SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Video Analytics: One Size Does Not Fit All

Cale Dowell
Cale Dowell
Contact company
Contact Thrive Intelligence
icon Add as a preferred source Download PDF version
Video analytics is a popular topic in the security industry
Security professionals and end users are eager to define video analytics

In the era where “I” is king, video analytics have become a topic of excitement, confusion, and deliberation. All one needs to do is take a stroll through the latest security expo to recognize how popular the space is, and how difficult it is to find an adequate explanation of what they are and how they work. So what are video analytics? This is the question both end users and security professionals are eager to define, yet depending on who they talk to, they may get different answers.

But the bigger question being asked is how can video analytics improve my security? Cale Dowell, Regional Director of Business Development for THRIVE Intelligence™, explains that the key issue here is not just a definition, but also an explanation of where video analytics can make an impact and how they can be applied.

Video Analytics – Sorting through the Ambiguity

Interesting to note is that video analytics are not as new as they seem. They’ve been in the marketplace for several years, primarily overseas, and are more commonly known as Video Content Analysis (VCA). You might be surprised to know that your child has an application of video content analysis in his or her Xbox Kinect. Other industries have used components of video analytics to help with supply chain management. But in the security industry, there seems to be some confusion as to how they work.

You may have heard definitions such as motion detection, pixilation change, intelligent sensors, processors, or even (my personal favorite) “magical” cameras. The reality? It has nothing to do with magic.

Real video analytics focus on analysis and classification of a live video stream. It is not a simple motion detection camera. Good analytics will utilize more than pixilation change as part of the classification process. Generally speaking, real video analytics operate in three general ways.

First, we start with the camera. Any security camera is designed to act like a human eye: It captures images in real time as a data stream. The first thing real video content analysis accomplishes is learning the field of view, or the normal data that is transmitted. We’ll call this the background. Once the background is established and separated (background modeling), any new information (objects) in the field of view are identified immediately. At its most basic core this is how video content analysis works. It learns the background data so it can distinguish new information that may interrupt the learned space.

Video analytics is also used for perimeter security
Real-time perimeter detection is one of the key uses of video analytics

Second, video analytics analyze the new information and compare it to pre-classified objects based on a variety of metrics depending on the sophistication of the analytics. Good analytics will utilize metrics such as size, shape, speed and trajectory within the field of view of the camera, in addition to pixilation patterns. The data is analyzed by processing the information in much the same manner as a computer processes information.

Lastly, good video analytics will provide the ability to create zones, lines and triggers within the field of view of the camera. This allows for a custom-tailored approach to creating protocols for when/why/how to be notified.

To summarise, true video analytics are not simple motion detection cameras. They are more intelligent and operate in a manner that also analyzes information as opposed to simply detecting motion or pixel change. This permits a higher level of customization and a more significant reduction of false alarms than previous technologies. The value is largely focused on receiving real-time alerts when the analytics are triggered, and eliminating as many false alarms and false positives as possible through proper setup.

Value Proposition

The true value of video analytics rests primarily in their ability to significantly reduce false alarms and increase real time response. Where security cameras have been used for decades as reactive tools, this new technology is shifting the industry towards real time intervention.

By pairing real-time analytics with boots on the ground personnel, an end user gains maximum efficiency in monitoring and responding to events as they occur in addition to increasing the capabilities of personnel and site intelligence. The key fundamental uses of video analytics are:

  • Real-time perimeter detection
  • Force multiplication of on-site guard force
  • Augmenting manned security labor
  • Creating metadata based on image sampling

End users are beginning to compare the value of spending high dollars for manned live monitoring versus the ability to leverage video analytics to eliminate or repurpose the stationed monitoring guard altogether. Increasing coverage and monitoring is much more scalable and cost effective than simply using manpower alone. Many end users are realising significant cost savings by applying hybrid solutions (manned security in conjunction with real time monitoring using analytics) across their regional and national footprints.

Understand the ROI

Make vendors work for you by requiring a customized, consultative approach that delivers their full solution based on your needs, vulnerabilities, threats, and daily operations early in the vetting process. Disregard vendors that operate in a “one size fits all” mentality

As with any investment, end users shouldn’t let the excitement overrule due diligence. With video analytics on the rise in a rapid way, they should be wary of companies offering substandard solutions for top dollar. Thus, it is imperative to understand the capabilities and solutions being offered in addition to drilling down to the bottom line of how it might save you money. And the reality is, in some cases it won’t save you money. In these scenarios, sometimes the cost will be well worth it, and sometimes it won’t.

As an end user, here are some practical questions to ask and consider through the vetting process:

  • What are the costs and ease of use?
  • What can your analytics accomplish for the security of my facility?
  • Can I see a live demonstration of your analytics?
  • How do your analytics work?
    • Note: if the answer is simply motion detection or pixilation change, they are not true analytics.
  • Where is your monitoring center and can I take a tour?
    • Note: any good monitoring company should always give you a tour if you ask.
  • What is being outsourced and what do you manufacturer and design yourselves?

The Complete Package

The real value of analytics is applied through real-time monitoring. Big players in the industry are edging to prove their value by demonstrating end-to-end solutions pairing remote video monitoring utilising analytics with other traditional services such as access control, intrusion alarm monitoring, and conventional guard services. This hybrid solution is the future of physical security. This type of scenario can maximize capabilities, increase response time, and improve cost control. Make vendors work for you by requiring a customized, consultative approach that delivers their full solution based on your needs, vulnerabilities, threats, and daily operations early in the vetting process. Disregard vendors that operate in a “one size fits all” mentality.

Remote video monitoring that deploys true analytics is the catalyst for overwhelming change within the industry. But the true value is found by leveraging a meeting of the minds that is flexible to adapt, change, and grow with technological advancements.

Remote video monitoring can seem like a frightening undertaking, especially for large corporate users. However, there is significant value to be gained by offloading, augmenting, and supplementing your security needs through qualified third parties that are specifically tailored to meet your needs. Most CEOs are determined that they did not start their business to also run a security company. As a result, big box businesses are looking for viable solutions that can improve capabilities and reduce cost now more than ever. True analytics are simply the current linchpin that is allowing that desire to become a real actuality.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Physical security
  • Security access systems
  • Video analytics
  • Video surveillance
  • Related links
  • Articles by Cale Dowell
  • Related categories
  • Surveillance cameras
  • Video Surveillance software
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Expert commentary
About this page

Boost security with AI-driven surveillance systems, empowering businesses to effectively monitor assets and prevent crime.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec