19
SECURITY GUIDE A Guide to Remote Video Monitoring

SECURITY GUIDE A Guide to Remote Video Monitoring

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECURITY GUIDE A Guide to Remote Video Monitoring

SECURITY GUIDE

A Guide to Remote Video Monitoring

Page 2: SECURITY GUIDE A Guide to Remote Video Monitoring

2Copyright © Verkada Inc. All rights [email protected]

Foreword: A Shift to Secure Remote Access 3

Why is Remote Video Monitoring Important? 4 Visibility Emergency Response Efficiency

Getting Started with Remote Video Monitoring 6 Choosing Your Camera System Installing Your Camera System Evaluating Software for Secure Remote Access

Moving from Reactive to Proactive Security 14 Get System Health Alerts Get Notified of Meaningful Activity Get Real-Time Incident Data Get Automatic Security Updates

About Verkada 16 Enterprise-Grade Cameras Future-Proof Technology (Command)

Table of Contents

Page 3: SECURITY GUIDE A Guide to Remote Video Monitoring

FOREWORD: A SHIFT TO SECURE REMOTE ACCESS

Over the last decade, there has been a shift towards mobility, together with cloud computing and remote services. In turn, the expansion of secure remote access has altered the way we utilize surveillance to support risk management and day-to-day operations. This ebook will outline key criteria and actionable insights to help you select a remote camera system that provides the most value over time.

You will discover:

• The four main types of enterprise camera systems, including trade-offs, hidden costs of installation, maintenance considerations, and common bottlenecks

• What to look for in remote video management software to ensure ease of use, proactive risk management, and data security

• Outlook on future-proof technology to ensure the longevity of your system

Equipped with the knowledge of what effective remote monitoring technology should encompass, you will be able to identify a solution that will last and scale with your organization.

Page 4: SECURITY GUIDE A Guide to Remote Video Monitoring

4Copyright © Verkada Inc. All rights [email protected]

If you are looking for a remote monitoring solution but are not sure where to begin, you have arrived at the right place. Whether you manage one site or many, a reliable security system is critical to any rapid response or operational strategy. The right solution can provide a high quality video of events to understand the past, monitor the present—and perhaps most powerfully—safeguard and optimize the future.

With a future-proof remote surveillance system, you will have an influential tool that provides a number of benefits to your organization. These include:

01

VisibilityRemote monitoring provides visibility to ensure peace of mind. This gives you the advantage of always knowing what goes on, even when you are physically elsewhere. The use cases for enhanced visibility are wide-ranging—from afterhours security to employee safety. No matter where you are and what industry you are in, the right solution will provide you with the tools to keep people, property, and assets safe.

Why is Remote Video Monitoring Important?

10 Ways Remote Surveillance Enhances Visibility

• Provide 24-Hour Active Monitoring

• Mitigate Risks and Workplace Hazards

• Oversee Entrances, Exits, and Blind Spots

• Ensure Safe Delivery of Shipments

• Safeguard Inventory and Assets

• Gain Enhanced View of Sitewide Activities

• Monitor Day-to-Day Operations

• Provide Stakeholders with Peace of Mind

• Monitor Public Gatherings & Events

• Detect Suspicious Activity

Page 5: SECURITY GUIDE A Guide to Remote Video Monitoring

5Copyright © Verkada Inc. All rights [email protected]

03

EfficiencyOrganizations across all industries have used remote monitoring in creative ways to enhance efficiency. From providing actionable insights to reducing the cost of physical security overhead, remote video surveillance is used to streamline processes and communication across a range of business operations. The right video security system should be able to scale limitlessly and help your organization run more effectively, requiring less time and resources to achieve the same outcome.

With these benefits in mind, the next step is to identify what specific components of a remote monitoring system to look for.

10 Ways Remote Surveillance Enhances Emergency Response

10 Ways Remote Surveillance Improves Efficiency

• Detect Intrusions and Threats in Real-Time

• Gain Valuable Context into Ongoing Incidents

• Quickly Relay Information to First Responders

• See Exactly Where Threats are Located

• Know Whether a Perpetrator is Armed

• Reduce Cost of Overhead for After-Hours Security

• Streamline Inventory Management

• Audit Equipment Health

• Manage and Resolve Conflicts Quickly and Objectively

• Identify Best Practices to Enhance Operations

• Proactively Detect Threats to Aid Preparedness

• Simplify Incident Investigation

• Resolve Liability Claims with Objective Video Evidence

• Assist in Investigation and Prosecution

• Map and Intercept Potential Threats

• Support Employee Training Programs

• Optimize Loss Prevention Efforts

• Identify Gaps in Service and Efficiency

• Improve Employee Productivity

• Mitigate Risks and Workplace Hazards

02

Emergency Response With remote monitoring, teams are able to improve their ability to respond to emergency situations. Video security is a valuable asset for gaining immediate context into an incident as it unfolds. Knowing whether a perpetrator is armed or where a fire is located is critical information that plays a key role in the outcome of an incident. With the right context, you will be able to make faster, more effective decisions to decrease response time and ensure minimal damage occurs.

Page 6: SECURITY GUIDE A Guide to Remote Video Monitoring

6Copyright © Verkada Inc. All rights [email protected]

When selecting a remote monitoring solution, it is important to understand the trade-offs that come with each system. With a clear understanding of potential limitations, you can anticipate and plan for blockers to facilitate a smooth deployment. Outside of installation, bottlenecks may continue all the way to the end user, as implementing the wrong system may result in a poor user experience and require additional IT resources to use, access, and operate. To avoid operational inefficiencies and help you make an informed decision, we have outlined three critical considerations that come with each: camera system selection, installation requirements, and software for remote monitoring.

01

Choosing Your Camera SystemWhen it comes to choosing a security camera system, there are four main types to consider: DVR, NVR, cloud, and hybrid cloud systems. The high-level distinction between these systems is how they manage video storage, which affects accessibility for remote viewing and management.

Digital Video Recorder (DVR) System

Best For: Organizations that prohibit internet-connected cameras

ANALOG C AM ER A S

SWITCH

DVR

ROUTER / H U B/ SERVERS

LOC AL PC

MON ITORI NTERN ET

FI RE WALL /OPEN PORTS

DE VICES

Getting Started With Remote Video Monitoring

Page 7: SECURITY GUIDE A Guide to Remote Video Monitoring

7Copyright © Verkada Inc. All rights [email protected]

A DVR is a recording device that converts signals from analog cameras into a viewable digital format that can be stored on a hard drive. Similar to the NVR, they come with high costs to repair and maintain, and have limits when it comes to scalability and adding cameras.

To open up remote access, port-forwarding or opening a hole in the firewall is required — a well-documented target for malicious actors. This is important to note, because without port-forwarding or firewall configuration, DVR systems are limited to on-premise storage and you need to be wherever the storage device is located to access the footage.

NVRs integrate with internet protocol (IP) cameras that encode and process footage before sending it to the recorder for viewing and storage. They can be a cost-effective option for small to mid-sized businesses with a single location, but maintaining NVRs in multiple locations is known to be time-consuming and laborious. They often require:

• Manual updates that require onsite, technical configurations

• Costly ongoing maintenance for its many hardware components

• Complex configurations, such as port forwarding for remote access, opening up the door to cybersecurity risks

It is also important to note that if cameras need to be added or relocated, there are a limited number of ports available per recorder, which limits scalability.

I P C AM ER A S

SWITCH

NVR

ROUTER / H U B/ SERVERS

LOC AL PC

MON ITORI NTERN ET

FI RE WALL /OPEN PORTS

DE VICES

Digital Video Recorder (DVR) System

Best For: Small businesses with one location

Page 8: SECURITY GUIDE A Guide to Remote Video Monitoring

8Copyright © Verkada Inc. All rights [email protected]

Cloud System

Hybrid Cloud Systems

C AM ER A S WITH BU I LT- I N STOR AG E

I NTERN ET CON N ECTIV IT Y & CLOU D STOR AG E

ACCESS I B LE ON ANY B ROWSER OR DE VICES

CLOU D C AM ER A CLOU D MANAG EM ENT ACCESS ON ANY DE VICE

Cloud systems store and retain recordings in remote servers, allowing footage to be accessed virtually anywhere with an internet connection. They can be an efficient option for organizations that offer turnkey projects where temporary surveillance is needed and minimal configuration is required. Quick to deploy, cloud systems usually have minimal hardware requirements—usually just a camera, internet connection, and internet-connected device such as a phone, tablet, or computer. To access and view recordings, you typically just have to sign into the cloud software platform where video is managed.

However, the trade-off to the convenience of internet connectivity is its impact on network bandwidth. With no local storage, cloud-based cameras stream 100% of recorded footage to the cloud, which results in high bandwidth usage. At scale, this can have a significant impact on your networking costs, as well as the performance of other devices on your network. Storing footage in remote cloud servers is also an ongoing expense that adds up over time, and costly upgrades are required to expand retention in order to meet compliance standards in certain industries.

Hybrid cloud systems are market disruptors that have recently entered the surveillance ecosystem, but are quickly becoming the new standard. They were first embraced by schools, retail stores, hospitals, manufacturers, and organizations with large or distributed campuses, but are now used widely across all industries—even highly-regulated sectors requiring compliance with PCI, HIPAA, or other governmental statutes.

Best For: Individual sites with high-bandwidth internet requiring 1-2 cameras

Best For: Enterprises, large-scale deployments, or organizations requiring multi-site support

Page 9: SECURITY GUIDE A Guide to Remote Video Monitoring

9Copyright © Verkada Inc. All rights [email protected]

Hybrid cloud systems typically consist of onboard storage for retaining footage locally while also providing cloud-based access. By using this approach, they eliminate the single point of failure that plagues traditional systems, ensuring no gaps in coverage occur. Similar to cloud-based cameras, hybrid cloud systems have minimal hardware requirements and footage can be easily accessed from anywhere through web-based software.

Unlike cloud-based solutions, hybrid cloud cameras are able to reduce bandwidth impact by storing and maintaining all footage locally. With Verkada, many customers are able to reduce bandwidth consumption to just 5-20 kbps. The hybrid cloud architecture allows for thumbnails to be uploaded to the cloud, while video is stored on the camera itself. With this approach, it takes 100 hybrid cloud cameras to use the same amount of bandwidth as one pure cloud camera, making them a scalable solution for wide deployments.

02

Installing Your Camera System

Choosing a system may depend on how quickly you need to get your system up and running. Therefore, considering the time and effort required to install a system may be the first step in selecting the right system for your organization. Besides cost, installation is the biggest bottleneck to getting started with any security system—especially if setting up remote viewing is required.

To set realistic goals for stakeholders, make sure you have a thorough understanding of the timeline and network requirements, as well as the cost of overhead for installation equipment and labor. After installation is complete, any ongoing maintenance requirements also play an instrumental role in the ease of use, reliability, and ultimately longevity of your investment. By knowing the trade-offs and requirements, you will have what you need to facilitate a seamless deployment.

How Verkada Does It: Verkada cameras are capable of operating in “steady state”—they send a constant stream of encrypted metadata (including thumbnail images and analytics) to the cloud approximately once every 20 seconds using a bandwidth uplink of no more than 20 kbps per camera.

0Ban

dwid

th (k

bps)

250

500

750

12pm 1pm1am12am 2pm2am 3pm3am 4pm4am 5pm5am 6pm6am 7pm7am 8pm8am 9pm9am 10pm10am 11pm11am 12am

Time

Page 10: SECURITY GUIDE A Guide to Remote Video Monitoring

10Copyright © Verkada Inc. All rights [email protected]

Comparison of CCTV vs. Hybrid Cloud Camera Installation

Pros of CCTV Camera Systems Cons of a CCTV Camera Systems

A Traditional CCTV System with a DVR

Average Installation Time: 1 hour per camera

Number of Steps: 23

Hardware Components Needed: 9-16 (more depending on configurations needed for audio and remote monitoring)

Verkada’s Hybrid Cloud System

Average Installation Time: 10 minutes per camera

Number of Steps: 4

Hardware Components Needed: 3

DVR, Router/Hub/Servers, Power Adapter, Splitter, Camera, Video Extension Cables, Remote Control, Mouse, Onsite Monitor or Viewing Station

A CCTV camera system may be the right solution for you if…You manage one location and you only require local access to footage via viewing station or display monitor.

PoE switch or injector, Cloud-based camera, Mobile Device, Onsite/Offsite Monitor, or Viewing Station

Installing a CCTV Camera System: Pros, Cons and Considerations

Traditional DVR and NVR systems are known to have complicated installations due to the sheer amount of hardware required. These systems need servers, hard drives, and a laundry list of additional parts that make it difficult to scale. Implementing remote viewing adds another layer of complexity to deployment, as a firewall will have to be put in place before the footage could be seen on a desktop or mobile device.

Though local storage is often considered a “safe” way to keep footage, relying on a recorder introduces a single point of failure that is an even bigger concern than cloud systems. If the NVR or DVR breaks, you don’t just lose recordings for one camera, but every single camera dependent on that recorder. When hardware parts malfunction, gaps in coverage are likely to occur. A general rule of thumb—the more hardware there is to manage, the more likely the system is to fail or need servicing during its lifetime.

✓ Scalable Storage with Additional Servers

✓ Remote Access with Configurations

✓ Instant Onsite Access

✓ Cost-Effective Setup

х High Maintenance Costs

х Possible Signal Loss (Single Point of Failure)

х Storage Capacity

х Minimal Flexibility

Page 11: SECURITY GUIDE A Guide to Remote Video Monitoring

11Copyright © Verkada Inc. All rights [email protected]

Pros of Hybrid Cloud Camera Systems Cons of a Hybrid Cloud Camera Systems

A hybrid cloud camera system may be the right solution for you if…Your organization needs a flexible solution that scales effortlessly and requires remote access to footage across sites.

Installing a Hybrid Cloud Camera System: Pros, Cons and Considerations

With no onsite servers or additional hardware needed, hybrid cloud systems are relatively quick and easy to deploy. Many security vendors offer hybrid cloud camera systems that only require a PoE (power-over-Ethernet) connection to get started. Some solutions also streamline installation by preconfiguring cameras so they are ready out-of-the-box, eliminating the need to download additional software or manually assign IP addresses to each device.

Traditional security solutions, which depend on a consistent Internet connection or centralized recorders (i.e. NVR, DVR) for all cameras, are always at the risk of losing coverage. By removing the dependency on centralized recorders, hybrid cloud cameras are easier to install and scale across locations. With a distributed approach to storing video footage both locally on the camera and in the cloud, they ensure continuous recording and no gaps in surveillance footage. Because there is no single point of failure, they are widely regarded as a safe and reliable deployment.

Installing a Cloud Camera System: Pros, Cons and Considerations

Cloud camera systems are quick to deploy, and like hybrid cloud solutions, require minimal hardware components compared to traditional CCTV systems. Wireless solutions even eliminate the need for extensive cabling, however they can introduce numerous risks associated with performance. Installation may be as simple as connecting your camera to the network—via wire or wirelessly—but as soon as the internet experiences any downtime, camera systems are completely inoperable. If you experience internet drop-offs with your other connected devices, the same will hold true for your cloud-based cameras. By only storing footage in the cloud, the system creates a single point of failure. When a cloud camera drops offline as the result of a network outage or server issue, it has no safeguard in place to alternatively store footage. Oftentimes this results in footage for critical events being lost.

✓ Bandwidth Friendly

✓ Flexible and Easy to Install

✓ Reliable (No Single Point of Failure)

✓ Secure and Remote by Default

✓ Low Maintenance and Scalable

х Initial Cost of Deployment

Page 12: SECURITY GUIDE A Guide to Remote Video Monitoring

12Copyright © Verkada Inc. All rights [email protected]

Another caveat with cloud-based cameras is that they have to be powered by either Ethernet or an outlet. Some are supported by batteries, but these either depend on changing and charging batteries, or potentially unreliable devices like solar charges.

Pros of Cloud Camera Systems Cons of a Cloud Camera Systems

A cloud camera system may be the right solution for you if…Your organization is not heavily regulated, supports high bandwidth consumption, and has reliable network connectivity.

✓ Safeguarded Security Footage (SSO / 2FA)

✓ Data Retrieval

✓ Scalable

✓ Hardware Compatibility

х Unpredictable Gaps in Coverage

х High Cloud Storage Costs

х Learning Curve

х Video Retention Limitations

03

Evaluating Software for Secure Remote Access

Video management software (VMS) is central to the day-to-day application of remote security. A VMS provides a platform for users to control the recording, storing, and sharing of security footage. Certain features in a VMS can significantly improve the ease of remote management, response time, and data security. You want to look for solutions that give automatic remote access and security updates, make it easy to find and share footage quickly, authenticate and provision users, as well as protect data both at-rest and in-transit.

No-Configuration Remote Access Not all solutions make remote management easy. Traditional CCTV systems often require additional software downloads, port-forwarding, VPN servers, or other technical configurations to enable remote access. Consequently, users must jump through several hoops (including first logging in through a VPN) before they can view footage from offsite. In contrast, modern cloud solutions offer a simpler experience—users can simply sign into a web-based platform to gain instant access from both a desktop and mobile device.

The difference between pulling up a live camera feed on a phone and having to log into a desktop each time adds up. Ease of access will also influence the speed of incident response and resolution. If no one can gain access to the system, there will be no one to facilitate the finding and sharing of footage.

☑ How Verkada Does It: Plug-and-play cameras are brought online in minutes, enabling remote access from any browser or device. No need to log into VPNs or conduct technical configurations to gain access to cameras across sites.

Page 13: SECURITY GUIDE A Guide to Remote Video Monitoring

13Copyright © Verkada Inc. All rights [email protected]

Ease of Finding FootageOutside of remote management, your VMS should also make footage retrieval as efficient and effective as possible. After all, what good is the ability to access cameras if you can’t find the footage you need? Certain features make it easier to pinpoint the exact moment of an incident by removing the need to manually watch, rewind, and fast-forward through video content. Look for search features such as time and date search to quickly identify key moments, as well as motion search to filter out meaningful events based on activity detected in-frame.

☑ How Verkada Does It:Edge-based analytics provide options to find events quickly with details like a vehicle’s make or a person’s clothing color, while tools like Motion Search and Heatmaps allow users to filter out meaningful activity within months of data.

Ease of Sharing FootageIf you’re accessing footage remotely, chances are that something already happened and you need to respond to it. A fast response is required to minimize consequences — your VMS should enable you to get footage into the right hands in the least amount of time possible. Modern solutions allow footage to be exported in readable formats, and Verkada specifically supports live feed sharing via SMS or email to first responders. Avoid solutions that require file conversions, exporting to a portable drive, or manual delivery in order to share footage. Whether it’s offloading to a USB or driving to the police station, the more steps that are required, the longer an incident remains unresponded to.

☑ How Verkada Does It: Just a tap of a button, and footage can be saved to unlimited cloud archiving or exported as an MP4. When footage needs to be shared quickly, users can send Live Links with any recipient through SMS or email. No downloads required, feeds open instantly on any device.

Out-of-the-Box Security Security is the biggest potential risk with a remote camera system. There are a host of threats—malware, spyware, ransomware, and more—that can infect entire network ecosystems through your video system by exploiting unpatched vulnerabilities. Though no solution is 100% impenetrable, a thoughtfully designed system architecture can greatly reduce risk and the likelihood of a breach.

On the software and application side, look for safeguards such as regular firmware updates and security patches, as well as at-rest and in-transit encryption. On the user management level, authorization and authentication measures should be in place—often SSO or multi-factor sign-on—to protect against malicious actors gaining entry to the system.

☑ How Verkada Does It: Using industry-standard encryption algorithms, data is protected at rest and in transit. No default login information is used, Verkada offers enhanced user authentication and provisioning with SAML/Oauth, multi-factor verification, and SCIM 2.0. Security updates and patches are deployed automatically—eliminating the risk of outdated systems requiring manual updates.

Page 14: SECURITY GUIDE A Guide to Remote Video Monitoring

14Copyright © Verkada Inc. All rights [email protected]

Modern security systems capable of proactive monitoring add a layer of visibility and context to events that happen in-frame. Systems of the past took a passive role by simply recording footage, often resulting in a reactionary response after an event has already occurred. In contrast, modern security systems equipped with proactive alerts enable an active response in which incidents are addressed as they happen in real-time. Additionally, the information they capture can drive actionable insights to further enhance safety and security at your organization.

So what does proactive security look like? We’ve outlined four security must-haves that every modern solution should provide. As a baseline, your surveillance solution should be able to analyze events in real-time, proactively alert you of key events, and deploy automatic security updates.

Get System Health AlertsWhen a camera suddenly stops recording, gaps in coverage result. To prevent this, physical security and IT teams conduct manual audits that are time-consuming, have high overhead costs, and require frequent check-ups. Alternatively, proactive alerts for system health can provide the peace of mind that cameras are always operational and running, without the need for manual audits. In the event that a camera goes offline or is tampered with, a system alert is issued via SMS or email so it can be acted on immediately.

Moving from Reactive to Proactive Video Security

2nd Floor Elevators

Page 15: SECURITY GUIDE A Guide to Remote Video Monitoring

15Copyright © Verkada Inc. All rights [email protected]

Get Notified of Meaningful ActivityTo secure facilities, many organizations employ onsite security guards. Motion notifications are an alternative way to have eyes on the ground, without the high overhead cost of having eyes on the ground. Whenever meaningful activity is detected in a camera’s field of view, an alert is triggered to provide actionable information to users. By eliminating the need for active monitoring, motion event alerts save time, reduce overhead expenses, and increase the productivity of security and facilities personnel.

Get Real-Time Incident DataCamera systems capable of identifying people and events in real-time can greatly accelerate response times to incidents while they are still in motion. Rather than being a reactive means for video analysis, cameras today can provide a live heatmap of motion detected across floor plans to better identify where activity is happening in real-time.

This enables teams to quickly pinpoint incidents as they are occurring, see where people are moving, ensure there is no movement towards critical areas, and provide first responders with location data for better context on an emergency situation. Some systems that can accurately detect faces in frame will also send you an alert if a person of interest is identified on-camera. To prevent false positives, these alerts should be backed by edge-based video processing with computer vision that can accurately identify people or situations in frame.

Get Automatic Security UpdatesWith automatic firmware and software updates, customers can better protect their organization from cyberattacks that lurk behind-the-scenes. An up-to-date system is a best practice to any proactive response strategy, since ironically, the security system meant to protect you could also be your greatest vulnerability. Malicious actors from anywhere in the world can find and exploit outdated software and firmware to gain access to private information. Deploying a solution that proactively protects itself by issuing automatic updates and regular security patches prevents backdoors from being opened, and will save you a lot of headaches in the long-run.

Page 16: SECURITY GUIDE A Guide to Remote Video Monitoring

16Copyright © Verkada Inc. All rights [email protected]

The Leader in Hybrid Cloud Video SecurityBy building cameras on a modern software stack, Verkada offers the best in both physical and cybersecurity. What you invest in is more than just the camera, it’s the visibility the camera provides through adaptive, computer-vision technology. To further enhance visibility, this technology is made accessible from anywhere through a centralized cloud-based Command platform that you can securely access via an app- or web-based browser. With proactive measures in place, securing sites is easy and automatic rather than an additional chore. With both local solid-state storage and cloud-based backup, they merge the best in both worlds to balance efficiency with reliability.

About Verkada

Page 17: SECURITY GUIDE A Guide to Remote Video Monitoring

17Copyright © Verkada Inc. All rights [email protected]

Enterprise-Grade CamerasBuilt to scale and last, Verkada’s enterprise-grade cameras are equipped with a number of safety and security features—including a vandal-resistant shell, tamper detection, and encryption at rest. Outside of security, hybrid cloud cameras provide the scalability of cloud storage and the reliability of local storage. However, three unique distinctions allow Verkada to stand out as the most scalable and reliable solution on the market:

• Bandwidth friendly, operating at only 5-20 kbps: Rather than streaming directly to the cloud, Verkada cameras minimize network bandwidth by storing video on the camera itself and only upload thumbnails to the cloud. This allows each camera to operate at only 5-20 kbps at rest, which is the same as sending an email.

• Extended storage for up to 365 days: Verkada cameras have the ability to store high quality video footage on both the solid state drive within the camera, as well as in the cloud. Verkada offers a wide-range of extended storage options, including up to 365 days of continuous local recording, to easily meet compliance and retention standards across any industry.

• No single points of failure: With both built-in and cloud-based storage, Verkada cameras provide a backup in the event that network outages, weather conditions, or tampering trigger downtime. Eliminating the NVR not only removes the single point of failure common to traditional systems, it also reduces the maintenance load and total cost of ownership for your organization.

Future-Proof Technology (Command)The intuitive Command platform leverages powerful, edge-based analytics to deliver enterprise security with a software-first mentality. The cloud-based video management software enables you to effortlessly manage physical security from anywhere in the world and instantly retrieve footage from the convenience of your phone or computer. To quickly get video evidence into the hands of people who need it the most, Verkada offers the ability to share camera feeds directly via SMS or a link. Three major factors drive its charge in providing the best user experience possible:

• New features powered by A.I. and Computer Vision: With Verkada’s industry-leading computer vision technology, cameras leverage powerful edge-based processing to drive insights as they happen across your organization. Features include intelligent people matching and real-time motion plotting, with future updates included at no additional cost.

• Technology that improves other areas of the business: Ease of use is central to Command’s design. The interface was created to be simple to navigate for all users across the organization. It includes features made to enhance efficiency, compliance, and management. For efficiency, users can be given custom camera permissions to streamline inventory management. For ease of compliance, Command offers unlimited cloud archiving and automatically watermarks all footage with timestamps to ensure usability in court. For ease of management, a timelapse view over a 24-hour period can offer key insights into traffic patterns and help identify areas of improvement.

Page 18: SECURITY GUIDE A Guide to Remote Video Monitoring

18Copyright © Verkada Inc. All rights [email protected]

• Secure By Default: The chance a company was involved in a large scale data breach in 2014 was 22.6%. By 2019, that number had grown to 29.6%. To ensure that your organization is protected, Verkada’s solution is secure out-of-the-box with no configurations required to receive updates. With an integrated solution and secure system infrastructure, Verkada will protect your data’s journey all the way from the hardware and network, to cloud and application.From end-to-end encryption to automatic software patches, our system architecture was designed to remove inherent vulnerabilities, keep your data safe, and evolve with threats.

A remote security system is a powerful tool for enhancing safety and efficiency, but also a way to bring peace of mind during uncertain times. No matter what industry you are in, having a system that can support you in facilitating a speedy resolution plays a critical role in any integrated response strategy.

Here are a handful of the many industries that are benefiting from Verkada’s solution.

Built To Work Together

Page 19: SECURITY GUIDE A Guide to Remote Video Monitoring

19Copyright © Verkada Inc. All rights [email protected]

Education“The software is so easy to use that we haven’t heard from staff members since deploying it. When you hear nothing, that’s the raving review. It takes 10 minutes to onboard new users, and from there the system is intuitive enough for them to use without assistance or training. ”Sun West School Divison, Michael Zummack, Manager of Facilities and Information Technology

Banks“With Verkada, there are two line items: the hardware and the software. No secret support fees, no hidden software upgrade charges, and a 10-year warranty for all cameras. Verkada is a far better long-term financial investment.”Bank of the James, Phil Hampton, IT Specialist

Business“There are no secrets to becoming successful with Verkada. The way the system works is effortless– from the way it’s installed, to getting it up and running.”Equinox Fitness Club, John Spirko, Senior Director of Loss Prevention

Manufacturing“If you want a security system that does everything and is easy to manage, scale, and use, Verkada is the way to go.”Cerrowire, Jeff Bishop, Network Analyst

Healthcare“With Verkada, we’ve been able to install nearly 200 cameras across parking lots, hospital entrances, emergency rooms, and other critical areas. Every step to getting the system up and running has been really easy.”El Centro Regional Medical Center, Darryl Mark, Information Services Manager

Retail“Verkada makes overseeing surveillance across locations not just possible, but really easy. The difference from a management perspective… before and after Verkada… is night and day.”Cycle Gear, Ed Homich, Director of IT

Municipalities“(Verkada cameras) are flexible and versatile. We can put them anywhere, quickly. Same day, no questions.” Garrett Bradlyn, IT Manager, City of Parkersburg

Government“It feels good to say we’ve got an enhanced view of what’s going on in our district and across our facilities. The team feels ready to quickly, and effectively, respond to situations.”Moapa Valley Water District Joe Davis, General Manager at Moapa Valley Water District

See What Our Customers Say