Training: Remote Video Surveillance Monitoring

Author: John Honovich, Published on Jul 18, 2010

This report explains and examines the fundamental technical and operational issues in using remote video surveillance. We cover the two primary approaches: (1) watching your own video surveillance remotely or (2) hiring a outside monitoring service to perform monitoring for you.

Remote video surveillance is a core benefit of today's video surveillance systems over classical closed circuit systems. Minimally, remote monitoring can reduce management costs as it provides visual insights into ongoing on-site activities. Additionally, remote monitoring has the potential to improve guard efficiency and reduce the overall cost of performing security. Potentially, remote monitors can watch video from many sites, focus on key events and dispatch responders more efficiently than dedicating operators locally.

However, to achieve these objectives, requiring navigating a number of important technical and operational issues.

These key elements we examine inside include the following:

  • Analog vs IP Remote Monitoring
  • 'Opening Up' Networks
  • Technical Steps (Firewalls & IP Addressing)
  • Policy Review
  • Who Views Remotely?
  • 'Plug N Play' Remote Access Options
  • Remote Viewing Software

With those basics in place, we examine the use of 3rd party providers to perform remote monitoring including the following key elements:

  • DIY vs Service Provider
  • Guard Replacement
  • 3rd Party System Interoperability
  • Monitoring Service Options
  • Use of Video Analytics

Review of our IP Networks for Video Surveillance training or equivalent IP knowledge is a pre-requisite for this report. Remote video surveillance requires the use, and therefore understanding, of IP networks.

**** ****** ******** *** ******** *** *********** ********* *** *********** issues ** ***** ****** ***** ************. ** ***** *** *** primary **********: (*) ******** **** *** ***** ************ ******** ** (2) ****** * ******* ********** ******* ** ******* ********** *** you.

****** ***** ************ ** * **** ******* ** *****'* ***** surveillance ******* **** ********* ****** ******* *******. *********, ****** ********** can ****** ********** ***** ** ** ******** ****** ******** **** ongoing **-**** **********. ************, ****** ********** *** *** ********* ** improve ***** ********** *** ****** *** ******* **** ** ********** security. ***********, ****** ******** *** ***** ***** **** **** *****, focus ** *** ****** *** ******** ********** **** *********** **** dedicating ********* *******.

*******, ** ******* ***** **********, ********* ********** * ****** ** important ********* *** *********** ******.

***** *** ******** ** ******* ****** ******* *** *********:

  • ****** ** ** ****** **********
  • '******* **' ********
  • ********* ***** (********* & ** **********)
  • ****** ******
  • *** ***** ********?
  • '**** * ****' ****** ****** *******
  • ****** ******* ********

**** ***** ****** ** *****, ** ******* *** *** ** 3rd ***** ********* ** ******* ****** ********** ********* *** ********* key ********:

  • *** ** ******* ********
  • ***** ***********
  • *** ***** ****** ****************
  • ********** ******* *******
  • *** ** ***** *********

****** ** ***** ******** *** ***** ************ ********** ********** ** ********* ** * ***-********* *** **** ******. Remote ***** ************ ******** *** ***, *** ********* *************, ** IP ********.

[***************]

Analog ** ** ****** **********

*** **** ****** ** ******** ******** ***** *** ********* *** same *** ****** *** ** *******. ** *** **** ** vendor ********* ********, ** ***** ****** **** **** ** ********* novel ** ****** ** **. *******, **** **, ** ****, misleading.

** * ***** *****, ********** **** ***** ****** ** ** IP ******* ** ******. *******, *********** *** ****** *******/******* *** connected ***** ** ********* ******* ****. ***** *** **** *** make * ****** ******* ********** ** ** ****** ******, *** DVR **** ** * ***** ** *** ******* ********. *** remote ****** ******** ** *** *** ***** ********* *** ***** the **** ********** **** *** ****** ******.

******* *** *** ********** ** ** ** ******, * ***, an *** ** *** ******** ****** ** * **, *** face *** **** *********** ***** ** ****** ******* ********** ***** from *** *****/**-**** ***** *******.

'Opening **' ********

*** ******* ********* ********* ** ****** ***** ********** ** **** networks *** ****** *********** ******** ** *******, ** *******, ****** to ******** *********. ************* ***, ******* ************* ******* ***/** ****** review, ** ** ********* *** ******** ** ****** * ***** surveillance ****** **** * ****** ********.

**** ******** *** *** ** ** ** ******** ********** *** video ************ ** ********* *** *** ** ****. *** ********, the **** ****** ******* ** * ******* **** ** ******** accessible *** ********. *******, **** *** ********* *** ** *********** setups **** ********* ** **** *******, ******** ** ***** ******/****** ****** ** sites.

***** ************ ** ****** ****** ******** ** ** ** ********** facing ******* **** *** ******* **** ** ******** **-**** ********* such ** ********** ** ******** ******** ** ****** *****.

********* **-**** ******, *********, ******** '******* **' *** ******** ***** surveillance ****** *** ******** ******.

Technical *****

*** ***** ** *** *** ******** ** '******* **' ** on *** ********* ****. ******** *** ********* ******** ** ******** access **** ******** **** *** ******** *********. ** *** **** basic *****, **** ** ************ ** *********- * *********** ********* ** ******* - **** ******** *** filters *** ******** **** ******* *** *******. *** ******* ******** philosophy ** ** **** ********** **** ** *** *********. ******, by *******, ****** ********** ** ******* ****** *** *** **** basic ******** **** ** ***** *** *** ********.

*** ****** ********* ***** ** ******** *** ******* ***** ** connect ** *** ** ********* ** ***** ************ ******* ****** the *******. ** **** *****, *** ********* ** ***** ************ systems *** *** ******** ********** ** ****** *****. *** ********* comes **** *** *** ** ******* ***/** ******* ** *********. We ******** **** ** ***** ****** ** ******* *** ****** ** *** ** ******** ******** ******.

** *********** ***** *** ***********, ************* ***** ****** ***** ***** two *******:

  • ******************: ******* * **** ** ******* ** * ****** ******* and ****** ********* ** *** **** ****** **** ** **** they *** ********** **-****. **** ********** *** ******** *** ** issues ** ******* **** ** **** ** *******. **** **** provides ****** ** *********, ******* ***** ** ******** ********.
  • **** ** ******* ******: ******* *** **** ** ******* ** the ******** ******* (**** * *** ** ***) **** *** computer. **** ** ********* **** ** ******* ** * **** in * ********, *** ********** ** *********. **** **** ********, as **** ** *** **** *** ** ******* *** **** the *********** ******* ********, *** *** ****** *** ****** **** virtually ********.

***** ************* **** ** ***** *** ****** ** *********, ** does ******* **** *********, **** *** ****** ** **********. *** smaller ************* (***** *** ***** **********), **** *** ** * technical ******* ** *** ********* *** ***** *** ********* ********** (requiring ************ *** ********* ** * ***** *******). *** ****** organizations, **** ** ****** ***** * ********* ******* ** *** steps ******** *** **** **********. *******, **** ** ********* * policy *******.

Policy ******

******* ** ** ********* ****** ****** ** ********* **** ***** organizations ****** ********* *** ***** **** **** ******* ************. ***** it *** *** ** *********** ********* ** **** ** ******, doing ** *** ******** **** *** *********** ** ** ******* attack. *** **** ******, **** ** ************* ***** ****** *** to ***** ******. **** ** ** ** ********, ** ***** take ***** ** ****** ** **** * ******** *****.

Who ***** ********?

* *** ******* ** *** ******** ** *** ***** ****** access. *** *** ** ******** **** ** ***** ** ****** showing *** ****** ******** ********* * ****, ****** ** *****'* video ************ ******. *******, **** ** **** **** **** ****** occurrence. ***** **'* *** *********** ********* ** ***** ****, ********* ongoing ****** *** *** ****** ** ******* ******** ****** **** concerns **** ** (** ** *********** ******** *****) *** *** operations (***** ** ************ ********** ** ******** **********).

******* ** ****, *** **** ****** **** ** ****** ****** is *** ** ************'* ***** ** **** ****** ** ***** IT ********** ******* (**** ** *******) ******* *** ******.

'Plug * ****' ****** ****** *******

******* ********* ****** *** ** * ******* *** ******* ************* and ****** ******** *** ***** ****** ****, ********* **** ****** to ******* ********* **** ******* ********* ****** ****** ******* ********* any **-**** ********* *******. ** **** ***, * ***** ************ system *** ** ********* *** ******** *********** ******* ****** ** change ************** ** ******* ********.

**** ********, ** ******* '**** * ****' ****** ****** ** a *** ****** ***** ****** ***** ************ *******. ***** ******* 'phone ****' ** ***** ********'* ******* '*****' *******, *********** ********** and ******** ** **** *** ******* *******. **** ****** ***** to ** ** *** ********'* ******* *** ****** ***** ***** surveillance **** **** ***** ***** *****. ** ******* ***********, **** approach ** ***** ***** **** *** ** ** *** ** far **** **** *% ** *** ***** ************ *******. *******, because ** ********** ***** **** ****** ** ***** ****** ***** surveillance, ** ****** **** ** **** ************* ** *** **** few *****. ** ***** '**** * ****' ********** **-***** ** our*******/****** ***** ********** ******.

Remote ******* ********

********** ** *** *** ***** **** ******* *** ****** ******, you **** **** **** **** ** ****** ******* ********. ***** it's *********** ******** ** ** ** ******* * ******* (**** we ******** ***** **** *** **** * **** *********), **** video ************ ******* *** ***** ******** ***** ************ *******- ************ **** **** ** ********* ** * **.

****** *** ***** ************ ******* *** ******** ******* *********** ********** software. *** ********* **** *** ******** **** *** ******** ************ to **** ***** ******* ******* **** ******. ** *** ** not **** **, **** *** *** ****** *** ***** ** see *** *****. **** ** * ******* *** ****** ** other ***** ********** (**** ** **** *** *** ******* ******).

** ******** ** *** *********** ********, *** ****** ** ****** applications **** ********* ******** ***** ****. ** ** *** ************ common *** * ***** ************ ****** ** **** * ****** monitoring ****** *********** (*** **** ****** ** ** ****** ***). This ******* ****** ****** **** *** ** ****** ****** (***** presuming ****** ******* ******).

Part * - Remote ********** ******* *********

************ ****** ****** ** ***'* ***** ************ ****** ** **** part ** *** ********. *** ***** ******* ** ** ********* whom **** ******* *** **** *** ***** **** ** ******** monitored.

DIY ** ******* ********

*** **** ****** ****** ********** ****** ** *** ******* ** an ************ ** ******** **** ***** *** ***** ************. ****** examples ** **** ******* **** ******** ******** ********** ***** ********* and ******** ******** ******** ** *** ** *** ******** **** occured ** *** ******** **** **** *** ** ****.

*** **** ********** ** '** ** ********' ********** ** **** it ******* ** *** ************ ****** ******* ********* ** ******* monitoring. **** ********, **** ** **** ************ ** ** ******** to ** ********. **** ***** ************* *** ******* ******* ********** someone ** ***** ***** **********.

**** ************* ****** **********. ***** **** ** **** ******** ************ through *** *** ** ******** ******/*******. *** ********, ***** ******* ******** ****** *** ********* ** **** ** *** US *****. * ****** ******** ***** ************** ** ** ****** *****, looking ** **** *** ********.

*** ************* ** ******** ****** ** *******. ******** ****** ***** receive ****** ******* *** *** *** ***** ** ** ********** poor (*.*., * ****** **** ***** **** ******* ** **** companies **** ******** ****** **** **** ** ** * ***** at * **** **** **********, *** ***** ***** * *** there *** **** *****).  ******* ****, *** ******** ***** ****** is ****** *********** -**** $** ******* ** *** ** *****(******* ** **** ** *** ***** ************ ******). ******* ***** is **** **** ******** ****** *** ********** **** *********** ** an *********** (*** **-******'******* *** ******'********.

Guard ***********

******* ** ******* ******** ***** ******** *****'* ************* (*** **** effectiveness), **** ******** ******** *** **** ** *********** ********** **** would ****** *** **** *** ******.

****, ************* *** ****** ******* ****** * ***** *** **** benefit **** ****** ***** ********** ********* ** ***** **** *****. This ******** ** *********** *** ***** ************ ******* ** ******* a *** **** **********.

Monitoring ******* *******

**** ***** ****** ***** ************, * ****** ** ********** *** be **********:

  • **********:*** ***-**** ********** ******* *** ******* ***'* ******* **********. ** this ********, *** ******* ********** '****' ********** **** ** ************ could ************ ** ** ***** *** ****. **** ********** *** functionality *** *** ********** ****** ***** *** **** *** ***** significantly ******* ************.
  • ********: *** ***-**** ********** ******* ****** ** ************ ** **** a ********'* *******. **** ******** ** * '*******' ****** ******. The ******* ******** *** **** ***** ***** **** **** ******* once ** ****, ***** ** *******, ***.
  • ********* ** ********* *****: ***** *** ** **** ** ******** ****** **** ********* or ******* ****** *** *********. **** *** ********* ***** ****** and **** ********** ****** **** *********.
  • ********* ** ******** *****: *** ********** ******* *** **** ************ ***** ******** ** alert *** **** ********* ** ** **-**** ******** ******. **** can ******* ******* ********** ** ** *** ******** *********** ** finding * ***** ******** *** ****** *** **** *** ********** or ******** **********.
  • *********: ********** *** ********* ** ******** *********** ** ***** *******. Two ******* *********** ***** *** ****: (*) "***** ** ****" for *********** **-**** ** ****** **** ******* ******* ** **** as **** **** ***** (*.*., ***** ** ***** **** ***** hours) *** (*) **** *********** **** ******* ****** ** **** someone ************ ****** **** **** **** *** ** ********** *****.
  • *************:****** ********** ********* *** **** **** **-**** ***** ***** ** provide ******** ** ***** *** ****** ****** **. **** ** most ******** ** ********** ** ** ********. *** ****** ********** provider *** ******* * '***'* *** ****', ******* *** ****** to ******* ****** *** *******. ************, *** ****** ********** ******** can **** **** ****** **** ********* ** ********* **** ******** guidance ** **********.

*** *********** ** ******* *** *** **** ****** ** ******** security ********** ** ********** ********** ** ***** *********. ***** ****** to ******* ***** ***** (*** **** *** **** ** * time) ** ********** ***********. **** ** *** **** ** **** places *** ****** ** *** ******. *******, ***** ** ** not **** ** **** ******* ****, * *********** ******* ** a *****'* **** **** ** ******* ** ******** *** *** next ********. ***** ********* *** *** ********* ** ****** **** inefficiency ** *********** ******** ******. *******, ** ** ******* *****, important ****** ******.

Technical ***** *** ****** *********

*** **** *********** ********* ****** ***** *** ****** ********** ******* one ** ***** ** ********** ** *********** ** * ******* provider. ** * ****** ******, ************** *** ** ******** **** difficult **** *** *** ******* *** **** ****** *** ********/***** of ******* **** * *** *****.

*** *** **** ******* ********* ******* ** ******** *** ********* issues ** ** ********* ** ******* *** *** ** ***** own ***** ************ ******** ** ** ******** ******. **** *** reduce *** ********* ********** ***, ** **** *****, *** ******* a '**** * ****' ****** ********** **** ******* ** ********** changes ** ******* ***-**** ******.

3rd ***** ****** ****************

***********, *** ****** ******* ********* ** ****, ** ******* ********* to ******* *** ***** *******. **** ***** ******* **** * DVR/NVR/VMS ** ***** *** **** ** ********* ** **** *** for * *** '********' ** ******** ******.

*** ********** ***** ** ********** *** *******: (*) *** ***** surveillance ****** ** ********** ********** (**** ****** ** ********* ** any *** ****** *** *** ********* **** **** **% ****** share) *** (*) ** ********* ** ********* **** *** ***** recorders. ** ******* ******* *** **** **** * ***** ******* of *** ******, ********* **** ** ****** ** ******* *********** interfaces ** **** *******. **** *** ** ****** *** ** blocked ** ******* ** ************* *** *** *** ********** ** view *** ****** ********'* ******** ** * *********** ******.

*********** **** *** ***** ******* ****** ******* ****** ** *****. It **** *** **** ** ** ******* ****** ******. ********* remote ****** ** ****** ****** ** ********** **** ****** ****** having ** ********* ** * *** ***** ********.

*** **** ****** ***** *** *********** **** ***** ** ***** systems ** ****** *** *** ***** ******** *******.

Use ** ***** *********

*******, ***** ** ******* **** ***** ********* *** ** * major ******* *** ****** ********** *********, ***** ********* ** ***** offerings *** *** ***** ******:

  • ******** ** ******** ******* **** ******* ********* ******** ******* ********** significant ******* ** ***** ******. ***** ****** ****** *** ********** of ********** *********. ***********, **** * ********** ******** ****** *** provide ********.
  • ******** **** *********** ***** ******** ******* **** **-**** *********/******* *** with *** ****** ********** ********. **** ** *** ** ***** with ********* *** ******** *** ********* ****** *** *** ********** of *********** ***** ********* **** ******** ******* *** **** *********** both **** *** ****** ********** ********'* ********** ******.
    Login to read this IPVM report.
    Why do I need to log in?
    IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

    Related Reports

    Burglar Alarm Zoning Guide on Apr 28, 2017
    The function of an alarm panel is to gather information from sensors and respond to this information by triggering actions. While it is possible to...
    Avigilon Discontinuing Rialto Analytics Line on Apr 27, 2017
    Avigilon is informing dealers/partners that the legacy VideoIQ Rialto products have been discontinued, recommending the newer ACC ES Analytics...
    A Marketing Home Run For Knightscope - Man Attacks Robot on Apr 27, 2017
    We criticize Knightscope regularly - their lack of revenue, their trying to fool mom 'n pop investors, their associating themselves with a clueless...
    Eagle Eye Exec On Mountain Of Servers - VSaaS Growth Analysis on Apr 25, 2017
    Eagle Eye VP of Operations, Hans Kahler, posted a picture of himself sitting on top of a shipment of new servers, as a testament to the companies...
    PureTech Video Analytics Examined on Apr 21, 2017
    PureTech's analytics were chosen for a US border protection system (see related post), which the company claims no other analytics vendor was able...
    US Border RVSS / Video Analytics System Examined on Apr 21, 2017
    US Customs and Border Protection has been rolling out a video analytics-based detection system along the US/Mexico border, with detection ranges...
    Axis Network Horn Tested on Apr 18, 2017
    We bought and tested the Axis network horn C3003-E, examining setup and calibration, event audio, VMS integration, and sound pressure levels...
    Aqueti 100MP Mantis Camera Profile on Apr 14, 2017
    One of the original gigapixel camera startups, Aqueti, which we first covered in 2012, is back. This time, they have partnered with NVIDIA,...
    Bosch B-Series Intrusion Tested on Apr 10, 2017
    Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
    Best and Worst - ISC West 2017 Show Report on Apr 10, 2017
    IPVM went to Las Vegas, examining what vendors are showcasing and what is new. Attendance was up, according to the show, and was certainly well...

    Most Recent Industry Reports

    Avigilon Discontinuing Rialto Analytics Line on Apr 27, 2017
    Avigilon is informing dealers/partners that the legacy VideoIQ Rialto products have been discontinued, recommending the newer ACC ES Analytics...
    A Marketing Home Run For Knightscope - Man Attacks Robot on Apr 27, 2017
    We criticize Knightscope regularly - their lack of revenue, their trying to fool mom 'n pop investors, their associating themselves with a clueless...
    The World's First Fashion IP Camera From Amazon on Apr 27, 2017
    Some analytics cameras can tell you if a person is jumping a fence, or loitering in a secure area, but none of them can tell you if the person...
    Last Day - IP Networking Course May 2017 on Apr 26, 2017
    Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
    Hikvision EZVIZ Amazon Scam Revealed on Apr 26, 2017
    Hikvision is violating US Federal Trade Commission guidelines and Amazon rules with a "Honest" Review Program scheme that provides gift cards to...
    Anixter CEO Admits Price Deflation and Non-Exclusive Integrator Sales on Apr 26, 2017
    Anixter's CEO has admitted to (1) price deflation impacting IP camera sales and (2) not always being 'exclusive' with security integrators. In...
    Xandem Next Gen Intrusion Tested on Apr 26, 2017
    Xandem's "full coverage motion tracking technology" is unlike any intrusion technology we have seen. We bought their new system and tested it...
    Tri-Ed Favorability Results on Apr 25, 2017
    Tri-Ed, owned by Anixter, far outranked Anixter, the lowest ranked company in our distributor favorability series. Still, Anixter's ownership did...
    Eagle Eye Exec On Mountain Of Servers - VSaaS Growth Analysis on Apr 25, 2017
    Eagle Eye VP of Operations, Hans Kahler, posted a picture of himself sitting on top of a shipment of new servers, as a testament to the companies...
    Chinese 'Attacking Us From Every Direction', Says US FBI on Apr 25, 2017
    "Chinese eating our lunch. Attacking us from every direction" said the US FBI's Deputy Director Andrew McCabe at the ASIS 2017 CSO Summit. .@FBI...

    The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

    About | FAQ | Contact