Off-site monitoring

CCTV Handbook 2008 Surveillance

Approximately 15 years ago the concept of off-site monitoring entered the global security industry and the idea of remotely monitoring video was introduced into South Africa almost 12 years ago.

The products manufactured to produce video transmission over networks and telecoms infrastructure had to develop specific algorithms that would provide usable video over low bandwidths, especially due to the network infrastructure that was available way back then.

Worldwide, there have been dramatic improvements of broader bandwidths that enable the increase of products being manufactured to transmit video and hence in today's world there are numerous products that offer remote connectivity to video digital recorders to view 'so called' live footage.

However, there are only a handful of product specifically designed and manufactured for remote video transmission purposes only, and with proven capability and longevity in the marketplace to lay claim that their products are proven to work over any type of transmission medium, including in emerging markets where bandwidth is limited and costly.

South Africa is currently benefiting with the advent of both broadband terrestrial and aerial networks, however cost of bandwidth still remains a limiting factor, hence a security solution to transmit video as and when required should not be bandwidth-hungry and ultimately become too expensive as a viable solution. The products manufactured many years ago to work over low bandwidths have proven algorithms to work on a variety of networks giving usable video to central monitoring stations at manageable costs without compromising on quality and security.

The right solution

Just about any digital video recorder claims on its specification to have remote access capability via LAN/WAN, ADSL, ISDN, GSM and PSTN. However, when considering remotely monitored sites that are purely monitored by an off-site control room, using products like these more often than not do not meet the requirements to do the job adequately and ultimately to protect sites and, more importantly, are not reliable enough to actually work when required to do so.

The purpose of having a remote central monitoring station monitoring a secure site is initially there to either support onsite manpower (security officers) or to displace unnecessary manpower. The purpose of central stations is to monitor as many sites as possible, this being necessary to offset start up-cost and maintaining effective personnel and infrastructure. It then stands to reason that the likelihood that when the non-purpose built digital video recorders are being used for video transmission will not augment the operations in the central monitoring station and the potential exists that both sites and central monitoring station will ultimately become a 'white elephant' ie, the equipment not correctly specified and the software in the control room not built-for-purpose for off-site monitoring.

One cannot expect an officer in a control room to remotely dial in and conduct routine patrols as a solution for loss prevention, or, that when an alarm occurs, that only then the operator connects to site to visually inspect the scene after the event.

All purpose-built remote transmission products are designed to transmit information (video) as an event-based scenario, as an example: all alarm systems transmit data to a control room and the operator interprets whether there is a security breach or not and then dispatched response officers. With realtime video, the event is presented to a live body who can distinguish by the critical information presented to him whether a genuine breach of security is taking place or not, and it is imperative to say that the operator should be able to warn the intruder/s off by sounding an audio warning, as if he was on site witnessing the security breach.

Video transmission products should have multiple inputs and outputs that can facilitate the event-driven video switch to trigger alarms, video feed to the central station and to automatically, or operator driven, activate lights and/or gates etc.

In addition, most of the high-end remote transmission products have additional features on board to enhance effective security controls on site, such as onboard video analytics by creating smarter detection and decision making via the video source, including the on site integration to intrusion and access control systems.

In the offering

Various companies offer electronic security solutions, many have extensive experience in providing CCTV and integrated solutions, there are, however, only a few who can offer the complete package of product, system design, installation and monitoring facility in off-site monitoring. The service provider should be accredited and trained by the product manufacturer or authorised representative and distributor, and the system installation should be correctly designed to meet off-site monitoring standards and requirements.

Although there are no standards set for off-site monitoring in South Africa there are a few we can borrow from international standards that aptly fit our environment. It is mainly in the design and application of off-site monitoring facilities that sets it apart from normal on-site monitored applications. Sometimes both solutions need to be provided to provide effective electronic security surveillance, where certain realtime video monitoring is done by local operators and video alarm verification is done remotely, providing the third tier in the security chain. As a simple example when it comes to off-site monitoring; the remote control room operator may not necessarily wish to identify the intruder but rather identify that there is an intruder on-site. There are two different designs for both these applications.

The way forward

South Africa is becoming increasingly aware that off-site monitoring is part of the security industry's way forward, there are already many sites being protected by off-site central monitoring stations, however the industry is only scraping the surface when we realise how many sites are still being protected by traditional security methods.

As crime increases and threats become real the concept of an additional layer of security is no longer unreachable. This is the niche where off-site video alarm verification fits in, giving realtime support in situations of duress and loss prevention via fit-for-purpose early detection and warning and providing peace-of-mind by allowing owners and managers of site to view and retrieve evidence remotely. Gone are the days where key holders are called out to site so that premises can be inspected in the middle of the night.

For more information contact Honeywell Security, +27 (0)11 695 8016, www.honeywellsecurity.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.