Simon: Why You Should Consider Video Verification for More than Intrusion Detection

Mike Simon, managing partner of Connected Technologies, explains other ways video verification offers value to companies.

Video verification has become a powerful tool in the arsenal to prevent false alarms and fortify security at the protected premises. For physical security, it bolsters traditional intrusion detection applications by adding visual identification to the equation. Now, there are new ways to deploy the technology that further enhances its value.

Adding value beyond intrusion events
For systems integrators and their customers, video can do more than verify intrusion. Video verification links alarm, access control or other events to cameras. It provides business and operational information that enhances productivity and operations. It’s flexible and comes in different ‘flavors’ or levels of use which can be custom-tailored to the end user and their facility. And cloud-hosted platforms that manage video verification continue to yield new ways to leverage surveillance for activities that range from safety to daily business processes and procedures.

RELATED: Honeywell Introduces the 7847i-E IP Enterprise Communicator

Cloud-hosted security management platforms enable video snapshots from multiple customers and multiple locations to be located in one database where it’s easier for the end user, integrator or responding authorities to assess and manage activity. It’s simple to access and find out who’s been coming into a facility — or saying they’ve come in when it’s actually been a different person at the location. Users can type in the name of a person and view video snapshots and activity of that person every time they entered or left the business or office — allowing management to keep tabs on workers and any ‘exceptions’ that may have occurred, such as internal theft.

Users can also receive text messages automatically when video verifies that a particular user is coming into the building. Or perhaps that person went into the supply or the tool room and borrowed someone else’s access control credentials to gain entrance. In this case, management would have visual identification that another employee was using someone else’s card to gain entrance.

RELATED: SSI Takes Tour of Arecont Vision’s Headquarters (Slideshow)

It’s simple to access and find out who’s been coming into a facility — or saying they’ve come in when it’s actually been a different person at the location. Users can type in the name of a person and view video snapshots and activity of that person every time they entered or left the business or office — allowing management to keep tabs on workers and any ‘exceptions’ that may have occurred, such as internal theft.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Get Our Newsletters