How Do End Users Monitor Surveillance?

Author: Brian Rhodes, Published on Aug 13, 2012

How actively are surveillance systems monitored? Do end users prefer to passively use surveillance for recording activity, or do they actively monitor surveillance video so they can respond in real time? We asked a group of globally distributed end users how they use their system.

Overview

*** ******** ** ***** ** *** ***** ***: "*** ** you ********* ******* **** ************ *******?", *** ******* *******:

  • ** **** * ********* ******** ********/****: ******** **********
  • ** **** ** ** *** ******* **** **** ******: ******** Review
  • *****: *** ** ****

*** ****** ***** **** *** ****** ** *** ******* ***** on ****** ****. ** ******** *** '****' *** ***** **** many ******* ****** '*******', **** ******* ***********, **** **** **** 100 *******.

Confirmed ***********

***** ******* ****** *** ** ********** ***** **** ************ **** larger ******* *** ******** ** **** ****** ********* ******* *** greater ********** *********. ***** ************ ******* *** ********* *********** ** dedicated ***** **** ******** ******* ****. *******, ** *** ****** counts ***** *******, ** **** *** ********** ** ******* ***** surveillance ** **** ****. ** ******* **** *** *** **** deployments **** ** ******* ** ****, **** ***** ***** ******** with ****** *** ********* ********** **** **** ***** ************ ****.

Detailed *********

******* **** *** ******** ******* ****** ****** ** ****** ****** between ***** *** ******. ** **** *****, *** ******** ***** explaining ********* **** ******* ********** ** ****** ****. ** *** section ***** ** ***** ***** ******* **** *** ****** ******:

**** ** *********:******* *** **** **** ****** **** ***** * ****** **** in *** ******* *** ******** ****, **** **** *** ****** how ******* *** ******* ** ** ****. *** ******** ** answers ******** '******** ******' ** '*** ** ****' ************ ********* the **** *** ********* ** ******** ******* *** ***** ** they ***** ****** **. *** ******** ******* ** **** ******** make **** ********** ******* *******:

  • "** ******'* ******* *** **** ** ****** ******** ** *** and **** ******* *** ***."
  • "** ***'* **** *** ***** *** ******* ** ********** ******* it."
  • "*** ** ******** ******, * *** *** ****** ** ******** one ******* ** ******* ************."
  • "******** ** ******* ** *****."
  • "****** ****** ** **** *** **** ** *******."
  • "** ***'* **** *** ******** ** ***** *** ****** ****"
  • "* **** **** *******. * **** *** ******* ******** *** 20 ***** * **** *** ******."

*******, **** *** ***** **** *** ******** ***** ** ************ is ******** **** ********* *** ******** *** ********** ********. ** possible, *** ***** ***** ****** ** **** ** ****** ******** to ****** ** **** ***** ****** **** ********* ** ************ review ******** *****.

***********:**** *** ***** **** ******** ******* *******, ********** ***** ** the ****** "**** **** *** *******" *****, *** ******** ** do ** ** *********** *********** ** ***********. ******* ******* **** no ******* ** ***** ********** ** ******** ******* ** ************ review *****, **** **** **** *** ****** ** ** ** without ***** *******:

  • "**** **** ** *** ** ******** ************ *** ******* ***********"
  • "** ******* ** * ****** ****** ** ********** **** ** require * **** *****."
  • "****** ******** **"
  • "******** ** **** *** ***. ***** *** ****** ********** **** have ************ ********* ******** ******* */**/***."

********** ** *********:** * ****** ******, *** ***** ***** ********** ****** ******* security *** **** ***** **********. ***** ******* **** ********* **** surveillance ** *** ****** ********* ** **** '********' ****, *** also ********* ******** '**********' ** '**********' **** ************ ******* ** well.

  • "** *** **** ****** ***** ** ****** ** ******** *** risk ***** ** ********."
  • "** *********** ****** ****** *** ******** ********** **** **************"
  • "** **** **** ***** **** **** **** *******, ***** ** video. ** *********."
  • "******** **** ***** *********, ******* ********** ** ***** *****."
  • "********* ********** ** *** ** ********. **** ******** **** ** remove *** ******* ******** *******."
  • "********** ***** *** ******** *********** *******."
  • "*** *** ** **** ****** ** *** *********** ** ******* a **** ******* ** ******** ***** ***** ******* ***** ***."

*************, **** '***** ****' ***** *** ***** **** ********** ** larger *******. ****** ******* ********** ** ****** ***** *****, *** even ** ******** ***** *** ***** ** ********** ** ****** monitoring, ***** *********** *** ********** ***** ** *** ******. ******* characteristic ** ******* ****** *********** *** ***** ******** ** ****** cameras **** ** '******** ********' *****, ***** ****** ******* *** more ****** ** ** ****** ** ********** ***** ***********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Alarm Reporting Formats Overview on Jan 12, 2017
Alarm reporting formats are methods for communicating complicated information quickly, using plain old telephone service. It is still the main...
How Axis Can Beat Hikvision on Jan 09, 2017
Hikvision has rocked the industry globally, bullying former video surveillance revenue leader Axis even in the Western world. What can Axis...
Introduction To Burglar Alarm Systems on Jan 04, 2017
While alarm systems are popular, balancing between the right level of protection, the appropriate components and an acceptable price can be very...
No One Should Ever Use Simplisafe on Dec 12, 2016
Simplisafe, the upstart DIY intrusion alarm system, is increasingly Public Enemy Number One in the alarm business. Recently, Security Sales ran an...
'Solution' Manufacturers Threaten Integrators on Dec 09, 2016
The race to the bottom has driven manufacturers to become 'solution' providers, threatening integrators. Axis shift to 'solution' sales might be...
Anixter Sales People Selling To End Users on Nov 03, 2016
Anixter's most frequently heard defense of selling to end users is that they used to do it, but not anymore. However, this was undermined by...
The Xiongmai Botnet 'Recall' Will Not Work on Oct 25, 2016
The Xiongmai 'recall' has been the topic of global news, following the unprecedented bot net attacks that use their equipment, among...
No Marketing Gimmick, Sharp Security Robot Targets Professional Market on Oct 17, 2016
Security robots are getting a lot of attention. Unfortunately, this is often for wrong reasons, most spectacularly highlighted by the Knightscope...
Pelco Optera 270° Camera Tested on Sep 06, 2016
Multi-imager cameras are typically 180° or 360°. Pelco has released a fixed 270° versions of their Optera intended to cover exterior building...
Ex-Microsoft Exec Surveillance Startup Nepoware on Sep 02, 2016
Former Microsoft executive Richard Ang says he wanted to build an IoT device, and so he has spent 3 years developing what he says is a more...

Most Recent Industry Reports

Free VMS Software Directory on Jan 13, 2017
Many Video Management Software (VMS) providers offer free versions, either open source, for a limited number of cameras or for a limited amount of...
Milestone Essential Subscription Removed on Jan 12, 2017
Subscriptions may be the future for Milestone and VMSes but not right now. Responding to negative feedback, Milestone has removed subscriptions...
Alarm Reporting Formats Overview on Jan 12, 2017
Alarm reporting formats are methods for communicating complicated information quickly, using plain old telephone service. It is still the main...
Amazon Sales of Hikvision China Cameras on Jan 12, 2017
Hikvision has become widely available in the US, including on popular retail outlets like Amazon, with over 2,600 results: 4MP Hikvision outdoor...
Last Day IP Networking Course January 2017 on Jan 12, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
ONVIF Favorability Results on Jan 11, 2017
ONVIF has been one of the most debated aspects of the video surveillance industry. On the one hand, its aim to increase interoperability has been...
Honeywell Ademco Vista Intrusion System Tested on Jan 11, 2017
One of the biggest brands in security holds one of the most common intrusion lines. We bought and tested a Honeywell Vista 15P intrusion...
ADI Battles Manufacturer Partners on Jan 11, 2017
ADI is battling their manufacturer partners, building up their own competitive house brand W-Box, while manufacturers still fund ADI's business...
10 Key Comparison Metrics For Intrusion Panels on Jan 10, 2017
In this note, IPVM reviews fundamental features and attributes for evaluating and comparing intrusion alarm panels.  These criteria are: Number...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact