Browse Definitions :
Definition

IP surveillance

What is IP surveillance?

IP surveillance is a digitized and networked version of closed-circuit television (CCTV). In an IP surveillance system, an IP camera records video footage and the resulting content is distributed over an IP (Internet protocol) network. 

Digitization offers a number of benefits over traditional analog CCTV, including:

  • Improved search capability.
  • Greater ease of use.
  • Better quality images and no degradation of content over time.
  • The ability to record and play simultaneously.
  • The ability to compress content for improved storage.

Adding networking capability to digital CCTV provides additional benefits, including:

  • Improved ability for remote viewing and control. Anyone on the network can potentially see video from any camera connected to the network.
  • IP storage makes it possible to store data in any geographic location.
  • Greater ease of distribution. An image of a crime suspect, for example, can be immediately distributed to officials.
  • The ability to connect to email and other communications systems so that alerts can be sent automatically.

There is a growing industry trend towards replacing analog CCTV  with IP surveillance systems.

 

Learn More About IT:
> This Motorola white paper discusses the benefits of IP surveillance.

> Barbara Darrow writes about the opportunity IP surveillance creates for VARs.

> Andrew Hickey reported on IP surveillance catching criminals in New Orleans.

This was last updated in May 2009
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close