Remote Surveillance Monitoring Recommendations

Author: James Talmage, Published on Nov 07, 2011

While many sites might benefit from real time surveillance monitoring, most budgets preclude hiring a security staff to perform those duties.  A growing trend is the use of third party companies to monitor cameras remotely.  This can provide similar benefits to an on-site security staff at significantly reduced costs.  Successfully utilizing remote monitoring, however, usually requires a system that was designed with that goal in mind.  This update will examine the most important considerations in designing a system that is remote monitoring ready.

Monitoring Company and Costs

The monitoring company chosen will likely have the biggest impact on a given projects success.  Researching and narrowing down the field of potential monitoring companies can provide valuable information when it comes time to design the system.  Sites that are only to be monitored during off-hours, when people are prohibited from the premises, will find the greatest savings in monitoring companies that employ event-based monitoring.  In an event-based model, the security system employs some form of automated intrusion detection, and the monitoring company only views the video when alerted by the system.  This allows a single operator to monitor many more cameras, and is the biggest driver of savings.

Most monitoring companies charge a flat base rate that includes a certain number of events, plus an additional charge for each event over the limit.  In our experience we’ve seen a wide range of flat rate prices ($350 to $1,400 per month for an 8 camera system); The higher priced services usually include a higher event limit, and additional services, such as “video escorts” (watching customers walk to their car late at night), and “guard tours” (periodically reviewing cameras that have not triggered events).  We have found per event pricing to have significantly less variation ($3.50 to $4.50 per event), but did come across one company that charged only $2.50 per false alarm, and by the minute for actual intrusion events.

Interoperability between the monitoring company and the VMS are another significant concern.  The choice of a particular monitoring company will necessarily serve to narrow the field of potential VMSs to those they support.  Users considering employing video analytics for event detection may find it easier to decide on that technology first and seek out monitoring companies who support it.

Event Detection

The best method of event detection should be evaluated on a camera by camera basis.  Indoor locations can often use simple video motion detection, or conventional PIR motion detectors to trigger events.  Outdoor locations will generally require more exotic (and expensive) solutions, such as video analytics.  Outdoor applications will likely produce more false alarms, but have the distinct advantage of alerting the monitoring company before a perpetrator gains access to the building.  In our experience, customers who would otherwise require the service of a security guard company (i.e. construction companies) are much more willing to pay the additional costs associated with outdoor perimeter detection, including the increased false alarm costs.

Deterring Theft & Vandalism

Users currently employing security guards are often hesitant to hand over guarding responsibility to a video system.  Many cite the guards physical presence and ability to respond to situations immediately as valuable deterrents.  Sirens and strobes are options, but in many municipalities, police have developed very slow response times to conventional alarm systems (due to excessive false alarms).  Some thieves brazenly take this into account, and may not leave immediately because of a siren.  

We have found that systems that allow the monitoring company to audibly challenge intruders via loudspeakers to be extremely effective deterrents.  We witnessed a significant reduction in theft attempts when audio talk downs were employed at local construction sites.  Another common niche for audio talk downs are car dealerships.  In those cases monitoring companies don’t usually challenge after hours visitors, but gently remind them that they are being watched.  Another option is the use of high visibility signage that indicates that the site is monitored.  If allowed, large conspicuous cameras might actually be a plus for some users.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

The ISP

Many ISP’s prohibit the use of their network for hosting streaming video in their terms of service; some actively block it.  Such ISP’s should obviously be avoided.  Choosing an ISP and service plan that maximizes yourupstream data rate allows for higher camera counts, resolutions, and frame rates.  Since advertised and real world speeds often differ by a great margin, real-world tests should be conducted before significant investments are made.

ISP data rates are generally so much lower than that of the local network, that they must be considered during the design phase.  Reducing the required bandwidth becomes increasingly important.  Systems capable of utilizing different data rates for local recording and remote monitoring can avoid compromising the quality of recorded evidence to satisfy monitoring requirements.  Members should also study our reports on how bandwidth is impacted by the choice of codec, and (for low light scenes) the addition of IR illuminators.

Data caps are another consideration in choosing an ISP.  Especially important, is understanding how a given ISP reacts to users who exceed the set data cap.  Some will reduce throughput to a trickle, while others will cut off service (either temporarily or permanently).  For mission critical applications, seek out ISP’s who choose to simply charge for overages.  Integrators should also discourage unnecessary data consumption by the monitoring company and the end user by educating them on the data cap, and the implications of exceeding it.

We’ve found that a good event detection mechanism can help minimize or eliminate concerns over exceeding data caps.  By using analytics with conservative sensitivity settings, and disallowing remote viewing except by the monitoring company, we’ve successfully deployed a fifteen camera system over 3G wireless and never exceeded the 5GB cap set by the provider.  However, doing so required constant supervision and repeated “tweaks”.  We would recommend that integrators approaching remote monitoring for the first time seek out providers with significantly higher caps.

Comments : PRO Members only. Login. or Join.

Related Reports on Monitoring

Security System Health Monitoring Usage Statistics 2018 on Oct 09, 2018
How well and quickly do integrators know if devices are offline or broken? New IPVM statistics show that typically no health monitoring is...
Fall 2018 New Products Directory on Oct 03, 2018
Fall 2018 New Products Directory We have compiled a directory of new products released fall 2018, or at least since our Spring 2018 Directory. The...
Alexa Guard Expands Amazon's Security Offerings, Boosts ADT's Stock on Sep 21, 2018
Amazon is expanding their security offerings yet again, this time with Alexa Guard that delivers security audio analytics and a virtual "Fake...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
Stanley Security Acquires 3xLogic, Kushner Becomes Product President on Sep 10, 2018
Stanley Security acquired 3xLogic a few months ago. However, the company has still not officially publicly announced it, leading many to wonder...
Dell Launches IoT for Surveillance on Sep 05, 2018
Historically, Dell has been a PC and server provider (e.g., "Dude, you're getting a Dell") and widely used for surveillance storage. However, in...
JCI / Napco Integration Battle on Aug 30, 2018
JCI and Napco are firing salvos at each other over integration issues which both sides blame on the other. The bigger problem is that central...
SNMP / Network Monitoring For Surveillance 2018 on Aug 21, 2018
Surveillance systems typically rely on the the VMS to report issues, but this most often just means knowing a camera is "down" with no warning or...
2Gig Gun Lock / Motion Detector Tested on Aug 17, 2018
Safer guns for families and an opportunity for security dealers to sell more services? That is the aim of Nortek's 2GIG 'Gun Motion Detector'...

Most Recent Industry Reports

Knightscope Winning Investors, Struggling With Growth on Oct 16, 2018
While Knightscope's new financials show the company only winning 11 new customers in the past 12 months, the company continues to win new...
Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Huawei Admits AI "Bubble" on Oct 16, 2018
A fascinating article from the Chinese government's Global Times: Huawei’s AI ambition to reshape industries. While the Global Times talks about...
ADI's Financials Revealed + W-Box Growth Priority on Oct 15, 2018
  ADI is one of the most powerful distributors in the security industry but how big are they? How much profit do they make? How much do they sell...
Amazon Touts Home Security Market Disruption on Oct 15, 2018
Amazon is coming for ADT and all of home security. Indeed, Amazon is advertising this as, in their own words, calling home security a: Inside...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
Mysterious Patent Troll 'Secure Cam' Targets Industry, Sues Hanwha, Hikvison, JCI, Panasonic, More on Oct 11, 2018
A company named "Secure Cam," who is actively hiding their ownership, has acquired a slew of video patents and is systematically suing video...
Unfixed Critical Vulnerability In Millions of XiongMai Devices Disclosed on Oct 10, 2018
XiongMai, one of the biggest OEMs alongside Dahua and Hikvision, has suffered a critical vulnerability impacting millions of their devices. This...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact