SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

How to manage abundant video data and maximise operational efficiency

Darren Nicholson
Darren Nicholson
Contact company
Contact Snap Surveillance
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Rising video surveillance demands smarter systems for quicker incident response and processing efficiency.
  • Overabundance of video data challenges security; efficient systems needed for rapid analysis.
  • Seamless integration of video systems is essential for comprehensive security coverage and effective operation.
Related Links
  • Demystifying video analytics - is "intelligent" now a dirty word?
  • High quality images maximise video analytics success
  • Addressing false alarms in video analytics
Since time is always of the essence, the solution must help find and identify all the relevant video quickly, and present it in a way that it can be easily understood
Increases in the number of cameras and storage
capacity have created an overabundance of video
information that is difficult to manage 

Investment in video surveillance technology continues to increase as technology improves and security equipment becomes more affordable. Companies invest in video surveillance primarily to protect people and property, for both deterrence and more crucially for incident response. While there’s no doubt that the systems can provide a comprehensive video archive, the real challenge is whether these systems allow security and law enforcement personnel to respond quickly and effectively when security breaches occur. In large enterprise systems, entrenched video collection methods have limited effectiveness in real-time situations. When retrieving and analysing multi-camera video for forensic purposes, the process of extracting valuable footage from the sheer volume of video can be highly time consuming, ineffective, and falls well short of what is needed. This article will explain some of the challenges with current methods used and outline potential solutions.

Overloading the operator in critical response situations

Video Management Systems (VMS) offer powerful functionality for general viewing purposes and systematic archiving of video data. However, when responding to a real-time crisis, users are typically forced to rely on site maps, their ability to recall camera routes, or to urgently scan across video walls to help locate appropriate camera views. This can be manageable when tenured security operators are available who are intimately familiar with the building and camera locations – provided that the subject follows predictable paths through the facility.

Problems are compounded when experienced security operators are not available. Security positions are notorious for high rates of turnover, resulting in staff with limited site familiarity and lack of confidence in the video system and camera network configurations. These are all factors that increase the risk when expecting an operator to be highly skilled and able to respond quickly in a critical response situation, i.e. when a security breach has occurred or a critical incident is in progress. In such situations, law enforcement officials and incident response staff have to rely on the available security operators to navigate through the system. This does not allow for effective intervention when it’s needed in real-time.

The solution calls for an easy-to-use system that enables an operator to quickly understand where a target has been, where it is currently, and anticipates where a target is going. A system that lets the user seamlessly track the target without needing to know the site layout, or even have familiarity with the video system.

The solution calls for an easy-to-use
system that enables an operator to
quickly understand where a target has
been, where it is currently, and
anticipates where a target is going. A
system that lets the user seamlessly
track the target without needing to
know the site layout, or even have
familiarity with the video system

Drowning in surveillance data

Video surveillance has long proven to be a significant and valuable tool with broad-reaching capabilities. VMS systems do a great job of capturing video but increases in the number of cameras and storage capacity have created an abundance of video information that is difficult to manage. When an incident occurs, and there’s a need to search for forensic video, review teams are challenged to locate all the relevant video from the volume of video information available. Teams can be tied up for weeks searching for incident-related video, time that could be used for more important work.

Locating relevant video is like looking for a needle in a haystack. Since time is always of the essence, the solution must help find and identify all the relevant video quickly, and present it in a way that it can be easily understood. Providing a process for sharing information with law enforcement officials is another way technology can help speed up the process and allows for a clear picture of what occurred so law enforcement officials can make informed decisions.

Current video systems have a constraint on how many cameras a security operator can manage effectively. Technology innovations can multiply the effectiveness of an operator by simplifying the process, allowing them to manage more cameras, and reducing cost. Providing access and a clear view to law enforcement officials or incident response teams during such critical situations can mean the difference between mitigating a situation and allowing it to escalate.

Regardless of whether you are
tracking the path of a target in
a real-time critical response
situation, or searching through
forensic multi-camera video,
there is the need to maximise
efficiency through the use of
technology inorder to deliver on
the ultimate goal of protecting
people and property

Gaps in video coverage

VMS can be very effective for documenting camera locations and providing site maps that show camera views across enterprise businesses. They are a critical component in a successful video surveillance strategy; however, they often come up short in regards to evaluating camera coverage of the site. Often organisations don’t even know that a gap exists until after an incident occurs and there’s a critical piece of video missing.

The solution calls for robust and intelligent technology that seamlessly connects all the cameras across a video system and identifies any gaps proactively. Regardless of the situation, when an event is triggered, whether by an access control breach, an alarm event, by identification by an operator or video analytics identifying suspicious activity, the system must be able to fully capture the sequence of events. This is crucial in both real-time situations and forensic situations, as even a small gap in coverage may be problematic.

A call to action

The security industry has undergone a major shift from analogue to digital technology solutions. Manufacturers have been reimagining their product lines to help companies transition in a cost-effective and intelligent way. With technology advances and lower video component cost, there is a need now to look at getting the most return on investment of your video system. Regardless of whether you are tracking the path of a target in a real-time critical response situation, or searching through forensic multi-camera video, there is the need to maximise efficiency through the use of technology in order to deliver on the ultimate goal of protecting people and property.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Video analytics
  • Building security
  • Crime prevention
  • Video Management System
  • Related links
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Articles by Darren Nicholson
  • Related categories
  • CCTV cameras
  • CCTV observation systems & accessories
  • CCTV software
  • IP cameras
  • Video servers (IP transmission)
  • IP Dome cameras
  • Dome cameras
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
2026 Trends in retail security: Interface Systems insights

2026 Trends in retail security: Interface Systems insights

Why open matters in the age of AI

Why open matters in the age of AI

Verkada: AI-driven security revolution & $5.8B valuation

Verkada: AI-driven security revolution & $5.8B valuation

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Expert commentary
About this page

Optimise video data management; boost security operations with smart storage solutions, advanced analytics and artificial intelligence.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec