SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Voyant Photonics unveils Helium LiDAR platform
    • Zimperium uncovers mobile PDF phishing threats
    • Matrix Comsec wins CII 2025 Women in STEM Award
    • VITEC & Actelis: Revolutionising IPTV for RF facilities
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which vertical markets have the greatest growth potential for security?
    • What’s behind (perimeter) door #1?
    • Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft
    • Why open matters in the age of AI
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Marin Hospital enhances security with eCLIQ access control

    Marin Hospital enhances security with eCLIQ access control

    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

What is the value of remotely monitoring a system's health and operation?

16 Oct 2018

What is the value of remotely monitoring a system's health and operation?
16 Oct 2018

Editor Introduction

When is it too late to learn that a video camera isn’t working properly? As any security professional will tell you, it’s too late when you find that the system has failed to capture critical video. And yet, for many years, system administrators “didn’t know what they didn’t know.” And when they found out, it was too late, and the system failed to perform as intended. Fortunately, in today’s technology-driven networked environment, monitoring a system’s health is much easier, and a variety of systems can be deployed to ensure the integrity of a system’s operation. We asked this week’s Expert Panel Roundtable: How can remote monitoring of a security system’s health and operation impact integrators and end users?


Card image cap
Joe Oliveri Johnson Controls, Inc.

Security systems are only as effective as they are reliable. It’s equally as important to stay ahead of maintenance and operational issues as it is to ensure that the proper technology is implemented. Remote security monitoring can help businesses and facilities achieve this by providing continuous protection against the unexpected. Not only can the technology keep an eye on operations from anywhere through features like live video look-in and mobile access control, but it can also provide real-time updates on maintenance needs to ensure security systems are running effectively 24/7. This flexibility and easy access to data helps end users and integrators consistently and reliably secure their facilities.

Card image cap
Charles Pitman Genetec, Inc.

Remote health and operations monitoring are crucial in ensuring high uptime and consistent performance. For integrators, this provides them with a global view of health and uptime across the systems they are responsible for, allowing them to prioritise intervention and proactively contact end-users before issues become critical. Remote monitoring also allows integrators to identify potential scalability issues, by using these tools forensically to see if there are any health and availability impacts of changes to the system, such as the addition of more devices, firmware or software upgrades, or changes to the network. Using remote monitoring in this way, integrators can identify best practices for upgrading or expanding systems, allowing for a smoother security implementation across their user base. For the end-user, all of this translates into a more robust system and peace of mind, knowing their integrators are always on the lookout for potential problems before they occur.

Card image cap
Stuart Rawling Pelco, Inc

A lot of the focus of integrating cloud technology within the security business has revolved around development of VSaaS (Video Software as a Service). But I would argue that the first real impactful use of cloud technology will be on how physical equipment and software services can be monitored through a connected service. A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator. By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user. Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymised, it could also be used by manufacturers to analyse and form conclusions about maintenance schedules and system lifespan.

Card image cap
Jessica Burton Seagate Technology

Remote monitoring of a security solution’s health is vital to the longevity of any viable system. Take, for instance, surveillance hard disk drives. There are many potential factors that can contribute to poor performance and data loss, such as temperature, vibration, shock and humidity. Fortunately, new hard disk drives are emerging that provide software to monitor operating conditions, making prevention, intervention and recovery possible. With the ability to review parameters related to drive health status in real time, end users can assess their device, review drive health recommendations, take actions to mitigate risk, and back up their data if the drive has deteriorated. Consequently, end users are better equipped to proactively defend against catastrophic failures and ensure data availability, giving them greater peace of mind. For systems integrators, this means more satisfied customers with an enhanced value and less time spent performing maintenance calls or responding to false alarms.


Editor Summary

Keeping systems healthy and operating as intended is an ongoing, often-shared challenge for end users and integrators. End users depend on systems to be healthy and well-maintained to ensure the highest level of security for their people, facilities and assets. For integrators, ensuring effective system operation is an important factor in satisfying their customers’ expectations. New technology approaches are easing the path to healthy system operation, and cloud services are facilitating the sharing of information among stakeholders.

  • Related links
  • HID Access control controllers
  • HID Access control software
  • Related categories
  • CCTV software
  • Access control controllers
  • Access control software
  • CCTV cameras
  • Video servers (IP transmission)
  • Storage
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Round table discussions
About this page

Explore remote monitoring systems for enhanced security, maintaining operational health and ensuring smooth business continuity in critical environments.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec