Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Columns

Incorporating Mobile Surveillance Options

By Keven Marier
January 2, 2013

The two-way Motorola radio has been the cornerstone of real-time communications for the emergency response and security industry for nearly a century, and is soon to be complemented by smartphone technology. However, the smartphone isn’t going to be used for real-time voice, but will instead be a “must have” device for surveillance operations. This is because the device can act as eyes in the field; capturing real-time video and bringing situational awareness and immediate evidence collection capabilities to the next level. Emergency and security personnel represent a significant portion of the monthly operational budget for these industries. The smartphone can improve the operational efficiency and response capability of these personnel, which will drive increased investments at a time when some security operations are facing budget cuts. 

These increased “manned” security investments will be seen beginning this year within the mobile surveillance industry. Mobile devices will also be the fastest growing platform for client applications within the physical security industry. However, smartphones and other mobile devices will be used for more than simply viewing video.  They will also serve as management clients and mobile HD video surveillance cameras, using a feature called “video push.” This combination of viewing video, systems management and a powerful HD surveillance camera, all running on platforms from either Apple or Google, will drive networked surveillance industry adoption. Now, for the first time in our industry, security officers will be active mobile components of the surveillance system, instead of passive or reactive operators. 

 

Video Push

Mobile surveillance operations have seen great success with expensive vehicle-based surveillance systems and, in some cities, portable surveillance systems equipped with power supplies, lights and telescoping poles. These mobile units are typically restricted to outdoor environments and frequently offline for extended periods of time. However, now anyone with a smartphone and a video push-enabled application can become a mobile surveillance system. Because people carry these hand-held devices, they can be used in almost any situation, indoors and outdoors, and can instantaneously feed live video between security personnel and a security operations center. The implications of this technology on security operations are potentially revolutionary. No longer do your surveillance cameras have to be in position to capture an event, instead trained security personnel equipped with video push-enabled smartphones go out to meet, record and respond to events in real-time.

 

Point, Press and Record

The enabling component of the video push feature is the HD video camera included in smartphones, which can be attached through the network to a surveillance video recording server or NVR. This feature works just as though you were recording a video clip on your smartphone, except the recording is initiated by the mobile surveillance system application, or “app,” running on your smartphone. You download and install the application from the Apple App Store or Google Android Marketplace. The integration to your smartphone’s video camera allows for a familiar set of configurations controlling the FPS, image quality and other camera parameters. Video push networking can be supported by 3G, 4G or Wi-Fi network connections, and is licensed in the VMS or NVR as a typical network camera device.

 

Remote Systems Management

Surveillance management and administration operations have long been tasks performed while sitting at a desk. Now controlling PTZ’s, triggering device I/O’s and enabling or disabling system events can all be done from a smartphone connected to the network.  These capabilities decentralize command and control functions for immediate security system responses informed and executed directly from the scene of an incident. With the proper training, mobile security personnel become field-based system operators who can more effectively gauge the necessary surveillance system response, such as locking doors, turning on lights or sounding alarms.

 

1+1=3

Mobile viewing clients with video push features are force multipliers, which will immediately benefit all security operations. 2013 is the year when all of the enabling technologies come together for the first time in our industry with smart phones, 4G networks, easy-to-use applications and advanced surveillance functionality.  With these benefits enabled in large part from the continued advancement of networked surveillance systems, “convergence” will enter the mainstream because of these measurable and low-risk operational benefits.   

This article was previously published in the print magazine as "Surveillance Options on the Go."

KEYWORDS: mobile surveillance security officer smartphone security smartphone surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Implement Advanced Surveillance Training Policies

    See More
  • How to Manage Surveillance Over the Private Cloud

    See More
  • Studying the Pros and Cons of Proprietary Wireless Surveillance

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • December 12, 2011

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we'll update you on what is out there for camera viewing software along with our reviews. We'll also look at the Axis Product Selector tool and several other applications that are available today.
  • February 3, 2012

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we’ll update you on what is out there for camera viewing software along with our reviews. We’ll also look at the Axis Product Selector tool and several other applications that are available today.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing