Download PDF version Contact company
Recent advances in VMS leverage surveillance video data for both loss and fraud prevention, as well customer insights
It is more complicated to search through video compared to text-based data

Since the launch of Google’s search engine in 1998, Internet search has grown and expanded from desktops to mobile devices, generating over 3.5 billion searches of text, images and videos per day. One likely reason for this popularity is the search engine’s ability to immediately produce relevant results based on search criteria.

The security industry, in contrast, has not always taken advantage of such innovations in search. The right search technology exists to help loss prevention and fraud investigators find security video evidence of criminal activity. Yet today, most investigators are watching endless hours of video instead of leveraging specific criteria to pinpoint the moment an event of interest occurs. Why can’t security video search perform like Google?

Challenges With Searching Relevant Video Footages

Consider a large bank with locations around the globe and 150,000 cameras monitoring these locations. With just one hour of recorded video per day per camera, the bank is generating over 50 million hours of video per year. Yet the fraud team staff is comprised of only 10 full time reviewers. With 2000 work hours per year, this team is only capable of reviewing 20,000 hours of video per year, or just .04 percent of what is being captured.

This example illustrates a common problem in security today. Most investigators conduct linear timeline searches, meaning they either watch live feeds of specific cameras or recorded video from a specific day when an event occurred. This often requires downloading the entire day’s video from a central storage server and then watching countless hours of video to find events of interest. As in the global bank example, there is simply too much video to watch for this approach to be successful. Not to mention the toll this can take on the corporate network, with bandwidth heavy video downloads interfering with critical application performance.

"Businesses can leverage video
data to learn about customer
behavior, improve operations
and enhance other important
data sources"

Although video is the fastest growing type of big data today, it is more complicated to search video compared to text-based data. Keywords and descriptions of videos must be either automated or entered manually in contrast to text-based data that inherently includes keywords. Visual data such as video is complex, with layers of information and context about how people behave and interact. Software can deliver an unbiased analysis of this behavior whereas humans will naturally insert bias when searching and viewing video. All of these factors make it more challenging to efficiently search video footage.

VMS For Effective And Efficient Video Search

Today’s explosive growth in the amount of video data is driving demand for more effective and efficient video search. Recent advances in video management systems (VMS) are now making it possible to leverage surveillance video data for both loss and fraud prevention, as well customer insights, such as in-store buying habits and trends. Leading VMS solutions include the basic store and record functionality plus a plug-in framework for analytics, enterprise search and case management, all in one system. A more effective search capability allows investigators to quickly search vast volumes of video and find relevant evidence in minutes by using specific criteria such as facial surveillance, license plate recognition and object tracking analytics.

Many VMS products also include context integrations that can correlate video footage with Access Control, ATM or POS transaction data. Leading businesses are now taking advantage of this same technology to analyze video data to better understand customer behavior and operational metrics. Analytics such as people counting, dwell patterns, demographics and directional heat maps can be used to improve the customer experience, optimize staffing levels, increase conversion rates and analyze performance across locations.

Forensic Search Capability

In one example, a commercial parking firm had been relying on cameras recording the number of cars parked in their facilities to ensure this matched the tickets issued at the entry gate. Even with this video recorded, employees were still required to walk the garages every night to manually record every car by color and license plate to accurately charge those cars that were left overnight. 

Once the facility switched to a newer VMS that included a more efficient search capability and license plate recognition analytic, the system was able to automatically capture all license plates that entered the garage. So if a customer loses their ticket, they can simply provide their license plate number so customer service reps can run a search and verify how long the car has been in the lot. This enables the company to accurately charge customers, preserve revenue, and save countless employee hours of walking the garages every night.

Newer VMS solutions reduce investigation time as well as helping businesses achieve quick ROI
A more effective search capability allows investigators to quickly search vast volumes of video and find relevant evidence in minutes

This type of forensic search capability has also helped to reduce employee theft and shoplifting investigation times for a major retailer. The company had a team of five loss prevention managers working at maximum capacity to investigate activity at over 1200 stores. By implementing a more effective video search solution, they were able to reduce investigation times from one week to 20 minutes and reduce shrink by 60%.  The newer VMS solutions are also so cost effective that this company achieved a return on investment in less than 10 months.

Simplifying Business Administration Via Analytics

In addition to improvements in security, businesses can leverage this same video data to learn about customer behavior, improve operations and enhance other important data sources such as POS or ATM and teller transaction data. Retail stores are leveraging video analytics to more accurately measure in-store traffic, analyze associated traffic patterns (including demographics) and conversion rates to improve product placement and compare store performance across locations.  Queue management analytics can help businesses improve store operations with more efficient staff planning. Merchandising management can also benefit from a better understanding of accurate conversions based upon day and time to manage inventories and product placement.

For businesses that are ready to consider an upgrade to their security and surveillance system, and take advantage of these new capabilities to improve loss investigations and better understand customer behavior, be sure to evaluate different solutions using the following VMS checklist:

  • Handle the basics of store and record
  • Deliver LP and BI leveraging one platform
  • Enterprise scale and capabilities
  • Analytics and context integration platform
  • Advanced search architecture
  • Multiple deployment options (hardware, software, on-premise, cloud)
  • Easily configured and administered

By choosing a VMS that meets these criteria, businesses can experience video search that parallels the Google experience.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What Is The Impact Of Remote Working On Security?
What Is The Impact Of Remote Working On Security?

During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

How Have Security Solutions Failed Our Schools?
How Have Security Solutions Failed Our Schools?

School shootings are a high-profile reminder of the need for the highest levels of security at our schools and education facilities. Increasingly, a remedy to boost the security at schools is to use more technology. However, no technology is a panacea, and ongoing violence and other threats at our schools suggest some level of failure. We asked this week’s Expert Panel Roundtable: How have security solutions failed our schools and what is the solution?