Video systems are an effective tool for management device useful throughout today’s companies

If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a range of different vertical markets. The advances in video management systems that include cutting-edge video analytics present a huge opportunity for organizations to use such systems to boost business and consequently deliver greater ROI with a direct impact on the bottom line, he says. 

The applications of surveillance video are manifold and way beyond the traditional core purpose of security. For example, video can help with process control, personnel management, inventory tracking, quality control, customer service or merchandising. Video can determine the most efficient scheduling of personnel or the most effective sales display. It can streamline manufacturing processes by providing an alert if there is a malfunction. Integrated with the HVAC system, video can even save energy costs by, for example, turning up the air conditioner only when room occupancy reaches a certain number.

Vertical market opportunities

In the world of IP-based systems, video is data and its value is unprecedented. Users can view manufacturing processes, monitor remote facilities, or even follow the migration of fish for scientific research. Video surveillance software facilitates remote monitoring of any location, even from a mobile device. Video management systems deliver video data in user-friendly formats that enable immediate response. Video surveillance solutions can work alone to deliver this intelligence or integrate with other business systems and optimize operations for access control, point of sale, teleconferencing, process control systems or anything on the enterprise network.

Video systems can help improve service at toll booths
Video can facilitate personnel management and improve customer service at toll booths

There are virtually limitless vertical markets where video offers value beyond the security department. A partial list would include the following:

Education

Network cameras can be located throughout a campus and can help administrators manage discipline problems or view facility usage. Video can help to manage the flow of students during recess, analyze bottlenecks that form between classes or view traffic flow as parents drop students off in the morning. In case of a maintenance problem, video can allow the central office to identify and observe the problem remotely before sending staff. Video can track facility occupancy, especially during the weekend or off-hours.

Transportation

Expansive geography and large camera counts make video management systems especially useful tools in the transportation sector. For example, video can provide real-time views of toll booths to facilitate personnel management and improve customer service. Incorporating video and license-plate recognition functionality with toll payment systems can supply data tied to each transaction. Traffic cameras installed along highways can provide real-time traffic information, with a single software interface providing access to various camera views. A single interface can also provide views of various transportation facilities, offering additional benefits related to facility maintenance and personnel. Transportation applications also extend to ports and airports. Although security drives these markets, video also provides opportunities to improve operations and efficiencies at ports and airports.

Public safety

Video is valuable for crime prevention, but it also can play a positive and proactive community relations role. The presence of video cameras can help convert crime-prone neighborhoods into centers of commerce; it can transform abandoned city parks into places where families and children are safe to linger. Cameras located inside businesses, schools or other institutions can be networked into public safety systems to enable police, law enforcement or homeland security personnel to monitor emergency situations and the public safety response. Video can also assist with crowd control during special events to determine where more police officers are needed.

There is an opportunity gap between the immense capabilities of video systems and how they are currently being used in the customer base

Healthcare

Video is available from cameras anywhere in a healthcare setting via a campus-wide network or the Internet. Any computer can access video, so hospital management and department heads can immediately see what is happening in real-time. Mobile access to video even allows remote monitoring of activity across the hospital.

Retail

Beyond the obvious functions of security and loss prevention, surveillance video can help determine the most effective scheduling of personnel or the most effective point-of-purchase (POP) display by viewing when the busiest times are in stores or at a particular counter or display. By analyzing video, retailers can determine customer spending habits and the best use of personnel.

Utilities

When any remote element of a utility's operation has a problem, camera views of the situation can guide operators to a timely and appropriate response. Operational benefits make video cameras even more valuable in an environment where protection of critical infrastructure is paramount.

Video management systems make it possible

The advancement in video management capabilities is driven to a great extent by the shift to open architecture. Collaboration with third-party vendors helps to extend the core benefits and functionality of video management software to include cutting-edge technologies, such as video analytics, and to expand networks using wireless mesh and broadband networks.

Video plays a role in public safety
Surveillance cameras can help transform abandoned city parks into places where families and children into safer areas

Video management systems are also becoming easier to use, and even large systems can now be managed effectively and efficiently. Customers need real-time business intelligence to be presented in a usable format. Increasing number of video cameras and size of these systems are creating the real possibility of “information overload” for operators. To enable users to cope, video systems can tie the various information strands together. More importantly, the systems can be customized so that the user gets only the information he or she needs – and gets it when, where and how it is needed. Better information enables better decision-making and faster reactions. User interfaces are less complicated and include only information that is pertinent. Operating such a system is so intuitive as to become second-nature.

Video management systems and the opportunity gap

There is an opportunity gap between the immense capabilities of video systems and how they are currently being used in the customer base. One element in the gap is the need to educate a broader range of end-users about the value of video beyond the security department, the core customer who has historically been at the center of a video system purchase.

Video systems can provide a new and effective management device useful throughout today’s companies. This exciting, untapped potential also relates to another challenge in the current economic environment, which is the need to show a return on investment (ROI) for any technology purchase. The value proposition for video as a security and surveillance tool may be well understood in our industry, but economics make it imperative that the bottom-line benefit also be communicated effectively to the customer. The added value of uncovering additional benefits and uses of video makes the ROI case even stronger.

Security and business intelligence both have the same objective, which is to improve the bottom line. To that end, using a video system to provide data that transcends physical protection to boost operations and business efficiency makes perfect sense.

Gadi Piran, President, OnSSI Gadi Piran
President
OnSSI
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

What’s the next big thing in video image quality?
What’s the next big thing in video image quality?

Superior image quality has been the “holy grail” of the video surveillance business for several years. A transition to 4K images and a race to ever-higher pixel counts have dominated product development conversations for a while now. However, it’s now possible that the tide has turned. These days, data is sometimes more important than image quality, and increasing use of smaller-format mobile devices has helped to make image quality variations moot. As the industry changes, we asked this week’s Expert Panel Roundtable: What’s the next big thing in video image quality (beyond 4K and megapixel)?

Managing security during unprecedented times of home working
Managing security during unprecedented times of home working

Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back.  But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behaviour, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines.  As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organisations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months.   More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behaviour of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education programme. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices of employees.

How does audio enhance security system performance?
How does audio enhance security system performance?

Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?