Protecting critical infrastructure with IP surveillance

Access & Identity Management Handbook 2014 Access Control & Identity Management

There is currently high investment in the energy sector and as it continues to grow, it looks to IP surveillance to protect its installations. There are however key issues to be taken into consideration when choosing the most appropriate technology. The protection of critical infrastructure is a challenging task. Each part of an installation has its own specific challenges. What they all have in common though is the need to be protected from theft, break down and hostile activity.

Network video offers excellent possibilities for the operator of a plant to integrate security, safety and production control in one system. A system that permits supervision of all processes, video surveillance, intrusion protection and access control from remote sites, several locations and if needed into one centrally located control room.

So, regardless of what other technologies are being used, the network camera should always be the starting point when planning and designing for the surveillance and protection of critical infrastructure.

Protecting long perimeters, monitoring entrances and exits and safeguarding potentially hazardous areas are the main concerns of the security manager. Often they are also intimately involved in guaranteeing uninterrupted production.

Breaking it down

Let’s take this from a macro to micro (or from outside to inside) point of view of a facility and break it down, starting with its perimeter, buildings and process parts.

For perimeter protection, there are many different technologies available to detect an intruder: microwave, fibre-fence sensors, seismic sensors and radar alerts are a few. In especially sensitive situations, when protecting high-risk infrastructure, network cameras can be combined with these other technologies. The additional benefit that the network camera brings to the situation is information about who or what is trespassing but also about what kind of activity that is going on.

Detection is provided by network thermal cameras equipped with intelligent video analytics, these alarms set off a PTZ dome camera that, thanks to HDTV image quality permits us to get details of the intruder thus enabling identification. To ensure recording and as much functionality as possible, each camera is independent and is able to provide information as long as it is connected to the IP-structure. It is wise to analyse the situation at the edge, and in case of communication failure, the camera can record on an embedded SD-card for future analysis.

More precisely, on-board image processing enables thermal cameras to detect the presence of unauthorised persons anywhere across the entire visible area. This is why we talk not only about perimeter protection but also of area protection, within the entire field of view of the camera. A thermal camera works just as well in complete darkness as in daylight, and environmental disturbances, like rain, fog, sun, foliage or small animals, are kept to a minimum thus influencing the intelligent algorithm as little as possible. When using a network thermal camera to verify the alerts from the alarm system you get the information needed to respond with the right resources. Was it an animal, leaves blowing or was there actually a human being trying to sabotage the system? This information is crucial when deciding what action to take and who to send out.

At the centre of the protection of critical infrastructure sites is the alarm system. The alarms coming from various locations within the supply chain are handled at an alarm-monitoring centre. In the centre, the operators handle the alarms according to their instructions. They verify the alarm and then forward the information available to what they judge to be the appropriate response team, which could be a patrolling guard, the police or at times the fire brigade. However, no system is perfect and an anti-intrusion system can under certain conditions give many false alerts.

The protection of energy supplies and key utilities is a difficult task where the distribution system is the most vulnerable part of the supply chain and the costliest to protect. An example, pipelines transporting gas from remotely located exploration sites, over vast unpopulated areas are very difficult to protect. Remote supervision is a must.

The solution lies in combining the human response teams with high technology.

Information from the thermal camera can be enhanced by the interactive support of a PTZ dome camera. These products together give enough information for the operator to make the appropriate decisions. The operators are now able to send out the correct response team, both in numbers and quality. This is what makes the combination of thermal network cameras and PTZ dome network cameras such a versatile combination.

Additionally, the benefit provided by not having to respond to false alarms has proven to be a cost saver.

Critical areas

Along with perimeter access, it is also important to control access and flow within critical areas. Specifically, being able to monitor exits during evacuation to be sure nobody is left inside and potentially in danger. Network video linked to access control systems offers faster and more accurate access management facilitated by instant access to live or recorded video, vocal and data. Image quality permits us to see in lowlight, for example, emergency exit lights are sufficient to provide scene details. Advanced capabilities allow video and audio information connected to an access control system for an intercom, virtual gates, virtual fences, audio detection and people counting in and out of the facility. In cases of obstruction by environmental factors like fog, smoke etc., thermal cameras can be used as well as image enhancing technology on video cameras.

Security is important and so is production continuity

Then, moving down into processes and the monitoring of specific sensitive areas, the protection of those areas, process monitoring and ensuring safety rules are being respected, are all equally important in making the right decision quickly. The most important thing is to be able to know what is going on in all sensitive areas, and at the same time keep efficiency in the production at a high level. In many cases you have to do this for multiple locations simultaneously.

Roy Alves, business development manager MEA, Axis Communications.
Roy Alves, business development manager MEA, Axis Communications.

Handling safety, security and productivity in one integrated system

In addition to the safety and security, from the camera system we can get the benefit of integrating it into your production system, hereby monitoring also production efficiency, network video for visual inspections and remote assistance with planned maintenance. Be sure safety rules are being followed, tools and equipment are being managed properly and processes are followed.

It is important to work with open protocol in order to facilitate the integration of systems, enabling the manufacturer of different devices and software to integrate the various production components in one management system. For example, SCADA systems can integrate network video to provide information on temperature, pressure and speed meters. For example, if you have a control room in a facility where you control the pumping station, live images of sensors can provide visual confirmation not just data.

Solution

The IP infrastructure makes any installation scalable, reliable and future proof. The network video system allows the most advanced solution for both security and productivity, enabling the entire management of a security system from multiple remote sites, company headquarters, private police offices, security manager’s smartphone etc. Networked systems of this kind are especially useful to critical infrastructure operators since it allows them to be present virtually anywhere.

The system works on intelligent video analysis, advanced motion algorithms, virtual gates and virtual fences, and human vs. animal differentiation. It also allows live remote control of people accessing the plant from the perimeter throughout the entire width of the area and crucially, evaluation of potential incidents.

For infrastructure security, it is all a matter of network. Whenever you have an issue in a facility and you need to involve different parties such as the police, fire services or government bodies, the network video system allows two-way communication for security managers, encouraging cooperation among different entities and agencies. With this solution, people can work in parallel with technology for the best possible protection of a facility.

For more information contact Axis Communications, +27 (0)11 548 6780, [email protected], www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Are we over the edge?
SMART Security Solutions Axis Communications SA Hikvision South Africa IoT & Automation
SMART Security Solutions speaks to Axis Communications and Hikvision to learn what is happening on the edge of surveillance solutions. Is everything now in the cloud, or are edge devices still in demand?

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...