consumer camera segment continues to grow, with new startups and models from existing players released seemingly every month. In this report we...
Cat 5e vs Cat 6 vs Cat 6a Network Cable Usage Statistics on Aug 16, 2017
Cat 5e? Cat 6? Cat 6a? What do integrators use in practice, today? 140+ integrators told IPVM. Here are the results: For those who want to...
Hikvision Responds To Cracked Security Codes on Aug 15, 2017
Hikvision has responded to IPVM's report on Hikvision's security code being cracked, both with a 2 page update to dealers and communication...
Stolen Video NVR / DVR Statistics on Aug 15, 2017
"But what happens if someone steals my recorder?" Anyone who has done more than a handful of jobs has probably heard this question several times....
Hikvision Europe Cutting Out Unauthorized End User Sales on Aug 15, 2017
The days of anyone buying Hikvision from anywhere off the Internet are numbered, at least in Europe, if Hikvision's plan comes to fruition. In...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact