SlideShare a Scribd company logo
1 of 17
Download to read offline
A “Game Changer” for
Your Campus
This is an excerpt from the UNLOCKED podcast, a series from ASSA ABLOY about
campus physical security. Listen to the whole episode and learn about video
surveillance for your campus at www.intelligentopenings.com/unlocked
Analytics, Budgeting, and IT
Considerations of Campus Video
Surveillance
“When we have an incident that occurs and we’ve
gotten really good useable photographic evidence
and we are looking to identify people—those shots go
to the news…10 minutes later the phone rings and
someone is telling us who it is that we are looking for.
I’d say our upgrades to our video surveillance system
have been a game changer.”
UNLOCKED
– Chief John Venuti, Virginia Commonwealth University
9 out of 10 colleges use video surveillance.
UNLOCKED
But most are legacy, analog systems.
UNLOCKED
UNLOCKED
Traditionally, campuses used camera systems as a tool
to verify if an alarm is real or to document an incident.
However, this is really only useful after the fact — as a
reactive tool.
But now that video has migrated from the
analog world into the digital world, cameras are
much smarter.
UNLOCKED
“They are able to deploy analytics that can alert
operators to potentially stop or proactively
mitigate a risk as it’s unfolding. These analytics
involve not only video, but can do some fascinating
things with audio, too.”
– James Marcella, Axis Communications
UNLOCKED
Audio threshold level detection
Audio pattern recognition
Two-way dialogue
Motion detection
Camera tamper alarm
Object left behind
People counting
Analytics like…
UNLOCKED
Video surveillance can act as a force multiplier and
increase the effectiveness of your security department.
Taking advantage of the analytics newer cameras offer
expand not just your ability to figure out what
happened after the fact, but can provide a proactive
level of risk mitigation.
Things to consider before spending all your $$$ on
new cameras…
UNLOCKED
UNLOCKED
New video systems run on an IP-based
network backbone.
An IP camera can easily take up a lot of
bandwidth if you’re running high frame
rate, high-resolution images.
UNLOCKED
In fact, bandwidth and storage are the most costly
aspects of video surveillance.
UNLOCKED
When starting a new security project, it’s imperative
that security and IT work together.
UNLOCKED
“Security should research solutions that will fit
their needs. But they must also ensure that IT
can understand those needs… and its impact on
the network.”
– Duane Richendollar, Stanley Security
UNLOCKED
It’s not enough to simply install cameras and hope for
the best.
Each camera placement should be purposeful.
Understand why you have a camera there and make
sure you deploy the right technology for the
environmental requirements of that scene.
Then make sure you can hold intelligent and
beneficial conversations between your security and
IT departments.
UNLOCKED
“So often I have seen IT just chew up the security team
because they didn’t understand the IT terminology.
They walk away very frustrated because they feel they
did the right thing by including IT upfront. 
With the right people working together there is
always a solution that will work for both.”
– Duane Richendollar, Stanley Security
UNLOCKED
In the end, seek out knowledgeable experts.
Consult and work with people with knowledge
and experience of physical surveillance.
Don’t go into your next campus physical security
project uninformed. Listen to the UNLOCKED
podcast at www.intelligentopenings.com/unlocked
UNLOCKED

More Related Content

Similar to Unlocked Episode 3: Unlocking Video Surveillance

10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Ip security systems
Ip security systems Ip security systems
Ip security systems sysvideo
 
My documentation
My documentationMy documentation
My documentationcas123
 
My documentation
My documentationMy documentation
My documentationcas123
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
The Diffusion of IP Video Surveillance
The Diffusion of IP Video SurveillanceThe Diffusion of IP Video Surveillance
The Diffusion of IP Video SurveillanceChris Sandström
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...APNIC
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...APNIC
 
CCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible ProtectorsCCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible ProtectorsMagnumSecurity1
 
How deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastinHow deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastinShadekulIslamShovo
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
RC Presentation MSPCE
RC Presentation MSPCERC Presentation MSPCE
RC Presentation MSPCERick Cox
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 

Similar to Unlocked Episode 3: Unlocking Video Surveillance (20)

Trends final
Trends   finalTrends   final
Trends final
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Ip security systems
Ip security systems Ip security systems
Ip security systems
 
My documentation
My documentationMy documentation
My documentation
 
My documentation
My documentationMy documentation
My documentation
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
The Diffusion of IP Video Surveillance
The Diffusion of IP Video SurveillanceThe Diffusion of IP Video Surveillance
The Diffusion of IP Video Surveillance
 
SEM415_34safe
SEM415_34safeSEM415_34safe
SEM415_34safe
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
 
CCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible ProtectorsCCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible Protectors
 
How deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastinHow deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastin
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
RC Presentation MSPCE
RC Presentation MSPCERC Presentation MSPCE
RC Presentation MSPCE
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Unlocked Episode 3: Unlocking Video Surveillance

  • 1. A “Game Changer” for Your Campus This is an excerpt from the UNLOCKED podcast, a series from ASSA ABLOY about campus physical security. Listen to the whole episode and learn about video surveillance for your campus at www.intelligentopenings.com/unlocked Analytics, Budgeting, and IT Considerations of Campus Video Surveillance
  • 2. “When we have an incident that occurs and we’ve gotten really good useable photographic evidence and we are looking to identify people—those shots go to the news…10 minutes later the phone rings and someone is telling us who it is that we are looking for. I’d say our upgrades to our video surveillance system have been a game changer.” UNLOCKED – Chief John Venuti, Virginia Commonwealth University
  • 3. 9 out of 10 colleges use video surveillance. UNLOCKED
  • 4. But most are legacy, analog systems. UNLOCKED
  • 5. UNLOCKED Traditionally, campuses used camera systems as a tool to verify if an alarm is real or to document an incident. However, this is really only useful after the fact — as a reactive tool. But now that video has migrated from the analog world into the digital world, cameras are much smarter.
  • 6. UNLOCKED “They are able to deploy analytics that can alert operators to potentially stop or proactively mitigate a risk as it’s unfolding. These analytics involve not only video, but can do some fascinating things with audio, too.” – James Marcella, Axis Communications
  • 7. UNLOCKED Audio threshold level detection Audio pattern recognition Two-way dialogue Motion detection Camera tamper alarm Object left behind People counting Analytics like…
  • 8. UNLOCKED Video surveillance can act as a force multiplier and increase the effectiveness of your security department. Taking advantage of the analytics newer cameras offer expand not just your ability to figure out what happened after the fact, but can provide a proactive level of risk mitigation.
  • 9. Things to consider before spending all your $$$ on new cameras… UNLOCKED
  • 10. UNLOCKED New video systems run on an IP-based network backbone. An IP camera can easily take up a lot of bandwidth if you’re running high frame rate, high-resolution images.
  • 11. UNLOCKED In fact, bandwidth and storage are the most costly aspects of video surveillance.
  • 12. UNLOCKED When starting a new security project, it’s imperative that security and IT work together.
  • 13. UNLOCKED “Security should research solutions that will fit their needs. But they must also ensure that IT can understand those needs… and its impact on the network.” – Duane Richendollar, Stanley Security
  • 14. UNLOCKED It’s not enough to simply install cameras and hope for the best. Each camera placement should be purposeful. Understand why you have a camera there and make sure you deploy the right technology for the environmental requirements of that scene. Then make sure you can hold intelligent and beneficial conversations between your security and IT departments.
  • 15. UNLOCKED “So often I have seen IT just chew up the security team because they didn’t understand the IT terminology. They walk away very frustrated because they feel they did the right thing by including IT upfront.  With the right people working together there is always a solution that will work for both.” – Duane Richendollar, Stanley Security
  • 16. UNLOCKED In the end, seek out knowledgeable experts. Consult and work with people with knowledge and experience of physical surveillance.
  • 17. Don’t go into your next campus physical security project uninformed. Listen to the UNLOCKED podcast at www.intelligentopenings.com/unlocked UNLOCKED