SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Video Analytics - The New Magic Solution?

Contact company
Contact Honeywell
icon Add as a preferred source Download PDF version

Jeremy Kimber, Honeywell's EMEA Marketing Leader, analyses the rising phenomenon of video analytics in the security industry.

Like the pharmaceutical industry, CCTV is always unveiling a new wonder cure.  Given the rapid pace of technology development, it is inevitable that new

 Rapid growth predicted for analytic software market within the next two to three years

solutions are constantly being brought to market.  However, in many cases these new solutions are no better than previous, proven approaches and can even be solutions to problems that do not really exist.

Video analytics is the latest application that is generating huge amounts of interest in the industry.  Respected industry analysts such as IMS are predicting that the market for analytics software alone will be worth hundreds of millions of dollars within the next two to three years.

There is a strong rationale to support the need for such a new solution.  You don't need to be a part of the security industry to be aware of the huge number of surveillance cameras now in use in the UK - it is a fact constantly discussed in the media.  At present, there are over 4.2 million cameras - one for every 14 people in the population - and the number is still growing.  Generally there is still strong acceptance of the value of CCTV cameras in Britain.  However, given the huge numbers, there is inevitably increasing concern from the public over privacy and the potential risks of intrusion into people's private lives.

Currently, the main benefits of CCTV cameras are seen to be an element of deterrence (due to the perception that anyone engaged in illegal activity is being watched so may think twice), and a proven capability to support the identification and prosecution of criminals after the event.  The rapid responses to the 21/7 terrorist plots and the more recent abortive airport and nightclub incidents are good examples of this latter point.  However, there is a growing desire to see if CCTV can be turned into a more proactive tool.  This is typified by the public address systems linked to cameras in Middlesbrough, for example, which allow operators to reprimand individuals via loudspeaker, helping reduce minor misdemeanours and prevent bigger problems.

Video analytics technology:  advantages for end-users

Video analytics to be used to turn CCTV into a proactive tool 
 Video analytics software offers effective way to manage vast amounts of data

Video analytics potentially helps address these concerns and is one reason why the technology is seen as such an exciting new development.  Users of video are looking to find more effective ways to manage the vast mass of undifferentiated data that they are currently receiving from cameras and turn it into useful information.  They are also looking to find ways to turn their cameras into predictive tools that will allow them to spot problems brewing and prevent incidents in a more proactive manner, rather than just filming the events for later investigative use.  By supporting these changes in the use of CCTV, analytics will help address the public concerns over invasion of privacy.  As video becomes increasingly used for targeting real criminal incidents, then in turn, the public should become more willing to accept further increases in the use and number of cameras without a major backlash on privacy grounds.

In broad terms, video analytics uses a variety of rules, which can be specifically tailored both to the scene and the objects being observed, in order to intelligently identify potentially suspicious behaviours.  By using multiple tailored rules and algorithms that will screen out adverse weather, the effects of changing lighting conditions, and non-critical movement activity, analytics systems let security staff focus on real incidents rather than getting bogged down with hundreds of false alarms.  One misconception about analytics is that it is just advanced motion detection.  The intelligence in analytics systems in practice means they are able to offer massive reductions in false alarm generations compared to standard motion detection.

 The intelligence in analytics systems in practice means they are able to offer massive reductions in false alarm generations

Humans have an amazing capacity for decision making but are notoriously poor at maintaining concentration levels. A variety of studies have shown that after 20 minutes of watching, up to 90% of the information being shown on monitors will be missed as observers lose concentration.  In analytics systems, the application does the mind-numbing job of monitoring, using the rules and algorithms to screen out unwarranted alarms.  Only suspicious behaviours then trigger the alarms, allowing the security staff to focus on using their decision-making capabilities to identify if it really is a threat and warrants further action or is still a false alarm - potentially leading to a retuning of the analytics rules to continuously improve the effectiveness of the system.

There are a number of video analytics packages available in the market.  Typical applications include:

Video analytic perimeter protection systems

Perimeter protection systems provide back-up to fences, external pirs, seismic systems etc., allowing the user to identify specific areas where intruders will be identified.  Potentially this includes virtual ‘fence' lines that will trigger when an intruder climbs over it (rather than when a guard patrols along it), tripwires that trigger when crossed in specific directions and alert areas, such as nearby roads, which will trigger if a car sized object dwells in them for too long - i.e. if a car stops on the road or pulls over near the perimeter being monitored.  Combining these rules ensures only suspicious behaviours trigger the alarms and not the local rabbit population.

Dwell time video analytics

Monitored area of interest applications allow parking lots, one way streets, doorways and other specific areas to be monitored to avoid cars being left in no parking bays, to identify vehicles or people moving in the wrong direction (up one way roads, up exit only gangways at airports) and to highlight excessive loitering (via dwell time analytics).

Identification of left luggage through video analytics

Left baggage systems allow the identification of objects that h

Perimeter protection systems provide back-up to fences, external pirs, seismic systems etc., allowing the user to identify specific areas where intruders will be identified 
 Use of analytic software within perimeter protection systems

ave been left behind or left stationary for too long, particularly for transport locations although this may not be fully effective in very crowded environments.  Some analytics systems, however, may even identify when the scene is getting too crowded and that they are no longer able to function effectively and need to transfer monitoring back to the security team.

Use of video analytics for market analysis

A lot of the analytics information may also be valuable for marketing teams in companies as well as the security teams.  Many analytics solutions have marketing packages that provide people counting, car counting and dwell time functions (to identify if customers stop by key displays).  Whilst potentially very useful for the client, a bigger question may be whether you as security installers have the right contacts and capabilities to reach and effectively promote these solutions to end-user marketing teams.

Application of video analytics in forensic science

The power of the new analytics platforms also offers a significant improvement in forensic analysis capability.  Recorded video can be fed through the systems, post incident, using the tailored rules to allow faster and more effective identification of participants or events involved in or related to the incident.

In summary, analytics offers the ability for security teams to become both more effective by proactively addressing suspicious activity prior to incidents occurring, and more efficient through improved monitoring performance and speeding up post event forensic analysis.

Evaluation of architectures supporting video analytics

  Analytics is going to be an increasing part of video solutions over the next three years and will be as ubiquitous as video motion detection within five years

As well as the range of analytics applications, there are also a number of different architectures that support analytics.  There is a lot of debate about the theoretical advantages and disadvantages of analytics at the center (on servers or DVRs at the on-site control room or central monitoring station), at the ‘edge' (built into cameras or streamers on site) or with hybrid systems.

In practice, the different architectures will be relevant for different clients with different needs.  End user companies with existing infrastructures who want to upgrade by adding analytics onto some of their existing cameras may find that integrating analytics systems in their control rooms is the most cost effective and flexible solution.  Customers with limited bandwidth on their networks may want to put IP cameras with built-in analytics on site so that only information on suspicious incidents is being sent through the network.  Since the data will have been converted into ‘metadata' by the in-camera analytics, it will also be even less of a drain on the network than normal video.  As an installer, your best approach is to keep an open mind and look for manufacturers who can offer a range of analytics architectures allowing you to offer the best solutions for the individual requirements of your different clients.

Analytics is going to be an increasing part of video solutions over the next three years and will be as ubiquitous as video motion detection within five years. Jeremy Kimber, Honeywell's UK Marketing Leader

 

Jeremy Kimber 
EMEA Marketing Leader
Honeywell

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Video analytics
  • Video surveillance
  • Related links
  • ADPRO Video Surveillance software
  • ADPRO Digital video recorders (DVRs)
  • Honeywell Security Video Surveillance software
  • Honeywell Security Digital video recorders (DVRs)
  • Honeywell Security Surveillance cameras
  • Xtralis Digital video recorders (DVRs)
  • Honeywell Security IP cameras
  • Honeywell Security Dome cameras
  • Related categories
  • Surveillance cameras
  • Digital video recorders (DVRs)
  • Video Surveillance software
  • IP cameras
  • Dome cameras
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Expert commentary
About this page

Learn to protect your business from cyber threats with cybersecurity tips, proactive security measures, and risk management strategies. Stay secured and informed!

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec