Advancements in mobile phone technologies have changed the in which we manage our lives. Apps have become part of our day-to-day reality providing us connection like never before. The Physical Security world has not been immune from this change. Mobile applications from video management software manufacturers are enabling security professionals as well as business operations teams to leverage the power of video on mobile devices. These applications allow access to the enterprise security system to view live data as well as recorded data from mobile devices and tablets.

These applications are being extended to a wide number of users to simplify the retrieval process of video when access is needed quickly. Pulling up video has become as easy as clicking the application on your phone or tablet and looking at the video. Video surveillance going mobile provides a host of benefits to organizations as easily being able to access video from anywhere can:

  • Increase response times
  • Enable an appropriate response to a given incident by reviewing video prior to arrival
  • Video verify alarms
  • Help manage operational processes.

In addition to viewing live and recorded data, some manufacturers also have technology that allows video that is being recorded from the mobile device to be recorded in the video management system. This allows for tablets and phones to become cameras on the system should an event arise. Being able to make a mobile device a camera provides security officer or other personal the power to record events as they happen. That video could be used live to help in the incident response or used as part of the investigation process.

The usage of mobile devices does not stop with video. Card access can now be done using a mobile device eliminating the need for a physical credential. Instead, credentials will be stored on a mobile devices and card readers will be signaled using Bluetooth. While this technology is new and currently has some limitations it is another sign that manufacturers will continue deploy technologies that leverage mobile devices for security.