Download PDF version Contact company
Surveillance systems planned around cameras that capture and stream video to a centralised general purpose IT servers lead to poor video quality
Temperature, dusty and dirty conditions, along with limited access to networking
makes remote location video surveillance extremely challenging

Properly conducting video surveillance for any organisation comes with several challenges. Not the least of which is how to architect a system that finds the right balance between quality, cost and bandwidth impact. This becomes even more challenging in non-traditional, demanding environments that are uncontrolled or highly dispersed, whether that’s an oil field, outdoor ATM machine, city intersection or a host of other “no-man’s land” environments where there is less control over the temperature, dusty and dirty conditions, and with limited access to bandwidth and IP networking.  

A primer on video surveillance for all organisations

First, before we move on to harsh environments, let’s look at how most organisations address video surveillance recording. Until recently, many companies have planned video surveillance systems around cameras that capture and stream video over a network to centralised general purpose IT servers and storage systems. That video can cause major network bottlenecks. For almost all organisations, network infrastructure planning does not take video surveillance network needs into account. The networks are typically designed to handle information related to the business such as emails and application servers, and it’s often prioritised according to the business’ function. For instance, on a network within a bank – transactional data will be made a higher priority than video surveillance data. The shared network bogs down video surveillance systems (or the other way around) and prohibits companies from running the kind of video surveillance quality that they can depend on. 

Open, intelligent surveillance appliances 

A new approach, which remedies these issues and performs better than the use of general-purpose IT systems and a centralised recording is the use of open, intelligent surveillance appliances. These appliances are an all-in-one server, managed switch and storage that are typically installed in a distributed appliance architecture. In a distributed environment, appliances record closer to the edge of the surveillance network, near the cameras. Multiple IP cameras are connected directly to the appliance so video only streams over the network when it is retrieved on-demand through a video management system (VMS) or in the event of an incident. The appliance is open because it works with virtually any VMS depending on the needs. 

An intelligent surveillance appliance approach and distributed architecture not only take the burden off the network by up to 95 percent, but also increase the reliability of the video by disassociating the surveillance video recording from conditions that can affect the health of the network such as congestion or network outages. Video continues to record when the network goes down, and there are fewer single points of failure. These appliances are typically built for the special demands of megapixel video and provide a smarter approach than streaming surveillance over networks.  

An intelligent surveillance appliance approach and distributed architecture take the burden off the network by up to 95 percent
Open, intelligent surveillance appliances perform better than general-purpose
IT systems and a centralised recording

Remote area video surveillance challenges

The majority of today’s video surveillance systems were designed to operate in controlled corporate or campus environments. But that is not always where the most demanding surveillance needs are found. Many of today’s video surveillance systems are needed at the far reaches of the globe, at the perimeter of an organisation, or the most inaccessible city locations that have dusty, dirty conditions. They must operate in extreme temperatures reaching as low as -4°F, up to 140°F; and have limited access to reliable network bandwidth.  

Because they have no other choice, organisations and their integrators will go to additional efforts to protect mission-critical equipment and surveillance recording from the elements. In doing so, they add additional expense or force fit regular network video recorders (NVR) and general-purpose systems that were not designed for the job. Some get by procuring multi-thousand dollar enclosures to protect equipment that have fans and sensitive components, and in essence “brute” force solutions to meet the needs.  

To add to the difficulty, network capabilities are even more limited with remote locations. The quality of video that can be transferred back from the surveillance point is limited by the network connection.  Due to these limitations, compromises are made including reducing resolution and frame rate, resulting in lost video and unusable evidence. When layers of video security are added to an infrastructure that was weak to begin with, it becomes more likely that fewer locations will meet the desired security requirements. 

In controlled settings the need for distributed architecture is very strong. In uncontrolled environments, this need is only magnified due to lack of bandwidth and on-site oversight, and the presence of harsh temperatures and other conditions.  

A ruggedised, intelligent appliance solution 

Appliances are an ideal solution for uncontrolled, harsh environments where systems will be located in remote, difficult to access or perimeter places. In fact, there are now ruggedised surveillance appliances that have been “hardened” or in other words built in a certified, rugged enclosure that is able to withstand and excel in scenarios such as oil and gas fields, industrial locations, city surveillance, ATMs, border control and convenience stores. The appliance is enclosed in a chassis that meets UL and CE certifications ideal for recording in extreme conditions.   

By nature, “no man’s land” is distributed. It is a place that is hard to reach and often underserved in terms of IP network and bandwidth. Therefore, a distributed appliance strategy for recording is perfectly suited and provides the ability for security managers to access video on demand rather than stream it over unreliable networks.

Intelligent surveillance appliances provide a smarter approach than streaming surveillance over networks
Remote monitoring appliances are suitable for applications such as ATM
surveillance, border control and on cell phone towers

But, it is important to understand that being “ruggedised” is only part of the story because these remote locations, present other interesting challenges: There are not staff nearby to manage the appliances, and there are cyber security threats when surveillance cameras are left unattended in an IP network. There needs to be intelligence built into the appliances for remote management.

Health monitoring: An intelligent surveillance appliance provides health monitoring of the entire ecosystem including the server, manage PoE switch, storage and cameras. This monitoring allows greater visibility and better control. It also includes proactive event management and notifications 24/7 via text message or other communication methods in the event of an issue such as an out of focus camera or a component that has been tampered with resulting in unusable video. Without health monitoring, video loss can occur without knowledge until it is too late. 

Cyber security: Another key issue is that of cyber security and hacking. Camera ports have become an entry point for creative hackers into an organization’s critical IP network. An intelligent surveillance appliance provides the ability to lock down camera ports on a switch with a single click to prevent hackers from gaining access to the corporate network. If a device with a different MAC ID address is plugged into the camera or access port, it cannot gain entry into the network and will be locked out. A web interface is used to manage the ports from a centralised location.

How rugged video surveillance appliances work in extreme conditions  

Cell phone towers: Cell phone towers dot the landscape of remote and rural areas across many countries. Thieves have been known to steal valuable copper cable from the towers. By the time someone shows up, the culprits have already taken the supplies that they need.  Video surveillance is a critical solution to protect these assets.  

Border patrol: Another interesting scenario exists within an open border from one country to another. Many times thermal imagery video surveillance will be used at night to detect border crossings by measuring heat signatures. These programmes are complex and often require processing power with significant network infrastructure investment. They also work best if they are installed closer to the source of the video recording. A rugged appliance provides a source of power and the ability to record on the spot. When filming within a closer proximity, once the cameras show heat images of figures coming over the horizon, on-the-ground teams are able to proactively go to the location before the suspects arrive. Special analytics can run directly off of the rugged device for border patrol applications. 

ATMs: Although they’re not always located in extreme locations, ATMs are usually small boxes that include a camera to record the customer’s face for security measures. Normally, companies will only open the ATM to fill it up with money, change the ink or add more paper. They typically don’t open it to service a video surveillance recorder or to air out the recording unit. A ruggedised, fanless appliance works well because it’s small and reliable enough to live within the closed box and can withstand temperatures ranging from -4°F to 140°F.  

What’s next?

The possibilities for rugged, intelligent surveillance appliances are endless. The high performance processing, highly tuned storage, intelligent features and network friendly architecture, all housed in a protected chassis, provide for a host of inventive uses from facial recognition to license plate recognition along highways. There are surveillance scenarios that we have not even conceived of yet but that will be better served with innovations in appliances built specifically for the job, no matter where in the world.

Download PDF version Download PDF version

Author profile

Mig Paredes Senior Director, Partnerships, Razberi Technologies

Mig Paredes is a Senior Director of Partnerships for Razberi Technologies. He has more than 20 years of experience in the security industry, with a diverse background in engineering, pre- and post-sales support, with product and business development provided throughout the Americas.

In case you missed it

Is hybrid working a red flag for business security?
Is hybrid working a red flag for business security?

The ‘new normal’ was all we heard about when it came to the working model shift after the pandemic hit. Businesses worldwide adopted working from home, and then the hybrid model: a balance of remote work and office work. And according to a recent survey by 451 Research, nearly 80% of organisations surveyed said they have implemented or expanded universal work-from-home policies as a result of COVID-19, whilst 67% expect these policies to remain in place either permanently or for the long-term. With more vacant office spaces, the question is: is hybrid working a red flag for business security? Empty-office days When buildings and office spaces are still active with advanced technology, equipment and assets on show, yet footfall is not as busy as it once was, opportunistic criminals are closely watching and taking note. But what are they learning? Security systems provider, Expert Security UK, investigates our new normal. Offices are nests for expensive, valuable equipment, with maybe the latest technology Instead of a packed, busy office five or six days a week, hybrid working means more empty-office days, which is music to the ears of burglars. Offices are nests for expensive, valuable equipment, with maybe the latest technology and safes sitting there, or potential stacks of cash or company cards. You may be thinking, well, who leaves company cards or cash out? You’d be surprised, especially when business owners think they’ll never be a victim, or sometimes, staff make mistakes. Hybrid working model And don’t forget, burglars don’t always know what’s been left and will take their chances. And when a hybrid working model is the ‘new normal’, that means a lapse in security - at least in a thief’s mind. So how worried should business owners be? Well, the latest figures are pretty worrying, but also, not massively shocking. Reiterating the temptation and lure the working model shift has on robbers, Statista recorded a 12-year high for robbery offences in the UK in 2019/2020. When more businesses either shut up shop or sent staff away to home offices, it’s not hard to make a connection. These figures reflect how, when given the opportunity, thieves will strike and take advantage. Handing vital information Whether you’ve decided to go fully remote, it’s crucial to review and rethink your business security However, it’s worth noting that the lockdowns and empty streets would also have played a part in this spike, and now that we’re out of lockdowns with a world back to flipping its sign to ‘open’, many businesses will be carrying on working from home, but towns, shops, and streets are busy again. Whether you’ve decided to go fully remote, or have adopted the hybrid model, it’s crucial to review and rethink your business security, starting with your social media presence. It’s a good idea to review your social media channels. We forget how open we can be on social media, and how our digital presence can actually work as a perfect guide and insight for criminals. All they have to do is follow your channels to pick up on clues. And if you’re not giving it a minute’s thought about what you're putting out there, you may even be just handing them vital information and helping their plans. Remote working shift Of course, there is information readily available such as your opening times, location etc. But, do you really want/need to show off the new, state-of-the-art tablets you’ve just kitted your office out with? It can be hard as a business, or even as a social person, to not want to share positive news on social media, but we really do have to stop and think, especially if people know a lot about the company and its remote working shift. It’s also a good idea to have a meeting with your staff about a social media policy Maybe share a post about that new, intelligent security system you've installed instead. It’s also a good idea to have a meeting with your staff about a social media policy or maybe just a casual chat about best practices, e.g. not to tag the business in a post about their new office gadget etc. Improving business security With fewer office days, you probably won’t need to take up as much work space anymore. Maybe some equipment has become more ornamental. Anything you don’t use or need, you could sell or donate. If you do have expensive equipment lying around that’s not being used, try and make money back from it or store it elsewhere. If you are keeping a lot of expensive equipment in vacant premises, especially fixed equipment and technology, then consider installing bars and shutters over the windows. Whatever your budget, you can improve your business security tenfold with key security measures. One of them being access control. Security gates with access control are incredibly effective at stopping unauthorised people from gaining entry. There are also car park barriers and bollards that are highly effective at keeping any potential getaway vehicles out. Easily portable technology High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently, especially if you’ve done a perimeter check and noticed any signs of forced entry or damage. Don’t forget those signs either, let visitors or trespassers know they’re on camera. To fit in with the hybrid working model, static fixtures are becoming redundant. For instance, companies are switching to laptops instead of computers, so that workers can transport them easily to and from the office. This is not only more efficient and convenient, but it means assets are more guarded. It’s the same for any other gadgets. Having easily portable technology is good for business, hybrid working, and security. Don’t forget about your deterrents. Simple signs to warn people of alarms, CCTV, and even the fact that you don’t leave equipment inside overnight can go a long way. Best security technology Thieves are famous for taking their chances. Some will meticulously plan, and many strike at a convenient, opportune time. So having signs in place that show you have high-quality, intelligent security in place can work wonders, making them think twice. It’s also worth noting that you may not have the best security technology in place at the moment, but those on the outside don’t need to know that; they can be fooled. However, having the best physical security in place is vital, as criminals lurk and will take chances. Keep reviewing your security, especially as your business adapts and reshapes - whether you return back to full office days or carry on the hybrid working model. This guest post was contributed by Danny Scholfield, Managing Director of Expert Security UK.

What about electronic door locks with remote control?
What about electronic door locks with remote control?

Most consumers are enjoying the convenience brought by electronic locks. With the existence of electronic locks, people no longer need to be restricted by keys. There are a variety of unlocking methods and more convenient remote control unlocking options. Suppose, you are going on vacation, and with the presence of an electronic lock, you can easily enter your house with your babysitter, without a spare key. Of course, not only smart homes, but also some infrastructure and commercial buildings are enjoying the convenience, brought by electronic locks. Passive electronic lock access control system This article will introduce a smart electronic lock used in the infrastructure industry, named passive electronic lock access control system. In traditional manufacturing, mechanical locks are commonly used in all walks of life, to protect the safety of property and facilities. However, the mechanical lock has caused many practical problems in the long-term application. For example, the keys are duplicated randomly, the unlocking authority cannot be controlled, the user's operation records cannot be known, and the remote control is not possible. Imagine that if you are in a remote telecom base station, it happens that you have the wrong key in your hand and cannot open the front door. In such a situation, this lock, maybe the worst scenario. In some industries, with a wide scope and large working area, more attention must be paid to access control systems Therefore, in some industries, with a wide scope and large working area, more attention must be paid to access control systems. In some outdoor scenarios, such as base stations and electric power cabinets, the requirements for access control systems are quite strict. Due to the particularity of its environment, ordinary power-based access control systems will no longer be applicable. Therefore, the emergence of passive access control systems has solved these problems. Electronic locks offer intelligent management function Based on years of in-depth field research, Vanma has developed the Vanma passive electronic lock access control system, based on the current situation of the industry. This system is different from other electronic lock systems, as it integrates the advantages of both mechanical locks and electronic locks. It not only has the simplicity of mechanical locks, but also has the intelligent management function of electronic locks. The term ‘passive’ of passive electronic locks means that no power is needed. Passive electronic locks have the same appearance as ordinary mechanical locks, so they can be installed anywhere, just like common mechanical locks. They also have a variety of practical functions of electronic locks. Authorised remote access control The Vanma management software allows security managers to assign access rights to specific areas, for different technical personnel. In order to facilitate real-time access control, the electronic key can be used in conjunction with the mobile phone app, in order to send information about its access rights to the technicians, in real time. Vanma management software can provide access to all operations performed by technicians Vanma management software can provide access to all operations performed by technicians, including complete audit reports. Access attempts outside the specified time range or outside the specified area can be obtained through the report, so as to analyse any abnormal situations. Access control in extreme weather conditions In the access control system, the lock (lock cylinder) maintains an extremely high standard and its protection level is IP67, to ensure the greatest degree of protection. Infrared induction technology is used in the electronic key, even if the surface of the lock is wet, the electronic key can also transfer the access authority to the lock cylinder. Ensure stable exchange of information between the key and the lock cylinder. In other words, a poor connection cannot prevent the transmission of information between the key and the lock. At present, this kind of passive electronic lock is widely used in many fields, such as telecom, electric power, water utilities, public utilities, medical emergency and so on in Europe.

How soon will access control cards become extinct and why?
How soon will access control cards become extinct and why?

Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?