Remote Surveillance Monitoring Recommendations

Author: James Talmage, Published on Nov 07, 2011

While many sites might benefit from real time surveillance monitoring, most budgets preclude hiring a security staff to perform those duties.  A growing trend is the use of third party companies to monitor cameras remotely.  This can provide similar benefits to an on-site security staff at significantly reduced costs.  Successfully utilizing remote monitoring, however, usually requires a system that was designed with that goal in mind.  This update will examine the most important considerations in designing a system that is remote monitoring ready.

Monitoring Company and Costs

The monitoring company chosen will likely have the biggest impact on a given projects success.  Researching and narrowing down the field of potential monitoring companies can provide valuable information when it comes time to design the system.  Sites that are only to be monitored during off-hours, when people are prohibited from the premises, will find the greatest savings in monitoring companies that employ event-based monitoring.  In an event-based model, the security system employs some form of automated intrusion detection, and the monitoring company only views the video when alerted by the system.  This allows a single operator to monitor many more cameras, and is the biggest driver of savings.

Most monitoring companies charge a flat base rate that includes a certain number of events, plus an additional charge for each event over the limit.  In our experience we’ve seen a wide range of flat rate prices ($350 to $1,400 per month for an 8 camera system); The higher priced services usually include a higher event limit, and additional services, such as “video escorts” (watching customers walk to their car late at night), and “guard tours” (periodically reviewing cameras that have not triggered events).  We have found per event pricing to have significantly less variation ($3.50 to $4.50 per event), but did come across one company that charged only $2.50 per false alarm, and by the minute for actual intrusion events.

Interoperability between the monitoring company and the VMS are another significant concern.  The choice of a particular monitoring company will necessarily serve to narrow the field of potential VMSs to those they support.  Users considering employing video analytics for event detection may find it easier to decide on that technology first and seek out monitoring companies who support it.

Event Detection

The best method of event detection should be evaluated on a camera by camera basis.  Indoor locations can often use simple video motion detection, or conventional PIR motion detectors to trigger events.  Outdoor locations will generally require more exotic (and expensive) solutions, such as video analytics.  Outdoor applications will likely produce more false alarms, but have the distinct advantage of alerting the monitoring company before a perpetrator gains access to the building.  In our experience, customers who would otherwise require the service of a security guard company (i.e. construction companies) are much more willing to pay the additional costs associated with outdoor perimeter detection, including the increased false alarm costs.

Deterring Theft & Vandalism

Users currently employing security guards are often hesitant to hand over guarding responsibility to a video system.  Many cite the guards physical presence and ability to respond to situations immediately as valuable deterrents.  Sirens and strobes are options, but in many municipalities, police have developed very slow response times to conventional alarm systems (due to excessive false alarms).  Some thieves brazenly take this into account, and may not leave immediately because of a siren.  

We have found that systems that allow the monitoring company to audibly challenge intruders via loudspeakers to be extremely effective deterrents.  We witnessed a significant reduction in theft attempts when audio talk downs were employed at local construction sites.  Another common niche for audio talk downs are car dealerships.  In those cases monitoring companies don’t usually challenge after hours visitors, but gently remind them that they are being watched.  Another option is the use of high visibility signage that indicates that the site is monitored.  If allowed, large conspicuous cameras might actually be a plus for some users.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

The ISP

Many ISP’s prohibit the use of their network for hosting streaming video in their terms of service; some actively block it.  Such ISP’s should obviously be avoided.  Choosing an ISP and service plan that maximizes yourupstream data rate allows for higher camera counts, resolutions, and frame rates.  Since advertised and real world speeds often differ by a great margin, real-world tests should be conducted before significant investments are made.

ISP data rates are generally so much lower than that of the local network, that they must be considered during the design phase.  Reducing the required bandwidth becomes increasingly important.  Systems capable of utilizing different data rates for local recording and remote monitoring can avoid compromising the quality of recorded evidence to satisfy monitoring requirements.  Members should also study our reports on how bandwidth is impacted by the choice of codec, and (for low light scenes) the addition of IR illuminators.

Data caps are another consideration in choosing an ISP.  Especially important, is understanding how a given ISP reacts to users who exceed the set data cap.  Some will reduce throughput to a trickle, while others will cut off service (either temporarily or permanently).  For mission critical applications, seek out ISP’s who choose to simply charge for overages.  Integrators should also discourage unnecessary data consumption by the monitoring company and the end user by educating them on the data cap, and the implications of exceeding it.

We’ve found that a good event detection mechanism can help minimize or eliminate concerns over exceeding data caps.  By using analytics with conservative sensitivity settings, and disallowing remote viewing except by the monitoring company, we’ve successfully deployed a fifteen camera system over 3G wireless and never exceeded the 5GB cap set by the provider.  However, doing so required constant supervision and repeated “tweaks”.  We would recommend that integrators approaching remote monitoring for the first time seek out providers with significantly higher caps.

Comments : PRO Members only. Login. or Join.

Related Reports on Monitoring

Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
VMS Live Monitoring Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone, Network Optix on Dec 05, 2018
Viewing live video is the first interaction and most common task most users have with a VMS. Who does it best and worst? Who offers the most...
ADT Wins Fire Death Suit But Faces Appeal on Dec 05, 2018
ADT/Protection 1 has won a wrongful death court case in which it was sued by the estate of a deceased customer. However, the attorney for the...
Solar-Powered, Smart-Phone-Based Access Kit (VIZPin) Examined on Nov 02, 2018
Cloud-based access control company VIZPin is releasing a solar-powered and smart phone based access control system for gates and other remote...
Directory of Access Control and Intrusion Startups on Oct 30, 2018
This directory catalogs access control and intrusion detection startups IPVM has found noteworthy. The directory is provided for your review to...
ADT Acquires Red Hawk, Becomes Billion Dollar Commercial Business on Oct 25, 2018
With its ~7th commercial acquisition in the past year, ADT is transforming itself from a residential provider to a commercial player with now more...
ADT and Brinks Home Security Struggles Impact On Industry Examined on Oct 23, 2018
ADT and Brinks Home Security have both been struggling over the last year. ADT valuation is 50%+ less than their IPO target. Brinks Home Security,...
Security System Health Monitoring Usage Statistics 2018 on Oct 09, 2018
How well and quickly do integrators know if devices are offline or broken? New IPVM statistics show that typically no health monitoring is...
Fall 2018 New Products Directory on Oct 03, 2018
Fall 2018 New Products Directory We have compiled a directory of new products released fall 2018, or at least since our Spring 2018 Directory. The...
Alexa Guard Expands Amazon's Security Offerings, Boosts ADT's Stock on Sep 21, 2018
Amazon is expanding their security offerings yet again, this time with Alexa Guard that delivers security audio analytics and a virtual "Fake...

Most Recent Industry Reports

Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...
DVR Examiner - Video Recovery from Recorder Hard Drives on Dec 13, 2018
Bypassing passwords and long download times on-site, DVR Examiner collects and organizes video evidence directly from a hard drive extracted from...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Huawei Hisilicon Quietly Powering Tens of Millions of Western IoT Devices on Dec 12, 2018
Huawei Hisilicon chips are powering, at least, tens of millions of Western IoT devices, such as IP cameras and surveillance recorders, a fact that...
FLIR Launches Body Cameras Unified With VMS (TruWitness) on Dec 11, 2018
While FLIR is best known for their thermal cameras, now they have expanded into body cameras, launching TruWITNESS, a public safety focused body...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact