Remote Surveillance Monitoring Recommendations

Author: James Talmage, Published on Nov 07, 2011

While many sites might benefit from real time surveillance monitoring, most budgets preclude hiring a security staff to perform those duties. A growing trend is the use of third party companies to monitor cameras remotely. This can provide similar benefits to an on-site security staff at significantly reduced costs. Successfully utilizing remote monitoring, however, usually requires a system that was designed with that goal in mind. This update will examine the most important considerations in designing a system that is remote monitoring ready.

Monitoring Company and Costs

*** ********** ******* ****** **** ****** **** *** ******* ****** on * ***** ******** *******. *********** *** ********* **** *** field ** ********* ********** ********* *** ******* ******** *********** **** it ***** **** ** ****** *** ******. ***** **** *** only ** ** ********* ****** ***-*****, **** ****** *** ********** from *** ********, **** **** *** ******** ******* ** ********** companies **** ****** *****-***** **********. ** ** *****-***** *****, *** security ****** ******* **** **** ** ********* ********* *********, *** the ********** ******* **** ***** *** ***** **** ******* ** the ******. **** ****** * ****** ******** ** ******* **** more *******, *** ** *** ******* ****** ** *******.

**** ********** ********* ****** * **** **** **** **** ******** a ******* ****** ** ******, **** ** ********** ****** *** each ***** **** *** *****. ** *** ********** **’** **** a **** ***** ** **** **** ****** ($*** ** $*,*** per ***** *** ** * ****** ******); *** ****** ****** services ******* ******* * ****** ***** *****, *** ********** ********, such ** “***** *******” (******** ********* **** ** ***** *** late ** *****), *** “***** *****” (************ ********* ******* **** have *** ********* ******). ** **** ***** *** ***** ******* to **** ************* **** ********* ($*.** ** $*.** *** *****), but *** **** ****** *** ******* **** ******* **** $*.** per ***** *****, *** ** *** ****** *** ****** ********* events.

**************** ******* *** ********** ******* *** *** *** *** ******* significant *******. *** ****** ** * ********** ********** ******* **** necessarily ***** ** ****** *** ***** ** ********* **** ** those **** *******. ***** *********** ********* ***** ********* *** ***** detection *** **** ** ****** ** ****** ** **** ********** first *** **** *** ********** ********* *** ******* **.

Event *********

*** **** ****** ** ***** ********* ****** ** ********* ** a ****** ** ****** *****. ****** ********* *** ***** *** simple ***** ****** *********, ** ************ *** ****** ********* ** trigger ******. ******* ********* **** ********* ******* **** ****** (*** expensive) *********, **** ** ***** *********. ******* ************ **** ****** produce **** ***** ******, *** **** *** ******** ********* ** alerting *** ********** ******* ****** * *********** ***** ****** ** the ********. ** *** **********, ********* *** ***** ********* ******* the ******* ** * ******** ***** ******* (*.*. ************ *********) are **** **** ******* ** *** *** ********** ***** ********** with ******* ********* *********, ********* *** ********* ***** ***** *****.

Deterring ***** & *********

***** ********* ********* ******** ****** *** ***** ******** ** **** over ******** ************** ** * ***** ******. **** **** *** guards ******** ******** *** ******* ** ******* ** ********** *********** as ******** **********. ****** *** ******* *** *******, *** ** many **************, ****** **** ********* **** **** ******** ***** ** conventional ***** ******* (*** ** ********* ***** ******). **** ******* brazenly **** **** **** *******, *** *** *** ***** *********** because ** * *****.

** **** ***** **** ******* **** ***** *** ********** ******* to ******* ********* ********* *** ************ ** ** ********* ********* deterrents. ** ********* * *********** ********* ** ***** ******** **** audio **** ***** **** ******** ** ***** ************ *****. ******* common ***** *** ***** **** ***** *** *** ***********. ** those ***** ********** ********* ***’* ******* ********* ***** ***** ********, but ****** ****** **** **** **** *** ***** *******. ******* option ** *** *** ** **** ********** ******* **** ********* that *** **** ** *********. ** *******, ***** *********** ******* might ******** ** * **** *** **** *****.

The ***

**** ***’* ******** *** *** ** ***** ******* *** ******* streaming ***** ** ***** ***** ** *******; **** ******** ***** it. **** ***’* ****** ********* ** *******. ******** ** *** and ******* **** **** ********* ************ **** **** ****** *** higher ****** ******, ***********, *** ***** *****. ***** ********** *** real ***** ****** ***** ****** ** * ***** ******, ****-***** tests ****** ** ********* ****** *********** *********** *** ****.

*** **** ***** *** ********* ** **** ***** **** **** of *** ***** *******, **** **** **** ** ********** ****** the ****** *****. ******** *** ******** ********* ******* ************ *********. Systems ******* ** ********* ********* **** ***** *** ***** ********* and ****** ********** *** ***** ************ *** ******* ** ******** evidence ** ******* ********** ************. ******* ****** **** ***** *** reports ** *** ********* ** ******** ** *** ****** ** codec, *** (*** *** ***** ******) *** ******** ** ** illuminators.

**** **** *** ******* ************* ** ******** ** ***. ********** important, ** ************* *** * ***** *** ****** ** ***** who ****** *** *** **** ***. **** **** ****** ********** to * *******, ***** ****** **** *** *** ******* (****** temporarily ** ***********). *** ******* ******** ************, **** *** ***’* who ****** ** ****** ****** *** ********. *********** ****** **** discourage *********** **** *********** ** *** ********** ******* *** *** end **** ** ********* **** ** *** **** ***, *** the ************ ** ********* **.

**’** ***** **** * **** ***** ********* ********* *** **** minimize ** ********* ******** **** ********* **** ****. ** ***** analytics **** ************ *********** ********, *** *********** ****** ******* ****** by *** ********** *******, **’** ************ ******** * ******* ****** system **** ** ******** *** ***** ******** *** *** *** set ** *** ********. *******, ***** ** ******** ******** *********** and ******** “******”. ** ***** ********* **** *********** *********** ****** monitoring *** *** ***** **** **** *** ********* **** ************* higher ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Monitoring

Pelco Optera 270° Camera Tested on Sep 06, 2016
Multi-imager cameras are typically 180° or 360°. Pelco has released a fixed 270° versions of their Optera intended to cover exterior building...
Ex-Microsoft Exec Surveillance Startup Nepoware on Sep 02, 2016
Former Microsoft executive Richard Ang says he wanted to build an IoT device, and so he has spent 3 years developing what he says is a more...
Viakoo Health Monitoring Examined on Aug 26, 2016
Viakoo, the company of ex-Intransa leaders, says they have created a monitoring tool for security networks that is easy to deploy and offers...
Axxon Next VMS 4.0 Tested on Aug 24, 2016
AxxonSoft is one of the biggest VMS vendors (reporting 263,000 channels sold in 2015), especially strong in their home market of Russia, but not...
Bosch Intrusion Detection Profile on Aug 10, 2016
This is a first in a new IPVM series profiling intrusion detection / alarm offerings. In this series, starting with Bosch, we examine: Key...
Something TERRIBLY WRONG In The Home Security Industry on Aug 08, 2016
Who is terribly wrong? The $57 million Silicon Valley funded startup, SimpliSafe or the security trade magazine that is 'mad as...
Logipix 20MP, 140MP and 200MP Cameras Examined on Jul 20, 2016
Looking for an Avigilon alternative? Logipix, based in Hungary, has created their own super high resolution end-to-end solution, featuring 20MP -...
Feenics Hosted Access Control Tested on Jul 07, 2016
In the access market, new entrants are uncommon. Because of that, newcomer hosted access vendor Feenics has gained the curiosity of many. A...
Set-Top Box DIY Alarm System Sage on Jul 05, 2016
A multi-billion dollar corporation has gotten into the DIY alarm system space. And they are dropping the wall-based panel that most every alarm...
IPVM Inspires PSIM-Challenger Startup on Jun 28, 2016
An IPVM member asked about Agora Systems in a discussion, a company we knew little about, prompting us to reach out to answer our member's...

Most Recent Industry Reports

Axis Secretly Paid Anixter Sales People To Push Axis NVRs on Sep 26, 2016
Internal Axis communication shows how Axis paid Anixter and Tri-Ed sales people with secret bonuses to push Axis NVRs. In this report, we examine...
VLANs for Video Surveillance on Sep 26, 2016
Many people confidently say to 'use VLANs' as an answer to IP video networking problems and as a way to signal expertise. But how should VLANs be...
Ambarella CEO Admits H.265 and 4K Not Popular on Sep 26, 2016
Ambarella is the main chip provider for high-end surveillance cameras driving higher resolution and new CODECs. While Ambarella has been pushing...
Nest Cam Outdoor Tested on Sep 23, 2016
After years of claiming an outdoor model was "coming", addressing their biggest user demand, Nest has finally released their Outdoor Camera, an...
ACTi Refuses Race To The Bottom, Shifts To Solutions on Sep 23, 2016
The original low cost IP camera disruptor was ACTi. Back in the 2008 - 2010 time frame, Taiwanese manufacturer ACTi challenged the Western and...
You Get Robbed, Canary Will Pay You Up To $1,000 on Sep 22, 2016
Canary is trying to break the status quo in DIY security, first by raising over $40 million, and now a revamp of their monthly services package...
Milestone Ends Development of "Enterprise" VMS on Sep 22, 2016
Milestone 'Enterprise' was one of the first enterprise video management software offerings, selected by many early adopters of IP video. However,...
History of Video Surveillance on Sep 22, 2016
This is a concise history of video surveillance covering the past decade.  The goal is to help professionals newer to the industry understand...
Access Control Course Fall 2016 on Sep 22, 2016
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Totally Wireless IP Camera (IPVideo Corp NomadHD) on Sep 21, 2016
Wireless battery powered cameras have been a surveillance pipe dream for years, limited by camera power consumption, battery technology, and...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact