<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Surveillance-Features on Verkada Microsoite</title><link>https://info.verkada.com/category/surveillance-features/</link><description>Recent content in Surveillance-Features on Verkada Microsoite</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 09 Apr 2025 04:47:00 +0000</lastBuildDate><atom:link href="https://info.verkada.com/category/surveillance-features/index.xml" rel="self" type="application/rss+xml"/><item><title/><link>https://info.verkada.com/surveillance-features/ai-video-analytics/</link><pubDate>Wed, 09 Apr 2025 04:47:00 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/ai-video-analytics/</guid><description>What is AI Video Analytics? AI video analytics leverages advanced machine learning algorithms to turn raw video surveillance footage into actionable intelligence. By enabling intelligent search, real-time monitoring, and automated incident detection, AI video analytics significantly reduces the manual workload associated with traditional video surveillance systems.
Designed to be ultra simple to use, secure, and scalable, Verkada is a leader in cloud AI security cameras. From advanced person analytics, license plate recognition, and cloud remote management, to AI-powered analytics, Verkada offers over 48 security cameras to choose from.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/asymmetric-and-symmetric-encryption/</link><pubDate>Mon, 27 Nov 2023 17:04:42 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/asymmetric-and-symmetric-encryption/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
Overview For communication of potentially sensitive information, encryption methods are crucial for protecting confidentiality.
Today, most encryption is done on the devices we use each day, made possible because of advances in hardware and software. At its core, encryption is achieved by scrambling data using a cryptographic key, only known by the sender and the receiver. A third party would be aware of the conversation, but not able to interpret it.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/the-exposure-triangle/</link><pubDate>Mon, 27 Nov 2023 00:12:29 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/the-exposure-triangle/</guid><description>By Dan Molenhouse, Solutions Engineer
Overview In photography and videography, exposure is the amount of light that reaches the film or digital sensor. The process of creating an image must be precisely controlled to allow the correct amount of light to reach the imaging sensor. Three critical elements control the exposure of an image: ISO, Shutter Speed, and Aperture.
ISO is a standard for measuring sensitivity to light and dictates how much light the sensor needs to get a correctly exposed image.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/lens-distortion-correction/</link><pubDate>Mon, 13 Nov 2023 19:27:17 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/lens-distortion-correction/</guid><description>By Marcus Orciuch, Solutions Engineer
Lens Distortion Correction (LDC) is a digital image processing technique used for rectifying the distortions introduced by the inherent optical properties of camera lenses. Correcting these distortions is critical for accurate representations of objects and improving the reliability of computer vision applications like facial recognition. LDC profiles are often built specifically for a lens based on known distortion characteristics and patterns, and then applied after the image is captured.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/lpr-advanced-analytics-best-practices/</link><pubDate>Thu, 26 Oct 2023 17:09:42 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/lpr-advanced-analytics-best-practices/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
Most enterprise-grade CCTV systems allow for advanced analysis of the footage, such as people or vehicle characteristics, face search, or license plate recognition. Although each vendor offers different capabilities and may require different hardware and software licenses, they all have similar requirements when it comes to camera positioning.
In a nutshell, the positioning and proximity of an LPR camera to the subject or object are critical and differ from a deployment intended for holistic CCTV coverage.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/symmetric-vs-aysmmetric-bandwidth/</link><pubDate>Tue, 24 Oct 2023 21:40:06 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/symmetric-vs-aysmmetric-bandwidth/</guid><description>By Ciaran Gillespie, Solutions Engineer
What is Bandwidth? Before jumping into the differences between symmetric and asymmetric bandwidth let&amp;rsquo;s go back to the basics and review the question - what is bandwidth?
Simply put, in networking, bandwidth is a measure of how much data can be transmitted down a particular medium, for example, copper, fiber, and wireless links in a given amount of time, usually measured in seconds. The standard unit for measuring network communications is Bits per second (Bps) or Kbps (Kilobits per second) and Mbps (Megabits per second).</description></item><item><title/><link>https://info.verkada.com/surveillance-features/ppf-explained/</link><pubDate>Tue, 24 Oct 2023 20:55:26 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/ppf-explained/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
A question often asked by people purchasing CCTV is, &amp;ldquo;How far can this camera see?&amp;rdquo; Similar to the human eye, the cameras can see as far as the horizon (in an open space), but the further away certain objects are, the harder it is to clearly distinguish their details. This is where the concept of Pixels Per Foot (PPF) comes into play, as it is a way to quantify the quality of the recorded footage and the people or objects contained in it.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/poe-overview/</link><pubDate>Thu, 28 Sep 2023 19:54:59 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/poe-overview/</guid><description>Power-over-Ethernet (PoE) has transformed the way we power and connect IP cameras. This technology enables the transmission of both electrical power and data signals over a single Ethernet cable, eliminating the need for separate power supplies and cables. PoE has seen widespread adoption among IP camera systems and security deployments due to its cost effectiveness, streamlined setup and reduced complexity.
In this guide, we provide an overview of how PoE cameras work, the technology behind PoE, when to use it, PoE standards, and practical considerations.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/pci-compliance/</link><pubDate>Wed, 27 Sep 2023 21:07:05 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/pci-compliance/</guid><description>PCI DSS compliance is a requirement for many merchants and organizations in the United States. Here&amp;rsquo;s a closer look at how security cameras can be part of an effective PCI compliance solution.
The Payment Card Industry Data Security Standards (PCI DSS, or simply PCI) is a schedule of information security standards that applies to any merchant or organization that handles payment card transactions. PCI compliance standards are designed to ensure the security of payment card information and reduce risks from payment card fraud, identity theft, and payment card hijacking.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/occupancy-management-contact-tracing/</link><pubDate>Fri, 15 Jan 2021 01:18:40 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/occupancy-management-contact-tracing/</guid><description>Security Camera Features: Occupancy Management &amp;amp; Contact Tracing As more and more businesses reopen their doors, they’ll need to take extra precautions in light of the COVID-19 outbreak. Apart from social distancing guidelines and occupancy limits, businesses need to implement proactive measures for limiting the spread of COVID-19, responding to outbreaks, and monitoring ongoing compliance. What follows is an introduction for the two primary ways for doing so: occupancy management and contact tracing.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/security-camera-video-storage/</link><pubDate>Thu, 20 Feb 2020 17:59:28 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/security-camera-video-storage/</guid><description>How do you store security camera footage? Video security helps keep locations safe through two primary methods. First, there is real-time surveillance that enables employees or law enforcement officials to discover and monitor any threat in the moment. Then there is the archival footage record that can be reviewed if a crime or other issue is uncovered or suspected at a later time. In both cases, the recorded footage needs to be securely deposited and maintained for future access — making Video Storage an essential element of every video camera security system.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/total-cost-of-ownership/</link><pubDate>Mon, 17 Feb 2020 20:19:37 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/total-cost-of-ownership/</guid><description>What are the Hidden Costs of Video Surveillance Systems? When investing in a new surveillance system that will be in operation for years to come, the initial expenditure is only the tip of the iceberg. For the purposes of planning, budgeting, accounting, and projecting long-term impact, all aspects of managing and operating the project must be taken into account. This is what we mean when we refer to the Total Cost of Ownership (TCO).</description></item><item><title/><link>https://info.verkada.com/surveillance-features/bandwidth/</link><pubDate>Fri, 14 Feb 2020 21:53:31 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/bandwidth/</guid><description>How much bandwidth do security cameras use? Bandwidth availability is a primary concern for any network, and video security systems are no exception. While most people understand that video transmission can carry a significant load, many struggle to gauge the specifications and nuances that impact security cameras and bandwidth. A key development in recent years has been the introduction of modern devices, creative strategies, and optimized systems that help limit bandwidth consumption.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/security-camera-maintenance/</link><pubDate>Thu, 13 Feb 2020 17:53:28 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/security-camera-maintenance/</guid><description>How Do You Maintain Security Cameras? After setup and installation, every video camera security system will require ongoing maintenance to ensure that it continues to operate optimally. This demands a maintenance strategy that is typically executed by either the system provider or internal personnel. Either option can have benefits and drawbacks and different strategies may have different impacts on the total cost of ownership.
Regardless of the strategy employed, most end users view ease of maintenance as a key priority.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/video-data-security/</link><pubDate>Tue, 11 Feb 2020 00:09:51 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/video-data-security/</guid><description>How to Protect Your Security System from Vulnerabilities Compared to other modern devices, security cameras are old. By this, we mean that they have existed in some form since before the world adopted widespread network access and connectivity. So, unlike digital-native technology and even smartphones, they have been forced to evolve and adapt over time to this newer era full of cyberattacks, exploits, and vulnerabilities.
Featured Content: Security Best Practices for Surveillance Cameras</description></item><item><title/><link>https://info.verkada.com/surveillance-features/secure-remote-access/</link><pubDate>Wed, 05 Feb 2020 18:24:27 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/secure-remote-access/</guid><description>What is Secure Remote Access? With traditional video camera security, a company would typically set up, manage, and operate its entire surveillance system onsite. Today, these aspects are often handled remotely and secure remote access is the key to it all. Remote management is especially common among enterprises with multiple locations — and modern technology makes it easy to deploy such a system at scale.
There are some fundamental factors that must be addressed with remote surveillance, and security is by far the most important.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/video-management-software-vms/</link><pubDate>Wed, 29 Jan 2020 22:24:52 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/video-management-software-vms/</guid><description>Video Management Software (VMS) A security system&amp;rsquo;s video management software (VMS) is a critical component for camera operators to control the recording, storage, and management of security, surveillance, or other video surveillance footage. Traditional systems have historically relied on a centralized network video recorder (and NVR software) or digital video recorder (and DVR software) to store video footage. But some modern systems today feature cameras with internal recording capability that allows video to be routed directly into a centralized dashboard, that is easily, remotely managed with the VMS.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/</guid><description>Surveillance System Features With the modernization of video surveillance technology in recent years, security camera systems offer increasingly advanced features and cutting-edge capabilities.
A challenge in choosing the right surveillance system for your organization is knowing which security camera features to prioritize. There are seven factors that modern surveillance systems need in order to be secure, efficient, and scalable: intuitive video management system (VMS) software, remote accessibility, low bandwidth consumption, reliable video storage, data security, calculable total cost of ownership, and ease of maintenance.</description></item></channel></rss>