10 Ways to Visualize the Video Surveillance Opportunity | Channel Insider

10 Ways to Visualize the Video Surveillance Opportunity

Video Level of IT Involvement As video surveillance equipment becomes attached to the network, 91% of respondents say IT is now involved in purchasing, compared with 60% in 2011. IT Now Has the Most Purchasing Influence Nearly half (47%) say IT has the most purchasing influence, followed by senior management (23%). Influence of facilities departments […]

Written By
Michael Vizard
Michael Vizard
Apr 8, 2014
2 minute read
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Video

1 - Level of IT InvolvementLevel of IT Involvement

As video surveillance equipment becomes attached to the network, 91% of respondents say IT is now involved in purchasing, compared with 60% in 2011.

2 - IT Now Has the Most Purchasing InfluenceIT Now Has the Most Purchasing Influence

Nearly half (47%) say IT has the most purchasing influence, followed by senior management (23%). Influence of facilities departments is down to 7%.

3 - Top Video Surveillance ChallengesTop Video Surveillance Challenges

The top-three IT challenges are search and retrieval of footage (30%), impact on network bandwidth (29%) and managing growing volumes of video surveillance information (25%).

4 - Video Surveillance Drives Storage GrowthVideo Surveillance Drives Storage Growth

A full 75% report allocating from 6TB to 25TB of storage for video surveillance.

5 - Business Intelligence Apps Now Being Applied to VideoBusiness Intelligence Apps Now Being Applied to Video

Eight in 10 of the IT professionals surveyed say BI applications are making use of video surveillance files.

6 - BI Helps Justify Video Surveillance InvestmentBI Helps Justify Video Surveillance Investment

Of the respondents using surveillance for BI across the organization, 88% say it helps justify IP video technology and infrastructure investments.

7 - Video Surveillance Files UseVideo Surveillance Files Use

Operations makes the most use of video surveillance (66%). But compliance (53%) and legal (51%) are not far behind.

8 - New Protocols Being UsedNew Protocols Being Used

Simple Network Message Protocol (SNMP) Video Message Information Base (MIB) is a standard that makes it easier to monitor video surveillance systems using traditional SNMP applications.

9 - IT Video Surveillance SecurityIT Video Surveillance Security

Video surveillance systems need to be secured like any other endpoint, using multi-level passwords, IP filtering, HTTPS encryption and support for the 802.1x network access control standard.

10 -  Video Drives Networking UpgradesVideo Drives Networking Upgrades

Not long after the introduction of video, customers usually begin upgrading their network infrastructure to meet increased bandwidth requirements.

Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Guardz Warns MSPs of Cloud Ransomware and BEC Risks
Aminu Abdullahi
Apr 28, 2026
Panasonic Connect introduces TOUGHBOOK 56 for Mobile Professionals
Luis Millares
Apr 20, 2026
OPSWAT, Emerson Partner on OT Cybersecurity Globally
Luis Millares
Apr 16, 2026
Report: Only 34% of Security Talent Plan to Stay in Their Roles
Luis Millares
Apr 15, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.