Benefits of video alarm verification

July 2015 Perimeter Security, Alarms & Intruder Detection, Surveillance

If you haven’t already observed, the alarm industry is in the midst of a major transition, driven by the steam-rolling force of affordable IP video cameras and broadband Internet technology offering new dimensions in this conservative industry.

Video verification has grown in popularity due in part to false alarm reduction efforts. However, video verification provides benefits well beyond reducing false alarms. A wide range of stakeholders now benefit from video alarm verification, including home and business owners, law enforcement agencies, monitoring stations and insurance companies.

Benefits of video alarm verification

False alarms account for approximately 90% of all alarm events. Monitoring stations and law enforcement officials spend a significant amount of time and resources responding to such events. Some countries such as the UK, Spain and Chile have regulations in effect that make alarm verification mandatory to generate police response.

Historically, it has been cost prohibitive to employ video verification as it required expensive video equipment and tedious integration. Furthermore, when monitoring station operators viewed live video of the premises, the activity being viewed did not coincide with the alarm event.

Today’s technology allows video clips and snapshots associated with an incoming alarm event to be sent to the monitoring stations, and if requested, simultaneously to the smartphone of the home or business owner. This process allows the monitoring station operator to visually verify the alarm event and determine who or what caused it – before making the decision to dispatch the police.

The result is improved police or armed guarding response delivering more efficient security. With video alarm verification, law enforcement can deploy resources more effectively, increase apprehension rate and achieve better situational awareness and safety for first responders.

Video verification is now the most popular additional option on alarm systems, a fundamental change within the alarm business. Alarm business recurring monthly revenue (RMR) is based on alarm system monitoring, and video verification is the natural progression as it becomes more affordable. Adding video verification is an upgrade like interactive services, additional security devices, or maintenance. It is also clearly an opportunity to add RMR to new and existing accounts.

Taking responsibility end to end

Risco Group has recognised that a superior and robust video verification solution can only be achieved by making sure that the hardware, software, and peripheral devices are tightly controlled and knitted together. The Risco ecosystem – a Risco intrusion alarm system with Risco IP cameras connected and controlled by Risco Cloud and the iRisco smartphone app – allows superior customer experience, simpler installation, and smoother syncing of video and alarm events.

An example of the superior customer experience enabled by Risco’s end-to-end responsibility for the solution is the video and image flow in event of an alarm:

• Even though Risco IP cameras record a full HD video clip of pre and post-alarm footage, the images initially displayed to the monitoring station operator upon alarm are extracted images of the alarm event from this video clip. These images allow monitoring station operators to make a quick decision if an intruder is present with a single glance at their screen, without reviewing and searching through a 20-30 second video clip in order to decide if an event is a crime in progress.

• The full HD video clip is of course seamlessly available for deeper analysis at any time by double clicking any extracted image of the event.

• Full HD video look-in to the Risco IP cameras on premises is also seamlessly accessible to authorised personnel immediately following an alarm event.

Two-way audio using the IP camera provides an additional dimension of verification and remote management.

In conclusion, video verification of alarms is moving into the mainstream at an accelerated pace. Monitoring stations would be well advised to embrace video verification due to the added RMR it offers and due to the benefits for all stakeholders; home and business owners, law enforcement agencies and insurance companies. Those that opt out will in all probability be left behind by the competition. Selecting the right video verification partner, one that offers a robust and affordable end-to-end solution and the experience to assist in all implementation steps, is critical to the commercial success of video verification in the monitoring station.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Hadeda-proof sensor technologies
Reditron Perimeter Security, Alarms & Intruder Detection
SMART Security Solutions highlights Takex, represented locally by Reditron, speaking to Gordon Moore, Reditron’s National Sales Director, and Mark Crichton, Takex Channel Manager for South Africa.

Read more...
What not to do: Key ‘don’ts’ in perimeter security systems
Fang Fences & Guards Perimeter Security, Alarms & Intruder Detection
Many people know what to do when securing a perimeter; in this article, Johan van Wyk highlights the important ‘don’ts’ to consider when implementing a turnkey perimeter security solution.

Read more...