Training: Remote Video Surveillance Monitoring

Author: John Honovich, Published on Jul 18, 2010

This report explains and examines the fundamental technical and operational issues in using remote video surveillance. We cover the two primary approaches: (1) watching your own video surveillance remotely or (2) hiring a outside monitoring service to perform monitoring for you.

Remote video surveillance is a core benefit of today's video surveillance systems over classical closed circuit systems. Minimally, remote monitoring can reduce management costs as it provides visual insights into ongoing on-site activities. Additionally, remote monitoring has the potential to improve guard efficiency and reduce the overall cost of performing security. Potentially, remote monitors can watch video from many sites, focus on key events and dispatch responders more efficiently than dedicating operators locally.

However, to achieve these objectives, requiring navigating a number of important technical and operational issues.

These key elements we examine inside include the following:

  • Analog vs IP Remote Monitoring
  • 'Opening Up' Networks
  • Technical Steps (Firewalls & IP Addressing)
  • Policy Review
  • Who Views Remotely?
  • 'Plug N Play' Remote Access Options
  • Remote Viewing Software

With those basics in place, we examine the use of 3rd party providers to perform remote monitoring including the following key elements:

  • DIY vs Service Provider
  • Guard Replacement
  • 3rd Party System Interoperability
  • Monitoring Service Options
  • Use of Video Analytics

Review of our IP Networks for Video Surveillance training or equivalent IP knowledge is a pre-requisite for this report. Remote video surveillance requires the use, and therefore understanding, of IP networks.

**** ****** ******** *** ******** *** *********** ********* *** *********** issues ** ***** ****** ***** ************. ** ***** *** *** primary **********: (*) ******** **** *** ***** ************ ******** ** (2) ****** * ******* ********** ******* ** ******* ********** *** you.

****** ***** ************ ** * **** ******* ** *****'* ***** surveillance ******* **** ********* ****** ******* *******. *********, ****** ********** can ****** ********** ***** ** ** ******** ****** ******** **** ongoing **-**** **********. ************, ****** ********** *** *** ********* ** improve ***** ********** *** ****** *** ******* **** ** ********** security. ***********, ****** ******** *** ***** ***** **** **** *****, focus ** *** ****** *** ******** ********** **** *********** **** dedicating ********* *******.

*******, ** ******* ***** **********, ********* ********** * ****** ** important ********* *** *********** ******.

***** *** ******** ** ******* ****** ******* *** *********:

  • ****** ** ** ****** **********
  • '******* **' ********
  • ********* ***** (********* & ** **********)
  • ****** ******
  • *** ***** ********?
  • '**** * ****' ****** ****** *******
  • ****** ******* ********

**** ***** ****** ** *****, ** ******* *** *** ** 3rd ***** ********* ** ******* ****** ********** ********* *** ********* key ********:

  • *** ** ******* ********
  • ***** ***********
  • *** ***** ****** ****************
  • ********** ******* *******
  • *** ** ***** *********

****** ** ***** ******** *** ***** ************ ********** ********** ** ********* ** * ***-********* *** **** ******. Remote ***** ************ ******** *** ***, *** ********* *************, ** IP ********.

[***************]

Analog ** ** ****** **********

*** **** ****** ** ******** ******** ***** *** ********* *** same *** ****** *** ** *******. ** *** **** ** vendor ********* ********, ** ***** ****** **** **** ** ********* novel ** ****** ** **. *******, **** **, ** ****, misleading.

** * ***** *****, ********** **** ***** ****** ** ** IP ******* ** ******. *******, *********** *** ****** *******/******* *** connected ***** ** ********* ******* ****. ***** *** **** *** make * ****** ******* ********** ** ** ****** ******, *** DVR **** ** * ***** ** *** ******* ********. *** remote ****** ******** ** *** *** ***** ********* *** ***** the **** ********** **** *** ****** ******.

******* *** *** ********** ** ** ** ******, * ***, an *** ** *** ******** ****** ** * **, *** face *** **** *********** ***** ** ****** ******* ********** ***** from *** *****/**-**** ***** *******.

'Opening **' ********

*** ******* ********* ********* ** ****** ***** ********** ** **** networks *** ****** *********** ******** ** *******, ** *******, ****** to ******** *********. ************* ***, ******* ************* ******* ***/** ****** review, ** ** ********* *** ******** ** ****** * ***** surveillance ****** **** * ****** ********.

**** ******** *** *** ** ** ** ******** ********** *** video ************ ** ********* *** *** ** ****. *** ********, the **** ****** ******* ** * ******* **** ** ******** accessible *** ********. *******, **** *** ********* *** ** *********** setups **** ********* ** **** *******, ******** ** ***** ******/****** ****** ** sites.

***** ************ ** ****** ****** ******** ** ** ** ********** facing ******* **** *** ******* **** ** ******** **-**** ********* such ** ********** ** ******** ******** ** ****** *****.

********* **-**** ******, *********, ******** '******* **' *** ******** ***** surveillance ****** *** ******** ******.

Technical *****

*** ***** ** *** *** ******** ** '******* **' ** on *** ********* ****. ******** *** ********* ******** ** ******** access **** ******** **** *** ******** *********. ** *** **** basic *****, **** ** ************ ** *********- * *********** ********* ** ******* - **** ******** *** filters *** ******** **** ******* *** *******. *** ******* ******** philosophy ** ** **** ********** **** ** *** *********. ******, by *******, ****** ********** ** ******* ****** *** *** **** basic ******** **** ** ***** *** *** ********.

*** ****** ********* ***** ** ******** *** ******* ***** ** connect ** *** ** ********* ** ***** ************ ******* ****** the *******. ** **** *****, *** ********* ** ***** ************ systems *** *** ******** ********** ** ****** *****. *** ********* comes **** *** *** ** ******* ***/** ******* ** *********. We ******** **** ** ***** ****** ** ******* *** ****** ** *** ** ******** ******** ******.

** *********** ***** *** ***********, ************* ***** ****** ***** ***** two *******:

  • ******************: ******* * **** ** ******* ** * ****** ******* and ****** ********* ** *** **** ****** **** ** **** they *** ********** **-****. **** ********** *** ******** *** ** issues ** ******* **** ** **** ** *******. **** **** provides ****** ** *********, ******* ***** ** ******** ********.
  • **** ** ******* ******: ******* *** **** ** ******* ** the ******** ******* (**** * *** ** ***) **** *** computer. **** ** ********* **** ** ******* ** * **** in * ********, *** ********** ** *********. **** **** ********, as **** ** *** **** *** ** ******* *** **** the *********** ******* ********, *** *** ****** *** ****** **** virtually ********.

***** ************* **** ** ***** *** ****** ** *********, ** does ******* **** *********, **** *** ****** ** **********. *** smaller ************* (***** *** ***** **********), **** *** ** * technical ******* ** *** ********* *** ***** *** ********* ********** (requiring ************ *** ********* ** * ***** *******). *** ****** organizations, **** ** ****** ***** * ********* ******* ** *** steps ******** *** **** **********. *******, **** ** ********* * policy *******.

Policy ******

******* ** ** ********* ****** ****** ** ********* **** ***** organizations ****** ********* *** ***** **** **** ******* ************. ***** it *** *** ** *********** ********* ** **** ** ******, doing ** *** ******** **** *** *********** ** ** ******* attack. *** **** ******, **** ** ************* ***** ****** *** to ***** ******. **** ** ** ** ********, ** ***** take ***** ** ****** ** **** * ******** *****.

Who ***** ********?

* *** ******* ** *** ******** ** *** ***** ****** access. *** *** ** ******** **** ** ***** ** ****** showing *** ****** ******** ********* * ****, ****** ** *****'* video ************ ******. *******, **** ** **** **** **** ****** occurrence. ***** **'* *** *********** ********* ** ***** ****, ********* ongoing ****** *** *** ****** ** ******* ******** ****** **** concerns **** ** (** ** *********** ******** *****) *** *** operations (***** ** ************ ********** ** ******** **********).

******* ** ****, *** **** ****** **** ** ****** ****** is *** ** ************'* ***** ** **** ****** ** ***** IT ********** ******* (**** ** *******) ******* *** ******.

'Plug * ****' ****** ****** *******

******* ********* ****** *** ** * ******* *** ******* ************* and ****** ******** *** ***** ****** ****, ********* **** ****** to ******* ********* **** ******* ********* ****** ****** ******* ********* any **-**** ********* *******. ** **** ***, * ***** ************ system *** ** ********* *** ******** *********** ******* ****** ** change ************** ** ******* ********.

**** ********, ** ******* '**** * ****' ****** ****** ** a *** ****** ***** ****** ***** ************ *******. ***** ******* 'phone ****' ** ***** ********'* ******* '*****' *******, *********** ********** and ******** ** **** *** ******* *******. **** ****** ***** to ** ** *** ********'* ******* *** ****** ***** ***** surveillance **** **** ***** ***** *****. ** ******* ***********, **** approach ** ***** ***** **** *** ** ** *** ** far **** **** *% ** *** ***** ************ *******. *******, because ** ********** ***** **** ****** ** ***** ****** ***** surveillance, ** ****** **** ** **** ************* ** *** **** few *****. ** ***** '**** * ****' ********** **-***** ** our*******/****** ***** ********** ******.

Remote ******* ********

********** ** *** *** ***** **** ******* *** ****** ******, you **** **** **** **** ** ****** ******* ********. ***** it's *********** ******** ** ** ** ******* * ******* (**** we ******** ***** **** *** **** * **** *********), **** video ************ ******* *** ***** ******** ***** ************ *******- ************ **** **** ** ********* ** * **.

****** *** ***** ************ ******* *** ******** ******* *********** ********** software. *** ********* **** *** ******** **** *** ******** ************ to **** ***** ******* ******* **** ******. ** *** ** not **** **, **** *** *** ****** *** ***** ** see *** *****. **** ** * ******* *** ****** ** other ***** ********** (**** ** **** *** *** ******* ******).

** ******** ** *** *********** ********, *** ****** ** ****** applications **** ********* ******** ***** ****. ** ** *** ************ common *** * ***** ************ ****** ** **** * ****** monitoring ****** *********** (*** **** ****** ** ** ****** ***). This ******* ****** ****** **** *** ** ****** ****** (***** presuming ****** ******* ******).

Part * - Remote ********** ******* *********

************ ****** ****** ** ***'* ***** ************ ****** ** **** part ** *** ********. *** ***** ******* ** ** ********* whom **** ******* *** **** *** ***** **** ** ******** monitored.

DIY ** ******* ********

*** **** ****** ****** ********** ****** ** *** ******* ** an ************ ** ******** **** ***** *** ***** ************. ****** examples ** **** ******* **** ******** ******** ********** ***** ********* and ******** ******** ******** ** *** ** *** ******** **** occured ** *** ******** **** **** *** ** ****.

*** **** ********** ** '** ** ********' ********** ** **** it ******* ** *** ************ ****** ******* ********* ** ******* monitoring. **** ********, **** ** **** ************ ** ** ******** to ** ********. **** ***** ************* *** ******* ******* ********** someone ** ***** ***** **********.

**** ************* ****** **********. ***** **** ** **** ******** ************ through *** *** ** ******** ******/*******. *** ********, ***** ******* ******** ****** *** ********* ** **** ** *** US *****. * ****** ******** ***** ************** ** ** ****** *****, looking ** **** *** ********.

*** ************* ** ******** ****** ** *******. ******** ****** ***** receive ****** ******* *** *** *** ***** ** ** ********** poor (*.*., * ****** **** ***** **** ******* ** **** companies **** ******** ****** **** **** ** ** * ***** at * **** **** **********, *** ***** ***** * *** there *** **** *****).  ******* ****, *** ******** ***** ****** is ****** *********** -**** $** ******* ** *** ** *****(******* ** **** ** *** ***** ************ ******). ******* ***** is **** **** ******** ****** *** ********** **** *********** ** an *********** (*** **-******'******* *** ******'********.

Guard ***********

******* ** ******* ******** ***** ******** *****'* ************* (*** **** effectiveness), **** ******** ******** *** **** ** *********** ********** **** would ****** *** **** *** ******.

****, ************* *** ****** ******* ****** * ***** *** **** benefit **** ****** ***** ********** ********* ** ***** **** *****. This ******** ** *********** *** ***** ************ ******* ** ******* a *** **** **********.

Monitoring ******* *******

**** ***** ****** ***** ************, * ****** ** ********** *** be **********:

  • **********:*** ***-**** ********** ******* *** ******* ***'* ******* **********. ** this ********, *** ******* ********** '****' ********** **** ** ************ could ************ ** ** ***** *** ****. **** ********** *** functionality *** *** ********** ****** ***** *** **** *** ***** significantly ******* ************.
  • ********: *** ***-**** ********** ******* ****** ** ************ ** **** a ********'* *******. **** ******** ** * '*******' ****** ******. The ******* ******** *** **** ***** ***** **** **** ******* once ** ****, ***** ** *******, ***.
  • ********* ** ********* *****: ***** *** ** **** ** ******** ****** **** ********* or ******* ****** *** *********. **** *** ********* ***** ****** and **** ********** ****** **** *********.
  • ********* ** ******** *****: *** ********** ******* *** **** ************ ***** ******** ** alert *** **** ********* ** ** **-**** ******** ******. **** can ******* ******* ********** ** ** *** ******** *********** ** finding * ***** ******** *** ****** *** **** *** ********** or ******** **********.
  • *********: ********** *** ********* ** ******** *********** ** ***** *******. Two ******* *********** ***** *** ****: (*) "***** ** ****" for *********** **-**** ** ****** **** ******* ******* ** **** as **** **** ***** (*.*., ***** ** ***** **** ***** hours) *** (*) **** *********** **** ******* ****** ** **** someone ************ ****** **** **** **** *** ** ********** *****.
  • *************:****** ********** ********* *** **** **** **-**** ***** ***** ** provide ******** ** ***** *** ****** ****** **. **** ** most ******** ** ********** ** ** ********. *** ****** ********** provider *** ******* * '***'* *** ****', ******* *** ****** to ******* ****** *** *******. ************, *** ****** ********** ******** can **** **** ****** **** ********* ** ********* **** ******** guidance ** **********.

*** *********** ** ******* *** *** **** ****** ** ******** security ********** ** ********** ********** ** ***** *********. ***** ****** to ******* ***** ***** (*** **** *** **** ** * time) ** ********** ***********. **** ** *** **** ** **** places *** ****** ** *** ******. *******, ***** ** ** not **** ** **** ******* ****, * *********** ******* ** a *****'* **** **** ** ******* ** ******** *** *** next ********. ***** ********* *** *** ********* ** ****** **** inefficiency ** *********** ******** ******. *******, ** ** ******* *****, important ****** ******.

Technical ***** *** ****** *********

*** **** *********** ********* ****** ***** *** ****** ********** ******* one ** ***** ** ********** ** *********** ** * ******* provider. ** * ****** ******, ************** *** ** ******** **** difficult **** *** *** ******* *** **** ****** *** ********/***** of ******* **** * *** *****.

*** *** **** ******* ********* ******* ** ******** *** ********* issues ** ** ********* ** ******* *** *** ** ***** own ***** ************ ******** ** ** ******** ******. **** *** reduce *** ********* ********** ***, ** **** *****, *** ******* a '**** * ****' ****** ********** **** ******* ** ********** changes ** ******* ***-**** ******.

3rd ***** ****** ****************

***********, *** ****** ******* ********* ** ****, ** ******* ********* to ******* *** ***** *******. **** ***** ******* **** * DVR/NVR/VMS ** ***** *** **** ** ********* ** **** *** for * *** '********' ** ******** ******.

*** ********** ***** ** ********** *** *******: (*) *** ***** surveillance ****** ** ********** ********** (**** ****** ** ********* ** any *** ****** *** *** ********* **** **** **% ****** share) *** (*) ** ********* ** ********* **** *** ***** recorders. ** ******* ******* *** **** **** * ***** ******* of *** ******, ********* **** ** ****** ** ******* *********** interfaces ** **** *******. **** *** ** ****** *** ** blocked ** ******* ** ************* *** *** *** ********** ** view *** ****** ********'* ******** ** * *********** ******.

*********** **** *** ***** ******* ****** ******* ****** ** *****. It **** *** **** ** ** ******* ****** ******. ********* remote ****** ** ****** ****** ** ********** **** ****** ****** having ** ********* ** * *** ***** ********.

*** **** ****** ***** *** *********** **** ***** ** ***** systems ** ****** *** *** ***** ******** *******.

Use ** ***** *********

*******, ***** ** ******* **** ***** ********* *** ** * major ******* *** ****** ********** *********, ***** ********* ** ***** offerings *** *** ***** ******:

  • ******** ** ******** ******* **** ******* ********* ******** ******* ********** significant ******* ** ***** ******. ***** ****** ****** *** ********** of ********** *********. ***********, **** * ********** ******** ****** *** provide ********.
  • ******** **** *********** ***** ******** ******* **** **-**** *********/******* *** with *** ****** ********** ********. **** ** *** ** ***** with ********* *** ******** *** ********* ****** *** *** ********** of *********** ***** ********* **** ******** ******* *** **** *********** both **** *** ****** ********** ********'* ********** ******.
    Login to read this IPVM report.
    Why do I need to log in?
    IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

    Related Reports

    VSaaS Usage Statistics 2018 on Jan 18, 2018
    VSaaS has been a 'next big thing' for more than a decade. The prospect of managing, storing and streaming video from the cloud rather than...
    "First Of Its Kind" Stove Knob Alarm Sensor (2GIG) on Jan 15, 2018
    At CES 2018, 2Gig/Nortek announced the Stove & Grill Guard, a "first of its kind" sensor in the security industry, allowing users to be...
    Amazon Deep Learning Partnership With AgentVi on Jan 15, 2018
    Amazon is aiming to grow its Kinesis Video Streams offering that "enables you to quickly build computer vision and ML applications" in the cloud....
    Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
    Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
    Intel Flaw Impact on VMS / NVRs Examined on Jan 05, 2018
    A flaw has been found in Intel processors that exposes protected memory to unauthorized access. The flaw requires fundamental changes to operating...
    Multicasting Surveillance Tutorial on Jan 04, 2018
    Network bandwidth can be a concern for some surveillance systems. While improvements in video codecs, such as smart codecs for H.264 and H.265,...
    Directory Of 92 Video Analytics Suppliers on Jan 04, 2018
    This directory provides a list of video analytics providers to help you see and research what options are available. Video...
    Washington DC Surveillance Hackers Arrested on Dec 29, 2017
    The US Department of Justice has announced that "Two Romanian Suspects Charged With Hacking of Metropolitan Police Department Surveillance Cameras...
    WSJ Investigates China's Total Surveillance State on Dec 26, 2017
    The WSJ is continuing its investigation into Chinese video surveillance. Following up on last month's WSJ Investigation of Hikvision, the WSJ is...
    Repositionable Multi-Imager Camera Guide on Dec 22, 2017
    Multi-imager usage has been growing strongly over the past few years. Now, a new segment of multi-imagers has taken off, with many manufacturers...

    Most Recent Industry Reports

    PoE Powered Access Control Tutorial on Jan 19, 2018
    Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
    If You Have 4 Cameras, You Can Throw Them Away, If You Have 400, They Throw You Away on Jan 19, 2018
    Do users care about anything but price? Do user care about cybersecurity? Do users care about trusting their supplier? These have become...
    Chinese Government Hikvision Surveillance System On US Government Network on Jan 18, 2018
    Hikvision, the Chinese government-owned manufacturer, has publicly claimed that their products are running on a US government network. Moreover,...
    Winter 2018 Camera Course on Jan 18, 2018
    Learn video surveillance and get certified. Register now. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times...
    VSaaS Usage Statistics 2018 on Jan 18, 2018
    VSaaS has been a 'next big thing' for more than a decade. The prospect of managing, storing and streaming video from the cloud rather than...
    Vivint Streety Video Strengthens Door Knocking on Jan 17, 2018
    Vivint is famous (or infamous depending on your perspective) for mastering large scale door to door selling. The company has skyrocketed from a...
    Axis: "It’s A Question Of Trust And Who You Want To Be Associated With" on Jan 17, 2018
    Who do you trust? Who do you want to be associated with? Axis is raising hard questions to start 2018. In this note, we examine these questions,...
    Software House Vulnerability Allows Inside Attacker To Open Doors on Jan 17, 2018
    A vulnerability in Software House IP-ACM modules allows an attacker to potentially unlock doors, or perform other actions, on affected systems....
    'Defiant' Hikvision 'Strikes Back' At WSJ And US on Jan 16, 2018
    The fight is on. Hikvision and their owner, the Chinese government, 'strikes back' against the Wall Street Journal and US politicians raising...
    The 2018 Surveillance Industry Guide on Jan 16, 2018
    The 300 page, 2018 Video Surveillance Industry Guide, covering the key events and the future of the video surveillance market, is now available,...

    The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

    About | FAQ | Contact