Training: Remote Video Surveillance Monitoring

Author: John Honovich, Published on Jul 18, 2010

This report explains and examines the fundamental technical and operational issues in using remote video surveillance. We cover the two primary approaches: (1) watching your own video surveillance remotely or (2) hiring a outside monitoring service to perform monitoring for you.

Remote video surveillance is a core benefit of today's video surveillance systems over classical closed circuit systems. Minimally, remote monitoring can reduce management costs as it provides visual insights into ongoing on-site activities. Additionally, remote monitoring has the potential to improve guard efficiency and reduce the overall cost of performing security. Potentially, remote monitors can watch video from many sites, focus on key events and dispatch responders more efficiently than dedicating operators locally.

However, to achieve these objectives, requiring navigating a number of important technical and operational issues.

These key elements we examine inside include the following:

  • Analog vs IP Remote Monitoring
  • 'Opening Up' Networks
  • Technical Steps (Firewalls & IP Addressing)
  • Policy Review
  • Who Views Remotely?
  • 'Plug N Play' Remote Access Options
  • Remote Viewing Software

With those basics in place, we examine the use of 3rd party providers to perform remote monitoring including the following key elements:

  • DIY vs Service Provider
  • Guard Replacement
  • 3rd Party System Interoperability
  • Monitoring Service Options
  • Use of Video Analytics

Review of our IP Networks for Video Surveillance training or equivalent IP knowledge is a pre-requisite for this report. Remote video surveillance requires the use, and therefore understanding, of IP networks.

**** ****** ******** *** ******** *** *********** ********* *** *********** issues ** ***** ****** ***** ************. ** ***** *** *** primary **********: (*) ******** **** *** ***** ************ ******** ** (2) ****** * ******* ********** ******* ** ******* ********** *** you.

****** ***** ************ ** * **** ******* ** *****'* ***** surveillance ******* **** ********* ****** ******* *******. *********, ****** ********** can ****** ********** ***** ** ** ******** ****** ******** **** ongoing **-**** **********. ************, ****** ********** *** *** ********* ** improve ***** ********** *** ****** *** ******* **** ** ********** security. ***********, ****** ******** *** ***** ***** **** **** *****, focus ** *** ****** *** ******** ********** **** *********** **** dedicating ********* *******.

*******, ** ******* ***** **********, ********* ********** * ****** ** important ********* *** *********** ******.

***** *** ******** ** ******* ****** ******* *** *********:

  • ****** ** ** ****** **********
  • '******* **' ********
  • ********* ***** (********* & ** **********)
  • ****** ******
  • *** ***** ********?
  • '**** * ****' ****** ****** *******
  • ****** ******* ********

**** ***** ****** ** *****, ** ******* *** *** ** 3rd ***** ********* ** ******* ****** ********** ********* *** ********* key ********:

  • *** ** ******* ********
  • ***** ***********
  • *** ***** ****** ****************
  • ********** ******* *******
  • *** ** ***** *********

****** ** ***** ******** *** ***** ************ ********** ********** ** ********* ** * ***-********* *** **** ******. Remote ***** ************ ******** *** ***, *** ********* *************, ** IP ********.

[***************]

Analog ** ** ****** **********

*** **** ****** ** ******** ******** ***** *** ********* *** same *** ****** *** ** *******. ** *** **** ** vendor ********* ********, ** ***** ****** **** **** ** ********* novel ** ****** ** **. *******, **** **, ** ****, misleading.

** * ***** *****, ********** **** ***** ****** ** ** IP ******* ** ******. *******, *********** *** ****** *******/******* *** connected ***** ** ********* ******* ****. ***** *** **** *** make * ****** ******* ********** ** ** ****** ******, *** DVR **** ** * ***** ** *** ******* ********. *** remote ****** ******** ** *** *** ***** ********* *** ***** the **** ********** **** *** ****** ******.

******* *** *** ********** ** ** ** ******, * ***, an *** ** *** ******** ****** ** * **, *** face *** **** *********** ***** ** ****** ******* ********** ***** from *** *****/**-**** ***** *******.

'Opening **' ********

*** ******* ********* ********* ** ****** ***** ********** ** **** networks *** ****** *********** ******** ** *******, ** *******, ****** to ******** *********. ************* ***, ******* ************* ******* ***/** ****** review, ** ** ********* *** ******** ** ****** * ***** surveillance ****** **** * ****** ********.

**** ******** *** *** ** ** ** ******** ********** *** video ************ ** ********* *** *** ** ****. *** ********, the **** ****** ******* ** * ******* **** ** ******** accessible *** ********. *******, **** *** ********* *** ** *********** setups **** ********* ** **** *******, ******** ** ***** ******/****** ****** ** sites.

***** ************ ** ****** ****** ******** ** ** ** ********** facing ******* **** *** ******* **** ** ******** **-**** ********* such ** ********** ** ******** ******** ** ****** *****.

********* **-**** ******, *********, ******** '******* **' *** ******** ***** surveillance ****** *** ******** ******.

Technical *****

*** ***** ** *** *** ******** ** '******* **' ** on *** ********* ****. ******** *** ********* ******** ** ******** access **** ******** **** *** ******** *********. ** *** **** basic *****, **** ** ************ ** *********- * *********** ********* ** ******* - **** ******** *** filters *** ******** **** ******* *** *******. *** ******* ******** philosophy ** ** **** ********** **** ** *** *********. ******, by *******, ****** ********** ** ******* ****** *** *** **** basic ******** **** ** ***** *** *** ********.

*** ****** ********* ***** ** ******** *** ******* ***** ** connect ** *** ** ********* ** ***** ************ ******* ****** the *******. ** **** *****, *** ********* ** ***** ************ systems *** *** ******** ********** ** ****** *****. *** ********* comes **** *** *** ** ******* ***/** ******* ** *********. We ******** **** ** ***** ****** ** ******* *** ****** ** *** ** ******** ******** ******.

** *********** ***** *** ***********, ************* ***** ****** ***** ***** two *******:

  • ******************: ******* * **** ** ******* ** * ****** ******* and ****** ********* ** *** **** ****** **** ** **** they *** ********** **-****. **** ********** *** ******** *** ** issues ** ******* **** ** **** ** *******. **** **** provides ****** ** *********, ******* ***** ** ******** ********.
  • **** ** ******* ******: ******* *** **** ** ******* ** the ******** ******* (**** * *** ** ***) **** *** computer. **** ** ********* **** ** ******* ** * **** in * ********, *** ********** ** *********. **** **** ********, as **** ** *** **** *** ** ******* *** **** the *********** ******* ********, *** *** ****** *** ****** **** virtually ********.

***** ************* **** ** ***** *** ****** ** *********, ** does ******* **** *********, **** *** ****** ** **********. *** smaller ************* (***** *** ***** **********), **** *** ** * technical ******* ** *** ********* *** ***** *** ********* ********** (requiring ************ *** ********* ** * ***** *******). *** ****** organizations, **** ** ****** ***** * ********* ******* ** *** steps ******** *** **** **********. *******, **** ** ********* * policy *******.

Policy ******

******* ** ** ********* ****** ****** ** ********* **** ***** organizations ****** ********* *** ***** **** **** ******* ************. ***** it *** *** ** *********** ********* ** **** ** ******, doing ** *** ******** **** *** *********** ** ** ******* attack. *** **** ******, **** ** ************* ***** ****** *** to ***** ******. **** ** ** ** ********, ** ***** take ***** ** ****** ** **** * ******** *****.

Who ***** ********?

* *** ******* ** *** ******** ** *** ***** ****** access. *** *** ** ******** **** ** ***** ** ****** showing *** ****** ******** ********* * ****, ****** ** *****'* video ************ ******. *******, **** ** **** **** **** ****** occurrence. ***** **'* *** *********** ********* ** ***** ****, ********* ongoing ****** *** *** ****** ** ******* ******** ****** **** concerns **** ** (** ** *********** ******** *****) *** *** operations (***** ** ************ ********** ** ******** **********).

******* ** ****, *** **** ****** **** ** ****** ****** is *** ** ************'* ***** ** **** ****** ** ***** IT ********** ******* (**** ** *******) ******* *** ******.

'Plug * ****' ****** ****** *******

******* ********* ****** *** ** * ******* *** ******* ************* and ****** ******** *** ***** ****** ****, ********* **** ****** to ******* ********* **** ******* ********* ****** ****** ******* ********* any **-**** ********* *******. ** **** ***, * ***** ************ system *** ** ********* *** ******** *********** ******* ****** ** change ************** ** ******* ********.

**** ********, ** ******* '**** * ****' ****** ****** ** a *** ****** ***** ****** ***** ************ *******. ***** ******* 'phone ****' ** ***** ********'* ******* '*****' *******, *********** ********** and ******** ** **** *** ******* *******. **** ****** ***** to ** ** *** ********'* ******* *** ****** ***** ***** surveillance **** **** ***** ***** *****. ** ******* ***********, **** approach ** ***** ***** **** *** ** ** *** ** far **** **** *% ** *** ***** ************ *******. *******, because ** ********** ***** **** ****** ** ***** ****** ***** surveillance, ** ****** **** ** **** ************* ** *** **** few *****. ** ***** '**** * ****' ********** **-***** ** our*******/****** ***** ********** ******.

Remote ******* ********

********** ** *** *** ***** **** ******* *** ****** ******, you **** **** **** **** ** ****** ******* ********. ***** it's *********** ******** ** ** ** ******* * ******* (**** we ******** ***** **** *** **** * **** *********), **** video ************ ******* *** ***** ******** ***** ************ *******- ************ **** **** ** ********* ** * **.

****** *** ***** ************ ******* *** ******** ******* *********** ********** software. *** ********* **** *** ******** **** *** ******** ************ to **** ***** ******* ******* **** ******. ** *** ** not **** **, **** *** *** ****** *** ***** ** see *** *****. **** ** * ******* *** ****** ** other ***** ********** (**** ** **** *** *** ******* ******).

** ******** ** *** *********** ********, *** ****** ** ****** applications **** ********* ******** ***** ****. ** ** *** ************ common *** * ***** ************ ****** ** **** * ****** monitoring ****** *********** (*** **** ****** ** ** ****** ***). This ******* ****** ****** **** *** ** ****** ****** (***** presuming ****** ******* ******).

Part * - Remote ********** ******* *********

************ ****** ****** ** ***'* ***** ************ ****** ** **** part ** *** ********. *** ***** ******* ** ** ********* whom **** ******* *** **** *** ***** **** ** ******** monitored.

DIY ** ******* ********

*** **** ****** ****** ********** ****** ** *** ******* ** an ************ ** ******** **** ***** *** ***** ************. ****** examples ** **** ******* **** ******** ******** ********** ***** ********* and ******** ******** ******** ** *** ** *** ******** **** occured ** *** ******** **** **** *** ** ****.

*** **** ********** ** '** ** ********' ********** ** **** it ******* ** *** ************ ****** ******* ********* ** ******* monitoring. **** ********, **** ** **** ************ ** ** ******** to ** ********. **** ***** ************* *** ******* ******* ********** someone ** ***** ***** **********.

**** ************* ****** **********. ***** **** ** **** ******** ************ through *** *** ** ******** ******/*******. *** ********, ***** ******* ******** ****** *** ********* ** **** ** *** US *****. * ****** ******** ***** ************** ** ** ****** *****, looking ** **** *** ********.

*** ************* ** ******** ****** ** *******. ******** ****** ***** receive ****** ******* *** *** *** ***** ** ** ********** poor (*.*., * ****** **** ***** **** ******* ** **** companies **** ******** ****** **** **** ** ** * ***** at * **** **** **********, *** ***** ***** * *** there *** **** *****).  ******* ****, *** ******** ***** ****** is ****** *********** -**** $** ******* ** *** ** *****(******* ** **** ** *** ***** ************ ******). ******* ***** is **** **** ******** ****** *** ********** **** *********** ** an *********** (*** **-******'******* *** ******'********.

Guard ***********

******* ** ******* ******** ***** ******** *****'* ************* (*** **** effectiveness), **** ******** ******** *** **** ** *********** ********** **** would ****** *** **** *** ******.

****, ************* *** ****** ******* ****** * ***** *** **** benefit **** ****** ***** ********** ********* ** ***** **** *****. This ******** ** *********** *** ***** ************ ******* ** ******* a *** **** **********.

Monitoring ******* *******

**** ***** ****** ***** ************, * ****** ** ********** *** be **********:

  • **********:*** ***-**** ********** ******* *** ******* ***'* ******* **********. ** this ********, *** ******* ********** '****' ********** **** ** ************ could ************ ** ** ***** *** ****. **** ********** *** functionality *** *** ********** ****** ***** *** **** *** ***** significantly ******* ************.
  • ********: *** ***-**** ********** ******* ****** ** ************ ** **** a ********'* *******. **** ******** ** * '*******' ****** ******. The ******* ******** *** **** ***** ***** **** **** ******* once ** ****, ***** ** *******, ***.
  • ********* ** ********* *****: ***** *** ** **** ** ******** ****** **** ********* or ******* ****** *** *********. **** *** ********* ***** ****** and **** ********** ****** **** *********.
  • ********* ** ******** *****: *** ********** ******* *** **** ************ ***** ******** ** alert *** **** ********* ** ** **-**** ******** ******. **** can ******* ******* ********** ** ** *** ******** *********** ** finding * ***** ******** *** ****** *** **** *** ********** or ******** **********.
  • *********: ********** *** ********* ** ******** *********** ** ***** *******. Two ******* *********** ***** *** ****: (*) "***** ** ****" for *********** **-**** ** ****** **** ******* ******* ** **** as **** **** ***** (*.*., ***** ** ***** **** ***** hours) *** (*) **** *********** **** ******* ****** ** **** someone ************ ****** **** **** **** *** ** ********** *****.
  • *************:****** ********** ********* *** **** **** **-**** ***** ***** ** provide ******** ** ***** *** ****** ****** **. **** ** most ******** ** ********** ** ** ********. *** ****** ********** provider *** ******* * '***'* *** ****', ******* *** ****** to ******* ****** *** *******. ************, *** ****** ********** ******** can **** **** ****** **** ********* ** ********* **** ******** guidance ** **********.

*** *********** ** ******* *** *** **** ****** ** ******** security ********** ** ********** ********** ** ***** *********. ***** ****** to ******* ***** ***** (*** **** *** **** ** * time) ** ********** ***********. **** ** *** **** ** **** places *** ****** ** *** ******. *******, ***** ** ** not **** ** **** ******* ****, * *********** ******* ** a *****'* **** **** ** ******* ** ******** *** *** next ********. ***** ********* *** *** ********* ** ****** **** inefficiency ** *********** ******** ******. *******, ** ** ******* *****, important ****** ******.

Technical ***** *** ****** *********

*** **** *********** ********* ****** ***** *** ****** ********** ******* one ** ***** ** ********** ** *********** ** * ******* provider. ** * ****** ******, ************** *** ** ******** **** difficult **** *** *** ******* *** **** ****** *** ********/***** of ******* **** * *** *****.

*** *** **** ******* ********* ******* ** ******** *** ********* issues ** ** ********* ** ******* *** *** ** ***** own ***** ************ ******** ** ** ******** ******. **** *** reduce *** ********* ********** ***, ** **** *****, *** ******* a '**** * ****' ****** ********** **** ******* ** ********** changes ** ******* ***-**** ******.

3rd ***** ****** ****************

***********, *** ****** ******* ********* ** ****, ** ******* ********* to ******* *** ***** *******. **** ***** ******* **** * DVR/NVR/VMS ** ***** *** **** ** ********* ** **** *** for * *** '********' ** ******** ******.

*** ********** ***** ** ********** *** *******: (*) *** ***** surveillance ****** ** ********** ********** (**** ****** ** ********* ** any *** ****** *** *** ********* **** **** **% ****** share) *** (*) ** ********* ** ********* **** *** ***** recorders. ** ******* ******* *** **** **** * ***** ******* of *** ******, ********* **** ** ****** ** ******* *********** interfaces ** **** *******. **** *** ** ****** *** ** blocked ** ******* ** ************* *** *** *** ********** ** view *** ****** ********'* ******** ** * *********** ******.

*********** **** *** ***** ******* ****** ******* ****** ** *****. It **** *** **** ** ** ******* ****** ******. ********* remote ****** ** ****** ****** ** ********** **** ****** ****** having ** ********* ** * *** ***** ********.

*** **** ****** ***** *** *********** **** ***** ** ***** systems ** ****** *** *** ***** ******** *******.

Use ** ***** *********

*******, ***** ** ******* **** ***** ********* *** ** * major ******* *** ****** ********** *********, ***** ********* ** ***** offerings *** *** ***** ******:

  • ******** ** ******** ******* **** ******* ********* ******** ******* ********** significant ******* ** ***** ******. ***** ****** ****** *** ********** of ********** *********. ***********, **** * ********** ******** ****** *** provide ********.
  • ******** **** *********** ***** ******** ******* **** **-**** *********/******* *** with *** ****** ********** ********. **** ** *** ** ***** with ********* *** ******** *** ********* ****** *** *** ********** of *********** ***** ********* **** ******** ******* *** **** *********** both **** *** ****** ********** ********'* ********** ******.
    Login to read this IPVM report.
    Why do I need to log in?
    IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

    Related Reports

    Directory of 30+ LPR / ANPR Providers on Feb 21, 2018
    License Plate Recognition / Automatic Number Plate Recognition are a type of video analytics software that can identify and match license / number...
    Bosch Merges Video, Intrusion and Access Businesses on Feb 19, 2018
    Bosch is merging their "video systems, intrusion detection, as well as its access control and management software business units to form a single...
    Why 3VR Failed on Feb 16, 2018
    3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
    Hikvision DeepInMind Tested Terribly on Feb 15, 2018
    While Hikvision is heavily marketing deep learning and 'AI' as their next big thing, new IPVM test results of their DeepInMind NVR shows their deep...
    Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
    Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
    Hanwha Wisenet X 5MP Camera Tested (XNV-8080R) on Feb 13, 2018
    Wisenet X is Hanwha's high-end camera line. We tested their Wisenet X 1080p camera last year. Now Hanwha is offering 5MP cameras listing super low...
    Favorite NVR / VMS Manufacturers 2018 on Feb 12, 2018
    There is a new integrator favorite VMS. In 2016, 2 VMSes were effectively tied for top choice. One of those VMSes favorability was stable while...
    Motorola Targets Chinese With Avigilon Acquisition on Feb 09, 2018
    Motorola joins the growing list of companies taking aim at Chinese manufacturers. Recall, last week it was Hanwha: Chinese Products Damaged...
    Simplisafe 'All New' Generation 3 Tested on Feb 08, 2018
    Feared by the traditional alarm industry, Simplisafe has launched its 'all new' Generation 3 platform that they declare is "Stronger. Faster....
    Chinese Police Wearing Facial Recognition Are Here on Feb 06, 2018
    This is a very interesting and highly atypical usage of facial recognition that the Chinese government touted this week: It is a PRC police...

    Most Recent Industry Reports

    Directory of 30+ LPR / ANPR Providers on Feb 21, 2018
    License Plate Recognition / Automatic Number Plate Recognition are a type of video analytics software that can identify and match license / number...
    New Whole Foods Installs Hackable Access Control on Feb 21, 2018
    Whole Foods has built a reputation for high quality. And their 2017 Amazon acquisition has increased that, plus added deep pockets for buying...
    Remote Network Access for Video Surveillance Guide on Feb 21, 2018
    Remotely accessing surveillance systems is key in 2018, with more and more users relying on mobile apps as their main way of operating the system....
    Visio For Video Surveillance Design on Feb 20, 2018
    Many integrators have standardized on AutoCAD for camera layouts but new users may be overwhelmed by its learning curve. Microsoft's Visio...
    Health Care Insurance Integrator Benefits Statistics on Feb 20, 2018
    How common and how much healthcare coverage is typically provided by security companies? 150+ integrators explained how their companies provide the...
    Hikvision Deletes Genetec Support on Feb 20, 2018
    There will be no peace between Hikvision and Genetec. A year after Genetec expelled Hikvision (and Huawei, citing Chinese government control...
    Change Orders - Sometimes Necessary, Sometimes Unethical on Feb 19, 2018
    Change orders are a common element in project sales. Sometimes they are a necessity and appropriate ways to deal with arising issues, but sometimes...
    Bosch Merges Video, Intrusion and Access Businesses on Feb 19, 2018
    Bosch is merging their "video systems, intrusion detection, as well as its access control and management software business units to form a single...
    Why 3VR Failed on Feb 16, 2018
    3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
    "Fear Mongering": Hikvision USA Cybersecurity Director Dismisses Chinese Government Ownership Concerns on Feb 16, 2018
    The facts are: The Chinese government created Hikvision and is Hikvision's controlling shareholder. Hikvision's Chairman, a Communist Party...

    The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

    About | FAQ | Contact