A security system provided by Hikvision USA Inc., the North American provider of innovative, award-winning video surveillance products and solutions, was installed by Denver-based A-1 Security Systems to meet all requirements set forth by Colorado’s Marijuana Enforcement Division (MED) and to ensure comprehensive security at the newly retrofitted building for 14er Gardens in Boulder, Colorado.

In 2017, Evan Anderson, owner of medical marijuana company 14er Gardens, sought out the security expertise of Sofia Aguilar, sales manager and partner at A-1 Security Systems in Denver. The two had worked on previous projects together and Anderson was about to embark on a brand new, complex building retrofit in Boulder that had been in the planning stages for nearly two years.

Aguilar worked closely with Anderson and his team to design a custom, high-end Hikvision security system

A-1 excels at these types of projects, mid-sized commercial with access control and surveillance needs, and Aguilar has designed and installed hundreds of Hikvision security systems at growing facilities throughout Colorado since moving from Texas in 2008 to join A-1 as a business partner. Aguilar is a member of the national board of the Electronic Security Association and a board president for the state chapter of the Colorado Burglar and Fire Alarm Association.

Hikvision’s Pro Series NVRs

Aguilar worked closely with Anderson and his team to design a custom, high-end Hikvision security system that deployed a total of 95 cameras for indoor and outdoor surveillance and used Hikvision’s Pro Series NVRs for storage. All of 14er gardens are indoor facilities that meticulously control growth quality of the plants.

Outdoor growing facilities do exist,” said Anderson. “But they don’t deliver the consistent product quality every month of the year. Our approach is more of a manufacturing model, versus an agricultural endeavor.

He adds that his top two most important contractors on a job are the HVAC, due to the volume of lighting required to control the climate, and the security contractor, who is critical to securing his product and overall operation.

A-1 received a set of project plans and was asked to design a comprehensive Hikvision security system with high-end cameras and NVRs that met the MED storage requirements for 40 days of on- and off-site recording.

Aguilar calls what she does an “art,” and said this project offered her the chance to apply her creativity to design a comprehensive surveillance system to protect Anderson’s investment. Aguilar's top two most important contractors on a job are the HVAC, due to the volume of lighting required

It’s advantageous for growers to buy or build-out larger facilities to increase production. With that comes the demand for high-end, large-scale security systems with impeccable visual quality,” said Aguilar. She adds that growers who’ve used low-end systems often experience higher rates of break-ins, and if a camera has poor image quality it means lack of clear facial features in video images to help identify culprits.

The Boulder Project

The Boulder project began with the complete gutting of an existing two-story building that had previously been used as office space. Renovations included the re-pouring of all concrete with a total construction investment “that cost three to four times what we paid for the building,” said Anderson.

Anderson’s venture into the marijuana industry in Colorado began in 2008, before regulatory standards had been established. “We installed comprehensive security systems before it was ever required,” he said.

Anderson has worked with the MED to establish best practices and guidelines for securing these types of facilities. Initially, Colorado planned to establish a central monitoring station to link IP cameras from all marijuana growers throughout the state. A third-party consultant was brought in to evaluate this proposal and due to the sheer size of the industry, determined the model would use about ten percent of the state’s total bandwidth.

Following that assessment, the Colorado regulatory model for security shifted to a requirement that growers keep 40 days of on-site and 40 days of off-site video recordings per camera, although most entities keep more than that on hand, said Anderson.

The Colorado regulatory model for security states that growers must keep 40 days of on-site and off-site video recordings per camera

Access security footage remotely

Hikvision systems and A-1 security became the standard we use to operate. The Hikvision system offers a better platform that is more affordable then prior systems we used,” said Anderson. With Hikvision’s iVMS-4200 app, Anderson can access footage on his smartphone and PC, and easily show officials what is happening at a moment’s notice.

 “I was an art major with a minor in photography and worked in commercial photography for several years. My mantra is to fill the frame with the image you want,” said Aguilar. “My pet peeve is not using enough cameras to provide good facial recognition or worse, using great megapixel cameras and dumbing them down because the NVR is not powerful enough to handle the camera’s best quality.

Aguilar recommended multiple 32-channel Hikvision NVRs that are not at full capacity, in the unlikely event that a hard drive fails the remaining recorders will continue to work. “I can honestly say the Hikvision recorders have never failed,” said Aguilar. “Being a Hikvision Platinum dealer, A-1 offers a five-year warranty. We feel confident in the system we install without concern that we will need to return to a site just to repair a broken recorder.

the state of Colorado can ask to see recorded footage with little advanced notice
A total of 95 security cameras were used to complete the system, with about half used indoors and the other half placed outside of the facility

Increased throughput, larger capacity

A-1 installed the Hikvision Pro Series DS-9632NI-I8 NVRs, a 32-channel model with 48 terabytes (TB) of internal storage, providing increased throughput and larger capacity to meet MED storage requirements. Aguilar stacks the NVRs and uses an external server, which requires slightly more investment, but offers the client greater bandwidth to stream large amounts of data more quickly.

In Anderson’s case, this is critical since the state of Colorado can ask to see recorded footage with little advanced notice. A total of 95 security cameras were used to complete the system, with about half used indoors and the other half placed outside of the facility for perimeter, outdoor entrance and parking lot surveillance.

Indoor and outdoor capabilities

For indoor coverage, A-1 installed Hikvision’s DS-2CD2135FWD-I 3MP Ultra-Low Light Network Dome camera to cover all rooms containing product, and all exits and entrances, which is an MED requirement. This dome camera is actually designed as an outdoor model, which Aguilar selected for indoor use because of its vandal-proof rating, weather resistance, and clear imagery during day or evening conditions.

Video surveillance covers every square inch of the facility, greatly improving operational efficiency

We can turn off the IR feature in the growing area but leave it on in the hallways and other areas where it can help with image quality (trim, drying, packing, vault, etc.),” said Aguilar. “Weather resistance means no need to worry about chemicals, nutrients, misting or watering, and it is a very hot, humid environment. These are live plants that require all these things to survive and thrive like hothouse tomatoes or tropical plants. And the environment is either very brightly lit or pitch black, mimicking an outdoor environment.

In the grow rooms, lights are placed vertically and each room has rows of product with a three-foot space in between for people to walk while tending plants. A-1 placed indoor cameras at the end of product rows and at accessible wall areas to provide 360-degree coverage.

The building exterior was secured using Hikvision’s DS-2CD2T55FWD-I5 Outdoor Network Bullet camera featuring 5MP of resolution, 120 dB Wide Dynamic Range and Digital Noise Reduction. Aguilar “likes the 5MP varifocal models for parking lots. I install them in crisscross fashion to provide blanket coverage with the capability to zoom in on parking lot entrances.

24/7 efficient video surveillance

Video surveillance covers every square inch of the facility, greatly improving operational efficiency. “The system is great! I can watch my guys at all times from anywhere,” said Anderson. Surveillance cameras record non-stop, 24 hours a day, seven days a week since MED requirements do not allow motion-activated recording.Surveillance cameras record non-stop, 24 hours a day, seven days a week since MED requirements do not allow motion-activated recording

To install the system, A-1 had to overcome challenges associated with an older concrete building that was “built like a bunker” with an architectural accent bar along the roof perimeter. The constraint required them to pipe and core drill through exterior concrete and run wires through conduits or O-rings that were hammer-drilled into the seams every four feet.

The entire Boulder facility is run through a mobile platform. “This project involved a new level of detail and control compared with our previous projects and is a fully-automated monster,” said Anderson. “At our last facility, we had seven growers. The Boulder facility is four times as big as the last one and we only need two growers due to extensive automation.” 14er moved from physical-based labor to web-based controls.

User-friendly remote viewing

The Hikvision iVMS-4200 platform helps 14er with automation by providing better integration, reduced cost and user-friendly remote viewing. “Older systems were built more for an IT or security systems expert, not for clients to have a convenient system they could easily use,” said Anderson. “Hikvision’s iVMS platform helps us keep impeccable records of everything in the cloud, so when the state of Colorado contacts us for immediate access to recordings, we can easily provide them.

A-1 helped to develop standards for video surveillance and storage that have become industry best practice

Achieving the MED-required 40 days of on-site and off-site recordings is a big deal,” said Sofia Aguilar, sales manager and partner at A-1 Security. "With the Hikvision iVMS system they were able to build a platform around Hikvision products, solving the state’s problem of how to record at a reasonable price.

Hikvision worked with technology partner byRemote to develop software that utilizes Hikvision’s iVMS product to record off-site, said Aguilar.

Customers wanted higher-end systems without the cost associated with the old encoders,” said Aguilar. “The Hikvision partnership with byRemote offered exactly what the market demanded.

Powerful video security system 

Aguilar initially had reservations about marijuana as a vertical focus for A-1 Security Systems, believing it was too high-risk and if grower’s operations were shut down, A-1 would quickly lose its customer base. Eventually her business partner, Leif Wulforst, convinced her that marijuana was a viable business.

A-1 helped to develop standards for video surveillance and storage that have become industry best practice. Cultivating a relationship with growers such as Anderson from 14er gardens led to the development of a surveillance system that met strict MED storage regulations while providing ease of viewing for end users and the state regulatory body. Hikvision’s high resolution security cameras combined with its Pro Series NVRs in delivering a high performing solution at an affordable price to help the market thrive.

Download PDF version

In case you missed it

Enhance traditional security systems within your smart home
Enhance traditional security systems within your smart home

Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalise the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly competitive landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved customer engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance traditional security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased market growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide status updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetising smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.

What is the value of "free" video management systems?
What is the value of "free" video management systems?

They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?

The ongoing challenge of IT and data risk management
The ongoing challenge of IT and data risk management

Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf.  The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices.  We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections?  For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organisation. Risk stratification and control objectives  The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective?  The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth.  Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security.  And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet.  Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved.  Multi-factor authentication  Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document.  We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you?  Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources.  In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organisation can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organisation.   So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organisation.  This issue is so important – once we institute risk acceptance, our organisation suddenly starts caring about the vendors and applications we’re looking to engage.  If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions. Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process  In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk?  The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk.  Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organisation? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organisation to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.