Realizing Remote Video’s Revenue Possibilities

Remote services such as video guard tours and verification appeal to end users, and have the potential to be very lucrative for integrators. Find out what’s involved to succeed in this growing marketplace from technology, sales and marketing, and operational standpoints.

[IMAGE]12162[/IMAGE]Key cost considerations for video verification applications:

  • Upfront — the upfront costs to the end user are minimal. Some customers can use a video system they already have in place, and may only require an Internet or cellular connection to transmit the video.
  • Recurring — the recurring monthly costs to the end user are generally $25-$40/site, depending upon activity levels, and an extra $10-$15/site for cellular transmission if that is added.

Keys to Remote Video Guarding

Remote video guarding is a much more substantial way of leveraging a monitoring center, and offers end users the following opportunities:

  • Event-based monitoring — monitoring of alarm events in real-time, using live video, and triggered by a vast array of devices:

Ø  Any intrusion-panel device

Ø  Access control alarms

Ø  Panic buttons or push-to-talk audio devices

Ø  Video analytics can be used to detect the following:

§   People or vehicle detection in a region of interest

§   Tripwire and/or direction of travel

§   Loitering

§   And some more sophisticated systems offer: object left behind, or object removed; facial recognition for search and retrieval

  • Guard tours — video patrols can be conducted on a predetermined schedule or on an as-needed basis. Monitoring centers will look for activity in areas that cannot be detected by technology, or in areas where a frequent amount of regular activity would cause a vast number of false alarms. Guard tours are commonly used for the following applications:

Ø  Detecting unwanted behavior that cannot be filtered by video intelligence; for example, skateboarders in a private parking lot that may increase the end user’s liability for injuries or
false claims.

Ø  Detecting vulnerabilities to the site; for example, looking for exterior doors left open when no door contact or access control system is in place.

Ø  Voice-down announcements informing people onsite that tours are in process.

  • Video chaperones — video chaperones can be conducted to virtually escort individuals from one area to another, verifying the site is all clear in advance, and conducting voice-down announcements after the individual arrives safely. In the event of a mugging or abduction, the monitoring center would be able to dispatch authorities immediately, as compared to family members having to wait a minimum of 24 hours to submit a missing persons report.
  • Remote doorman services — monitoring centers can remotely verify a person or vehicle’s identity prior to permitting access to a facility. They can then remotely release a door or a gate to manage the ingress.

Key operational considerations for remote video guarding applications:

  • Bandwidth consumption — pushing video through the cloud require a significant amount of bandwidth onsite. Generally, 1MB upload speed is recommended.
  • Monitoring center qualifications — the integration and management of different systems requires a higher degree of education for monitoring center operators. From troubleshooting connection through the network, to proper handling of the aforementioned services, these are areas that traditional central stations are not equipped to support. The business model is very different in remote guarding as compared to video verification, as the operators tend to be higher-paid individuals, the number of accounts per operator is much lower, and the overall management of the monitoring center’s operations requires a completely different revenue and expense model. Additionally, the infrastructure and setup of the monitoring center needs to support a very high amount of bandwidth, redundancy, backup generators, etc.
  • Communicating with end users — it is essential to communicate thoroughly between all parties in regard to how these services will be applied. The end user’s expectations need to be known and addressed by the integrator, consultant and monitoring center to ensure the system can support the services needed, and that the monitoring center has all the proper procedures and protocols in place.

    If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Get Our Newsletters