Without the proper test tools, troubleshooting PoE issues often includes time consuming phone calls between the cable installer, PSE switch manufacturer and PoE device manufacturer. It can also lead to multiple site revisits to troubleshoot the various components, project delays and cost overruns. Instead of running into these types of situations, having the ability to certify the physical infrastructure as well as perform PoE load tests provides the ability to immediately determine whether an issue is related to the cable or PSE output. Having this information would go a long way to identifying and resolving the root cause of any PoE issue.
Because of the growing importance of PoE in virtually any office or industrial setting, test tools like the TestPro are useful for all three PoE stakeholders – although the type of kit required may vary. Here’s why: Cable installation professionals are concerned with not only the troubleshooting aspects of a multifunction tester, they also need the ability to be able to properly certify cabling for warranty purposes. Because of this, cable installers would want to choose a TestPro kit that provides features such as being able to save cable certification test results and upload them to the TestDataPro management software. This allows the installer to be able to organize and print results to all that need them. On the other hand, security and low voltage datacom integrators along with network administrators may appreciate the ability to perform a standards compliant certification test with view only Pass/Fail indication, without having to incur the cost of a full-blown cable certifier as the ability to save and print certification test results is typically not needed. Combine that with the ability to perform SNR based Multi-gigabit link speed testing as well as BASE-T and Wi-Fi network connectivity testing, and users have a complete, purpose-built smart building test solution.
These are the exact same 6 second certification tests that are run on the more expensive test kits apart from not being able to save or upload test results to the TestDataPro management software. Of course, all PoE-capable test kits also provide that exact same PoE testing capabilities including power load tests that show both RealPower Wattages and precise voltage being received from a PSE over any twisted pair cable, as shown here:
The ability for all PoE stakeholders to have access to the exact test capabilities they require in a single multifunction tool is something unique that AEM brings to the cable test market. These tests can go a long way to avoiding PoE device failure finger pointing. Ultimately, the TestPro has proven to be a wise investment for cable installers, PoE device integrators, network administrators – and anyone else that has a vested interest in maintaining the operational status of PoE endpoints.
In 2022, global security witnessed economic shifts, geopolitical tensions, and a profound impact on the security industry, which is anticipated to continue its growth trajectory
By: asmag.com; E-mail: editorial@asmideast.com
Looking back, security in 2022 operated in a world that saw a slowed recovery from COVID due to various factors, including inflation and geopolitical tensions. Economically speaking, the world had an average GDP growth of 4.1 percent in 2022, dropping from 5.5 percent in 2021, according to the World Bank. Advanced economies such as the U.S. and the Euro area grew 3.8 percent last year, down from 2021’s 5 percent, while emerging markets had a growth of 4.6 percent, down from 2021’s 6.3 percent.
China, meanwhile, registered a 2022 GDP growth of 5.1 percent, down from 9 percent in 2021, due to challenges on several fronts. Domestically, China issued lockdowns in different cities throughout 2022, in response to a rise in COVID cases. Then, there is China’s ongoing real estate crisis–the Chinese government’s effort to regulate the debt limits of major Chinese developers, like the Evergrande Group, had caused the country’s real estate market to tumble. External factors also played a role. Geopolitical tensions between the U.S. and China prompted the U.S. to place severe trade barriers and restrictions against China.
The security market is expected to see growth in 2023 and 2024, with video surveillance equipment predicted to grow by 11.8 percent and 10.2 percent, respectively
Impact on security
So how did these factors play out in security last year? Upon first look, they brought little change to this year’s Security 50. The top 10 global security manufacturers in access control and video surveillance in our 2023 Security 50 ranking are Hikvision Digital Technology, Dahua Technology, ASSA ABLOY, Axis Communications, Motorola Solutions, Allegion, Tiandy, Hanwha Vision (formerly Hanwha Techwin), Uniview Technologies and Aiphone. Hikvision and Dahua remain the world’s largest security companies, with 2022 security product/equipment sales reaching US$9.8 billion and $4.5 billion, respectively (based on the IRS’s 2022 average currency exchange rates). There were two new entrants: China-based smart home solutions provider MEARI and Korean biometric solution provider Union Community.
Yet a surprising part of this year’s Security 50 was the growth list. Of the 17 companies that registered 2022-2021 revenue declines, 12 were Chinese companies. While China companies’ revenue declines were somewhat expected given the environment, the number of companies that inked sales declines, and the magnitude of these declines (by as much as 40.2 percent), still caught us off guard.
Indeed, China’s internal and external challenges mentioned earlier–lockdowns, real estate crisis, and tensions with the U.S.–all played a part. “Chinese government spending was diverted away from other areas, including spending on video surveillance, and towards battling COVID-19 and supporting its economy during these lockdowns. Restrictions lasted much longer than many observers had anticipated, with the Chinese government finally easing its ‘zero Covid’ policy in December 2022,” said Jon Cropley, Principal Analyst, and Josh Woodhouse, Founder of Novaira Insights.
At the same time, U.S.-China tensions, which led to legislation like the National Defense Authorization Act (NDAA) that bans the US government from purchasing video surveillance equipment by Hikvision and Dahua, had caused Western and non-China brands to register a proportional growth in their 2022 revenue. These include VIVOTEK, with a sales increase of 82.48 percent; Hanwha Vision, 47.52 percent; Axis, 36.01 percent; Milestone Systems, 30.43 percent; and IDIS, 22.17 percent. It should be noted that many of the U.S.’s Western allies, for example, the U.K., have also enacted NDAA-like legislation.
“The shift away from Chinese vendors continued at a pace not just in the U.S., but across Northern Europe and countries in Asia including Japan and South Korea. In part, many organizations and systems integrators want to standardize NDAA-compliant equipment to ensure existing and future business in the U.S., while end users are expressing concerns about looming regulations in the EU and Asia, cybersecurity weaknesses, and the potential for reputational damage connected to human rights abuses committed by some of the banned Chinese manufacturers,” said Jamie Barnfield, Senior Sales Director at IDIS Europe.
As for this year, Chinese companies are expected to fare better, even though they are not completely out of the woods yet. “The Chinese market is forecast to recover slightly in 2023 but remain well below its peak in 2021. Growth in demand will be much lower than in the years before the pandemic. At the same time, a weakening exchange rate between the Chinese yuan and US dollar will also dampen growth (when measured in US dollars),” Cropley and Woodhouse said.
The shift away from Chinese vendors continued at a pace not just in the U.S., but across Northern Europe and countries in Asia including Japan and South Korea
Yearly review and preview
For the security market in general, growth is expected this year and next, with Novaira Insights forecasting the market for video surveillance equipment to grow 11.8 percent and 10.2 percent, respectively, in 2023 and 2024.
Industry experts agree with that notion. “We observed some economic growth and expansion in 2023, although it has been unevenly distributed across different regions and sectors. This has had a mixed impact on the security industry,” said Choong Hoon Ha, Chief Sales and Marketing Officer at Hanwha Vision. “Despite the mixed economic impact, the security demands from society and individuals are still rising with the growing need for advanced network-based systems, such as intelligent surveillance cameras. Businesses are willing to invest in security solutions that protect their employees and assets, and even improve business efficiency and productivity by providing business insight.”
“Long-term, sustainable growth is at the heart of our business planning. We plan for 15 percent growth per year on average. And while the market itself is forecast to grow, Axis is again set to outpace it. We’ll achieve this by continuing to broaden our portfolio into new areas, such as intercoms, access control, audio solutions, and so on,” said Ray Mauritsson, CEO of Axis Communications.
Mobile credentials and digital wallets are emerging trends in 2023, providing greater value to end-users and system operators
Trends: AI, cloud, and mobile access more noticeable
As for predominant trends in security, AI and cloud still rank on top.
“Artificial intelligence will continue to provide opportunities for innovation across the industry. Application of AI to data streams from sensor fusion–combining and interpreting inputs from cameras and other sensory devices–will shift security solutions towards proactive capabilities that drive new value. AI’s influence is still in the transformational stage, for certain, but the applicability to the security industry is strong and clear,” said Vince Wenos, Senior VP and CTO of Allegion.
“This year, we have witnessed a growing demand from customers to maximize the capabilities of their cameras and sensors, with a strong emphasis on analytics. The industry continues to embrace the dominant trend of edge analytics, with an increasing number of camera manufacturers expanding their support for this technology,” said William Hinton, Product Line Manager for Video at Genetec.
According to Hanwha, customers are seeking technologies that can help them improve the accuracy of detection, make their video surveillance systems more scalable and cost-effective, and benefit from video analysis.
“In other words, they’re looking for surveillance technology powered by AI and cloud,” Choong said. “Many customers are still in the early stages of adopting AI and cloud-based video surveillance solutions. However, the adoption of these technologies is expected to accelerate in the coming years, as customers see the benefits that they can offer.”
Mobile credentials, meanwhile, have also emerged as a top trend in 2023. “Electronics continue to fuel significant growth for the industry across both hardware and solutions providers. Increasing adoption of mobile credentials and associated readers is providing a healthy lift,” Wenos said. “Mobile credentials continue to gain interest from customers, as they provide greater value to end users and system operators.”
Digital wallets, an offshoot of mobile access, are also gaining traction. “We’re seeing a lot of interest in digital wallets in large, tech-savvy office buildings. The first European rollout of an employee badge in Apple Wallet was at London’s 22 Bishopsgate, touted as the world’s smartest building. 14,000 mobile users at 22 Bishopsgate can now use just their iPhone or Apple Watch to access their offices, plus all the building’s amenities,” said Prabhu Patel, Commercial Director for Physical Access Control Solutions, ASEAN and India, at HID.
Cybersecurity continues to be a hot topic now that more and more devices are online. “For several years we’ve witnessed a growing focus on the cybersecurity of solutions. Customers are aware the risks are rising, demanding robust processes, vigilance, and transparency. When vulnerabilities do occur, vendor transparency is essential, allowing customers to respond as quickly as possible,” Mauritsson said.
Cybersecurity remains a top priority as more devices become online, with a growing focus on robust processes, vigilance, and transparency
Flexible payment
This year, we’re seeing at least two companies offering flexible payment options. These are i-PRO, who announced their FlexPay Financing, and Eagle Eye Networks, who launched their Eagle Eye Camera Direct Complete. The programs aim to help customers achieve more payment flexibility, reduce initial investment, and become more competitive in general.
“In some organizations, an increasing amount of security ops fall under the IT department’s responsibility, and they may have a preference for a greater amount of OPEX compared with the security industry’s typical preference for CAPEX purchases,” Cropley and Woodhouse said. “This type of transition is indicative of a cloud business model transition. However, only the video surveillance vendors themselves know whether the motive behind this is related specifically to products from specific competitors.”
Consolidation vs. smaller start-ups
Meanwhile, two competing forces continue to dominate in security. One is the continued consolidation of the industry. Recent examples include acquisition deals between ACRE and SISCO, Motorola Solutions and Rave Mobile Safety, and IDIS and Costar. Yet on the other hand, we’re also seeing the emergence of smaller companies focusing on cloud and AI. How these forces will play out remains to be seen.
Yet according to Cropley and Woodhouse, there are advantages to the scale of operation. “Each surveillance scenario is unique. Variables include the size of the installation, whether it is indoors or outdoors, and lighting and weather conditions. At the same time, the channel varies considerably by geographic location with a different set of distributors, systems integrators, and installers serving its needs. Large vendors have a range of solutions to meet all scenarios and have the resources to serve different channels in a wide range of geographies,” they said.
The security industry is witnessing both consolidation, as seen in recent acquisition deals, and the emergence of smaller companies focusing on cloud and AI, presenting a dynamic landscape for the future
Prevailing physical security trends in 2023: AI, Mobile Access Control and Integration
While the era of double-digit annual growth appears to be over for video surveillance, factors including AI-related innovations, expanding provision, and demand for more sophisticated analytics, the ongoing shift to IP cameras and improving camera resolution will continue to drive market growth
By: asmag.com; E-mail: editorial@asmideast.com
Memoori’s latest report into The Global Video Surveillance Business explores market prospects for cameras, storage, software & analytics from 2023 to 2028. Our latest estimates, based on a comprehensive analysis of the performance of a total of 322 companies operating in the global market, indicate that it generated revenues totaling $30.4Bn in 2022. We forecast that this market will experience a Compound Annual Growth Rate (CAGR) of 5.7% between 2023 and 2028, with revenues totaling $44.8Bn by 2028.
The AI imperative
The integration of advanced Artificial Intelligence (AI) and Machine Learning into video surveillance is reaching unprecedented levels of maturity. Key drivers of this trend include various factors. First among them are practical Implementations, as earlier discussions on AI in surveillance have moved from theoretical to practical, with more real-world applications coming to the fore. Next, sophisticated analytics offer capabilities that have grown increasingly refined and reliable, reducing false alarms and allowing for more nuanced and actionable insights.
Also, the falling costs of implementing AI and Machine Learning are making these technologies accessible to a broader range of applications. Finally, there’s a widespread rollout of edge-based analytics, based on dedicated AI chip system-on-chip architectures that offers the ability to process data closer to its source, alleviating network bandwidth constraints and helping end-users to minimize the risk of transferring or processing privacy-related data.
We forecast that by 2028, the percentage of network security cameras with onboard AI capabilities is projected to rise from today’s 18% to over 50%. These advancements are fueling new features like object recognition, behavior analysis, and other forms of intelligent monitoring.
As data volumes and the demand for analytics rise, we expect the market for Video Management Software (VMS) & analytics to significantly outpace growth in the wider market, here, we are forecasting growth at an 8.4% CAGR from 2022-2028. Here, the progressive transition to cloud-based analytics driven by requirements to amplify the power of video analytics by leveraging centralized computing resources is set to continue.
By 2028, the percentage of network security cameras with onboard AI capabilities is projected to rise from today’s 18% to over 50%
Access control: Mobile gains traction
Turning to access control, our market forecasts for this year’s analysis are still being finalized, but initial indicators are that Electronic Access Control market growth is set to outpace Video Surveillance market growth for the coming 5 years, reversing the dynamics that have been in play across Physical Security for over a decade. Here, the underlying supply chain and security dynamics are similar, geopolitical uncertainties are having a much more muted impact. Biometrics adoption has been somewhat stalled due to behavioral and attitude changes resulting from COVID, but we see the primary driver for growth is the progressive shift to mobile-based access control.
From a user standpoint, the allure of mobile access control lies in its convenience, enhanced security features, and the flexibility it offers for system administration. Customers, too, are taking note. According to a recent survey on access control trends, 42% of respondents worldwide now have plans in place to upgrade to mobile-ready systems. Our preliminary data aligns with this sentiment, projecting that by the end of 2023, mobile-based systems could constitute around 20% of all newly issued access control credentials for non-residential buildings.
While the transition to mobile-based systems is underway, it isn’t without its own challenges. Privacy and cybersecurity remain key concerns amongst many end users, particularly in cases where personal devices are proposed as the primary means of access control. For this reason, some organizations remain reticent to back the shift, still preferring the use of physical cards to mitigate the risks associated with personal data exposure on mobile devices.
By the end of 2023, mobile-based systems could constitute around 20% of all newly issued access control credentials for non-residential buildings
Tying it all together
As the physical security industry evolves, integration continues to move to the forefront as a business imperative. Rather than maintaining each individual security component (video surveillance, access control, or intruder detection) in individual silos, companies are now looking for new cross-functional efficiencies and value add opportunities across the BIoT. There’s a burgeoning demand from both users and vendors for unified platforms that not only streamline workflows but also enrich data insights by correlating information across domains. Deeper forms of interoperability that span data structures, analytics, identity management, and automation capabilities are emerging, fostered by expanded cross-domain partnering networks and improving API functionality.
One of the key enablers in this transformation is improving the standardization of security data and its metadata. Providing more contextually rich data is needed to inform more intelligent decision-making across these previously siloed systems, and can be invaluable when integrated into a broader security or building management system, enabling more nuanced and responsive actions like selective door locking or lighting adjustments based on occupancy, or scheduling elevator movements to match patterns of people movement within a building, saving energy and enhancing building user experiences.
Legacy systems, proprietary protocols, and the absence of standardized data formats will also continue to act as common roadblocks to integration until such systems are progressively phased out. As the industry moves toward more standardized solutions, and cross-functional expertise grows, we can expect deeper, more seamless integrations to become the norm rather than the exception.
Electronic Access Control market growth is set to outpace Video Surveillance market growth for the coming 5 years, reversing the dynamics that have been in play across Physical Security for over a decade
Looking forward
The physical security market clearly remains in a state of flux, influenced by technological advancements, geopolitical shifts, and an increasing focus on integration and ethics. Companies that can adapt to these changes, innovate, and offer intelligent, integrated solutions are likely to thrive. But this is not a market for the complacent; staying ahead will require constant innovation, ethical considerations, and perhaps most crucially, the ability to adapt to ever-changing conditions.
As the physical security industry evolves, integration continues to move to the forefront as a business imperative
Interview: Swift Wu, General Manager of the International Department at ZKTeco
Swift Wu, General Manager of the International Department at ZKTeco, discusses how the company effectively addressed industry challenges in 2023 and shares key insights on how regions like the Middle East are emerging as hubs that hold great potential for economic growth
By: asmag.com; E-mail: editorial@asmideast.com
Founded in 2007, ZKTeco has long established itself as a leading global provider of hybrid biometric identification technology. In August 2022, the company marked a momentous occasion when ZKTeco successfully became a publicly listed company on the Shenzhen Stock Exchange.
asmag.com: What was 2023 like for ZKTeco? What were the challenges and how was ZKTeco able to respond?
Wu: Looking back at 2023, it was a pivotal year for ZKTeco and the industry as a whole. The world was showing signs of economic recovery. However, global economic performance did not meet expectations. While there were improvements, some sectors like retail lagged behind others in recovery. Some regions continued to grapple with lingering economic deficits, resulting in postponed or canceled government projects. In more extreme cases, rapid currency depreciation led to economic instability. Despite these challenges, certain economies outperformed others, with significant changes seen in lifestyles and business operations. The shift towards remote work and online shopping had a considerable impact on our business, particularly in areas like time attendance systems and other B2B security solutions. While many companies have begun asking their employees to return to the office, we anticipate that some changes in working practices may be permanent. Compounding these difficulties were escalating geopolitical tensions, with some nations in conflict or facing economic sanctions. These global issues led to an influx of vendors branching out into overseas markets to compensate for domestic economic downturns. Many employed a skimming strategy, offering low prices to penetrate new markets. This approach not only disrupted local markets but also threatened the sustainability of local suppliers due to the extremely low-profit margins. ZKTeco, with its longstanding presence in international business, was well-equipped to navigate these challenges.
We anticipate a return to economic stability, particularly in regions like Southeast Asia and the Middle East. These regions are becoming hubs for manufacturing and IT jobs, and we foresee considerable economic growth there
Asmag.com: Can you share some noteworthy accomplishments from the past year?
Wu: In the past year, we at ZKTeco have made strides in expanding our business along both horizontal and vertical dimensions. We consider horizontal expansion as into new business sectors or lines, and vertical expansion as penetrating higher or lower market sectors. In 2023, we focused on establishing a solid foundation for future growth. One of our notable achievements was the investment and development of our next-generation access control systems. These systems, built on universal industrial standards, are fortified with intelligent and flexible functions. To accomplish this, we incorporated multiple advanced technologies, including artificial intelligence (AI), cloud computing, and big data. This integration solidifies our position at the forefront of the industry and offers our clients the most sophisticated solutions. Simultaneously, we’ve made significant progress in our vertical expansion. We are on the verge of launching a new product line that provides real-time managed advertisements, professional digital displays, digital signage, and digital posters. This system is fully enhanced by computer vision technology, addressing the limitations of conventional advertisement placement tools that cannot push correlated advertisements to audiences on demand. In our system, front-end cameras utilize computer vision technology to provide active video analytics. This includes text recognition, pattern recognition, and behavior analysis. Our edge devices then push correlated advertisements to the audience based on these analytics. This technology greatly enhances the accuracy of advertisement placement and provides reliable statistical information to advertisers.
Notable achievements included the investment and development of our next-generation access control systems, fortified with intelligent functions and incorporating advanced technologies like AI, cloud computing, and big data
Asmag.com: How is ZKTeco strategizing for 2024? Where do you see new business opportunities in the market?
Wu: While the world continues to face conflicts and unstable situations, we remain optimistic for 2024. We anticipate a return to economic stability, particularly in regions like Southeast Asia and the Middle East. These regions are becoming hubs for manufacturing and IT jobs, and we foresee considerable economic growth there.
Our strategy for expansion has always centered around localization. We adhere to a management philosophy of decentralization — we believe that providing our branches and departments with autonomy allows them to deliver optimal results, spurred by an effective motivational system. In response to the tense political situations among global superpowers, we’ve invested resources to ensure dual supply chains. This strategy will enable ZKTeco to maintain the production and delivery of our solutions to partners and clients, regardless of external circumstances. As of 2023, our biometric technology is among the top in the industry according to the NIST competition results. We firmly believe that biometrics is the future of human identity authentication and are committed to providing top-notch biometric technology across various solutions and applications. Alongside biometric technology, we believe that cloud-based and SaaS platforms are becoming mainstream. Soon, ZKTeco will launch several SaaS platforms for access control, visitor management, and time-attendance services. This is just the beginning of our journey to provide cloud-based services, with more to come in the next few years. Indeed, 2023 marked an exciting time for advancements in AI technology, with ChatGPT (GPT-4), in particular, garnering global attention. As a technology-based company, we at ZKTeco have embraced these advancements, incorporating AI to enhance our solutions in numerous ways. We are optimistic that the integration of GPT-4 with our existing solutions will result in improved user experiences and more efficient system operations. However, it’s crucial to remember that ChatGPT is just one facet of AI. AI technology as a whole offers a broad range of opportunities to enhance our solutions, and we’ve been keen to leverage these opportunities. For instance, we use AI in our biometric algorithms, where machine learning techniques allow our systems to improve accuracy and performance over time.
The shift towards remote work and online shopping had a considerable impact on our business, particularly in areas like time attendance systems and other B2B security solutions
In an era defined by rapid technological advancements, businesses and individuals are becoming increasingly reliant on the Internet to carry out their day-to-day operations. However, with this increased reliance comes the growing threat of cyber-attacks. As the frequency and sophistication of cyber threats continue to rise, it has become imperative for organizations and individuals to prioritize the security of their internet connections. Ethernet Virtual Private Line offered by SoftNET, a B2B telecommunications company, presents a powerful solution to protect against cyber-attacks and safeguard sensitive data.
Cyber-attacks have emerged as one of the most significant challenges faced by organizations today. Ransomware attacks, data breaches, and other cyber threats have cost companies billions of dollars and compromised the personal information of millions of individuals. Hackers are continuously refining their methods, making it essential for businesses and individuals to adopt robust security measures.
Understanding the Vulnerabilities of Public Internet Lines
Public internet connections, often used by businesses, have inherent vulnerabilities that make them susceptible to cyber-attacks. These connections are shared by multiple users and lack the encryption and security features necessary to safeguard data during transmission. Cybercriminals can exploit these weaknesses to intercept sensitive information, inject malware, and launch distributed denial of service (DDoS) attacks, crippling an organization’s operations.
The Advantages of an Ethernet Virtual Private Line
Ethernet Virtual Private Line offered by SoftNET acts as a fortress for businesses and individuals seeking to fortify their digital presence. With dedicated bandwidth and enhanced security features, an Ethernet Virtual Private Line offers unparalleled advantages in the battle against cyber-attacks.
Enhanced Data Encryption
Ethernet Virtual Private Lines employ robust encryption protocols such as AES 256-bit encryption to protect data as it travels between the user’s network and the destination server. Advanced encryption ensures that even if cybercriminals intercept the data, they cannot convert its contents. SoftNET employs industry-leading encryption standards, offering peace of mind to customers, knowing their data is secure.
Dedicated Bandwidth
Unlike public internet connections that are shared among multiple users, Ethernet Virtual Private Line ensures dedicated bandwidth solely for the customer’s use. This results in faster, more reliable connections and eliminates the risk of performance degradation caused by high user traffic.
Protection from DDoS Attacks
Distributed Denial of Service (DDoS) attacks pose a significant threat to businesses, causing service disruptions and financial losses. Ethernet Virtual Private Line includes built-in DDoS protection, which can detect and mitigate these attacks in real time, ensuring uninterrupted business operations.
Reduced Network Congestion
Public internet connections often suffer from congestion during peak hours, leading to sluggish internet speeds. With Ethernet Virtual Private Line, users can enjoy consistent, high-speed connectivity, leading to improved productivity and efficiency.
Proactive Network Monitoring and Support
SoftNET’s Ethernet Virtual Private Line comes with 24/7 network monitoring and dedicated customer support, ensuring that any potential security threats are detected and resolved promptly. This proactive approach enables businesses to focus on their core operations, confident in the knowledge that their network is in safe hands.
As the cyber threat landscape continues to evolve, businesses and individuals must take proactive steps to safeguard their data and digital assets. Ethernet Virtual Private Line from SoftNET emerges as the ultimate defense against cyber-attacks, offering enhanced security, dedicated bandwidth, and real-time protection from DDoS attacks. By investing in Ethernet Virtual Private Line, customers can mitigate the risk of cyber threats and focus on what matters most – building a thriving, secure, and resilient digital future.
In the era of digital innovation and mobility, lithium-ion batteries are the beating heart of the industry and everyday devices such as phones, laptops, electric bicycles, and scooters. However, does this heart pump excessively “hot” blood at a time when fires associated with these devices are becoming more common, and what is the industry’s response to the need for getting the best of both worlds in terms of energy and safety?
By: Mirza Bahic; mirza.bahic@asmideast.com
Lithium-ion batteries are often revered today as the “engines of the 21st century.” As an important energy storage solution for portable electronic devices and electric vehicles, these devices are a “Promethean” fire for a world that constantly seeks increased mobility, digitalization, connectivity, and sustainability in one package. However, with the widespread use of these devices, there has also come an increased and statistically well-supported danger of fires breaking out in situations that are still unfamiliar to many.
Is the “Flaw” Inherent in the Battery Design Itself?
At its core, lithium-ion batteries consist of multiple smaller cells, each containing two electrodes separated by a separator. These cells facilitate the movement of charged particles, known as lithium ions (hence the name), through a conductive solution between the electrodes. This process involves charging and discharging, allowing the battery to store and release energy, powering a wide range of mobile devices from laptops to electric vehicles.
When a lithium-ion battery is being charged, lithium ions migrate from the positive electrode (cathode) through the conductive electrolyte and move toward the negative electrode (anode), where they are stored. During discharge, the process is reversed, with lithium ions returning to the positive electrode, creating an electric current that powers the device.
The choice of lithium as the primary element in batteries is due to its lightweight nature and high energy density associated with it. Compared to traditional batteries like nickel-cadmium or lead-acid, lithium-ion batteries offer significantly greater energy storage capacity, making them ideal for portable devices requiring long-lasting power.
So, the answer to the question in the title is straightforward: lithium-ion batteries are not inherently unsafe by design. If they are manufactured and used according to industry standards, they are generally considered safe devices. However, it’s important to note that there are inherent risks associated with the operation of lithium-ion batteries, which can be attributed to various factors such as temperature changes, physical damage, overcharging, manufacturing defects, or improper use.
Why Do Lithium-Ion Batteries Pose a Security Risk?
Lithium-ion batteries have quenched the world’s perpetual thirst for portable energy, allowing us to stay connected across the clock, work efficiently, and push new boundaries in transportation. However, along with all the undeniable advantages, these devices also carry concrete safety risks, primarily related to fire outbreaks in fully unexpected situations.
But if we have established that these devices are not inherently unsafe, why are reports of fatal fires and significant material damage spreading through the media like wildfire today? The reason is simple and relates to the law of large numbers – these devices are more popular than ever today, and their rapid adoption has not been accompanied by an equally diligent campaign to raise awareness about their proper handling and incident management.
First and foremost, when lithium-ion batteries become defective or sustain damage, they can pose a significantly greater danger of fire and explosions. Several factors can contribute to battery failure, including improper use and storage or incorrect charging techniques.
Physical impacts such as dropping, crushing, or puncturing the battery can cause damage that compromises the integrity and safety of these devices. External sources of heat, such as open flames or heaters, as well as temperatures exceeding 55 degrees Celsius, can accelerate the deterioration of devices with damaged cells or those with manufacturing defects.
Similarly, charging lithium-ion batteries at temperatures below freezing can lead to the formation of a permanent metal coating of lithium on the anode. This coating increases the risk of battery failure and, consequently, fire incidents.
Therefore, adhering to the manufacturer’s instructions for charging devices and batteries is crucial in preventing damage to these devices. To reduce the risk, some chargers employ a cyclic power supply mechanism to avoid overcharging, while fast chargers often lack this feature, making user vigilance crucial in such cases. Nevertheless, the industry recommendation is to use chargers according to the manufacturer’s instructions to maintain battery safety.
How to Prevent Thermal Runaway?
Essentially, it is crucial to avoid putting the battery in a “faulty” state. However, what if this has already happened without the user’s awareness of the problem?
In the case of battery failure, the heat generated during the operating process can damage nearby cells, triggering a chain reaction known as a thermal runaway. The high energy density of lithium batteries makes them more prone to such reactions. Depending on factors such as the battery’s chemical composition, size, design, types of components, and stored energy capacity, failures in lithium cells can result in chemical reactions and the initiation of combustion, leading to heat release and excessive pressure.
The chemical reactions inside the battery can raise this pressure to a point where the cell walls expand and byproducts leak from the solution. These byproducts include carbon monoxide, carbon dioxide, hydrogen, and hydrocarbons, which are highly flammable and contribute to fire outbreaks and even explosions in lithium-ion batteries.
As an exacerbating factor in battery ignition, combustion can also cause the separation of fluorine from lithium salts in the battery. When mixed with water vapor, fluorine can produce hydrofluoric acid, a highly dangerous substance that can have long-term but initially unnoticeable effects on human health.
Given all the above, it is clear that a comprehensive understanding of these processes and incorporating knowledge of their mechanics is imperative in developing guidelines and best practices for safely handling these devices.
The Ecological Transition and Affordability Fuel the Fires
Seemingly unrelated global events have also had an impact on shifting the spotlight toward lithium-ion batteries as a security risk. After the outbreak of the Covid-19 pandemic, the use of scooters and e-bikes significantly increased, especially in the segment of delivery services and commuting. This sudden surge led to a spike in the price of these transportation devices, prompting individuals to seek manufacturers with lower quality control standards for their battery systems.
Once the market stabilized, the demand for lithium-ion batteries continued to experience significant and rapid growth, primarily driven by the needs of the ecological transition. Li-Bridge, an organization dedicated to the development of a supply chain for lithium-based batteries, states that the global demand for lithium-ion batteries is expected to increase more than fivefold by 2030.
This demand is closely followed by the rising number of associated fire incidents. According to insurance company Zurich, in 2021 alone, there was an increase of nearly 150% in the number of fires caused by lithium-ion battery explosions in e-scooters and e-bikes. Simultaneously, the number of such fires continued to rise by an additional 28% by the end of September 2022 compared to the monthly average in 2021.
The city of New York can serve as a litmus test for dominant safety trends in this market. In 2019, there were 30 fires attributed to the use of batteries in electric bikes or scooters in New York. A year later, this number increased to over 40. By 2021, the frequency of fires more than doubled, reaching a total of 104 incidents in just this city.
Ultimately, by the end of 2022, lithium-ion batteries were identified as the cause of 220 fires in New York, resulting in six fatalities and 147 injuries. These figures have prompted emergency services to seek professional assistance in identifying the causes of these occurrences to reduce their frequency.
Delayed Fires as a Unique Firefighting Challenge
One of the major causes of fires in electric vehicles and scooters is traffic accidents that result in battery damage. They can lead to the rupture of battery cells, causing internal short circuits and accompanying fires. Unlike vehicles with conventional engines, electric vehicles experience a unique phenomenon of “delayed” fires after a collision, which poses a specific risk for emergency services that are only just becoming familiar with this occurrence.
Pioneering research in this field was conducted by the National Transportation Safety Board (NTSB) in the United States. The Board investigated several incidents involving delayed ignition of lithium-ion batteries in electric vehicles. Instead of the expected battery ignition during or immediately after the collision, it was observed that the vehicles caught fire several hours or even several days after the incident.
For example, in Lake Forest, California, an electric SUV crashed into a residential garage and caught fire. Firefighters initially had to use an unusually large amount of water (over 70,000 liters) on the fire, which continued to burn for at least two hours. It was only when they lifted the vehicle to directly extinguish the flaming battery that the temperature dropped sufficiently to safely remove the vehicle from the scene. However, during transportation on a semi-trailer truck, the battery reignited spontaneously. A similar case occurred in Mountain View in the same region, except that the vehicle’s battery caused a delayed fire at the disposal site five days after the accident.
While there is no clear evidence indicating that electric vehicles are more prone to fires compared to conventional vehicles, the associated thermal runaway process in lithium-ion batteries can be delayed or slowed down to the point of being literally imperceptible. In fact, the initial impact and battery damage can trigger a slow but inevitable chain reaction, ultimately leading to unexpected fires after prolonged intervals, particularly in locations such as salvage yards or vehicle storage areas.
Equally important is the risk faced by truck drivers transporting vehicles with damaged lithium-ion batteries. They are exposed to the possibility of sudden and delayed fires, which can easily spread to other vehicles and further complicate the task for firefighters.
Unquenchable Thirst and Prolonged Interventions
Another important issue related to extinguishing fires on vehicles with lithium-ion batteries involves the availability of abnormally large amounts of water and the length of interventions that “trap” personnel in the field longer than usual. Experts point out that in some cases, extinguishing a fire on an electric vehicle may require as much as 110,000 liters of water. This amount may vary, but many fire departments are already unable to rely on using the same amount of water for interventions on electric vehicles as they would for typical building fires.
The Sinking of the Felicity Ace: Did Electric Vehicles Hinder Firefighting Efforts?
It’s not just trucks and logistical infrastructure that are at risk from the specific fire hazards associated with lithium-ion battery vehicles. On March 1, 2022, the cargo ship Felicity Ace sank near the Azores in the Atlantic Ocean, resulting in the loss of approximately 3,965 automobiles. It is estimated that around 300 electric vehicles were found among them which presented an additional challenge in firefighting efforts because suppressing flames on lithium-ion batteries requires the use of large quantities of dry chemicals such as ABC powder, carbon dioxide, powdered graphite, and sodium carbonate. The crew had to abandon the ship as the attempts to extinguish the fire with water alone proved ineffective. At the same time, cargo ships and ferries are particularly susceptible to such fires due to their internal configuration i.e. the lack of internal compartments which facilitates the rapid spread of fire to other vehicles.
Illegal Vehicle Modifications as a Complicating Factor
In the midst of the authentic boom in the use of scooters with lithium-ion batteries, emergency services face a new challenge in the form of illegal activities associated with this trend. An illustrative example is a tragic incident that occurred on January 1, 2023, in a residential block in the British city of Bristol, resulting in the death of one person and the hospitalization of eight others. The investigation revealed that a fire broke out in the hallway of an apartment, with an amateurishly modified e-bike with a lithium battery identified as the cause. Local authorities attributed this to the growing trend of using conversion kits, which allow for retrofitting electric motors onto standard bicycles. These kits often lack proper batteries, tempting consumers to purchase cheaper alternatives and unverified chargers online that do not always adhere to industrial safety standards. Due to the increased likelihood of malfunctions in these non-standard batteries, the risk of fire is significantly heightened.
Underground Garages and Landfills Are at an Increased Risk
The increasing use of lithium-ion batteries in transport vehicles such as e-bikes and e-scooters has caused real concern among safety professionals due to frequent fire incidents caused by these products. Furthermore, as the global transition to zero-emission vehicles gains momentum, there are concerns about the potential risks posed by underground parking lots. These locations are now filled with electric cars and chargers and are not always easily accessible for firefighting operations.
Alarms have been raised in some countries: after a significant increase in the number of fires caused by e-bikes and e-scooters in London (from eight to 59 cases in just two years), the local transport regulator has called for a ban on the use of private e-vehicles on subway and buses.
At the same time, the Environmental Services Association (ESA) warned that these batteries are dangerous even when they are not in active use, as they can be damaged during disposal in landfills or preparation for recycling. This is primarily associated with the risk of lithium-ion batteries being crushed, broken, or exposed to weather conditions, which facilitates self-ignition or explosions.
At the same time, lithium-ion batteries have become prevalent enough in everyday life that users now dispose of them together with regular waste and other recyclable materials, even though they are essentially ticking fire bombs in this state.
Experts emphasize the importance of separate and proper recycling of lithium-ion batteries, along with their safe disposal outside inhabited areas and adequate protection from weather conditions. Damaged batteries are a particular source of risk as they must be disposed of separately and stored in containers filled with sand or other inert materials such as vermiculite.
Data Centers Are Seeking Solutions in the Redesign of Their Facilities
Lithium-ion batteries have been identified as the main suspect in several devastating fires in data centers. One such incident occurred in early 2021 when OVHcloud, a major European cloud service provider, lost one of its centers in Strasbourg due to a fire. It is also believed that the destructive fire at the Maxnod center in France in March was caused by the ignition of a lithium-ion battery. In light of the potential risks associated with lithium-ion batteries in these facilities, experts emphasize the importance of their functional redesign. This primarily involves relocating lithium-ion batteries to dedicated rooms equipped with fire-resistant walls and ceilings. Simultaneously, fire suppression systems using foam would be introduced instead of water-based systems.
The Industry Responds: A Regulatory or Technological Offensive?
At this moment, it seems that government regulators and the industry are competing to find a universal solution to the “inflammatory” issue of lithium-ion batteries. The solution appears to lie in a fusion of both approaches, with pioneering steps being taken by countries with the highest number of users and, consequently, incidents related to these devices. For example, in the United States, there is an initiative underway to pass consumer standards legislation for lithium-ion batteries. The goal is to establish safety standards for batteries in electric scooters and bicycles, including guidelines for consumer protection. Regulators have emphasized the need for global regulation of the distribution of these batteries from different countries, including those from China, which is undoubtedly yet another echo of the ongoing trade war between the US and China.
Unlike regulation, the user education segment has likely made the most progress in fire prevention. Best practices for protection are generally well-known and include avoiding exposing lithium-ion batteries to extreme temperatures and minimizing overnight and continuous charging. Choosing reputable brands and using original charging devices is another important step in mitigating fire risks. During charging, experts believe that it is crucial to ensure adequate air circulation to prevent heat buildup. It is also advisable to keep and charge electric vehicles outside enclosed spaces, ideally in a dedicated isolated area that local authorities should allocate for this purpose.
Government efforts aimed at preventing loss of life and property can also involve enacting standardized storage and handling procedures for lithium-ion batteries, especially during transit on ships or trucks following traffic accidents.
Lastly, the security industry itself has almost unlimited potential to offer solutions for various risks, including new or lesser-known ones. Early detection of unexpected and delayed battery fires can be ensured through 24/7 monitoring of device transportation, aided by thermal scanners, gas detectors, heat and smoke sensors, and CCTV cameras. Additionally, the industry can provide specialized training for personnel involved in battery handling and fire suppression procedures based on previous experiences with such incidents. It is clear to everyone that if we want the technological torch of lithium-ion batteries to continue to illuminate the path ahead, we must take their countless benefits as seriously as the safety of all user groups that want to tread on it.
Apricum, a prominent Croatian company specializing in digital and green technology solutions, is delighted to announce its successful selection for an EU-funded project aimed at enhancing competitiveness through investments in the digital and green transition. The project, aptly named “Strengthening Competitiveness through Investments in Digital and Green Transition,” will empower Apricum to strengthen its production capabilities, stimulate market growth, and adapt to evolving industry trends while building on its know-how, certification, and international presence.
Apricum has been allocated a generous budget of HRK 11,274,403.38 (EUR 1,496,462.83503078) to implement cutting-edge digital and green technologies that are supposed to revolutionize its business model and foster sustainable growth. The primary objectives of this initiative include optimizing production processes, ensuring resource efficiency, minimizing waste generation, and establishing long-term market resilience.
KNX Systems at the Helm of Smart Homes
By embracing innovation and digitalization, Apricum intends to streamline its manufacturing processes while promoting a greener and more efficient approach to the production of KNX devices. Today, many smart homes are managed through the worldwide standardized system for building automation, KNX. In short, this means intelligently networking all devices in a building and controlling them from one or various locations, whether by mobile phone, tablet, or computer via the internet (Wi-Fi). This has been part of Apricum’s story from its earliest days as the company has been at the forefront of manufacturing components, modules, and complete KNX devices in Southeast Europe for many years.
Their share in the KNX bus system is a key building block in addressing tomorrow’s climate challenges. By spreading the KNX system, Apricum helps to achieve energy savings of up to 60%.
Apricum has successfully met the high-quality requirements of leading manufacturers, as proven through various audits. Furthermore, they are repeatedly certified in accordance with ISO 9001:2015 and ISO 14001:2015. The European Union had already recognized their achievements and innovation in high-tech solutions by co-funding the APRICUM-SECURE project – a module for secure encrypted management and electronic monitoring of infrastructure.
Apricum takes pride in its role as the lead applicant for this project. Its company members have more than 30 years of experience in developing KNX devices and maintaining the system.
Leveraging its expertise in developing KNX devices and supplying electronic components for smart home and infrastructure management, Apricum has consistently invested in advanced technology and human resources to enhance its product offerings.
Recognizing the importance of aligning production processes, business functions, and workforce with optimized technology and process management, this project aims to improve just that.
Part of the project is ensuring Apricum’s ongoing success and adaptability in the face of technological disruptions caused by the ongoing armed and trade conflicts, shortages, and inflation.
Digital Transition Will Minimize Human Errors and Waste Production Simultaneously
The project will contribute to the digital transition through various activities.
These include innovating component preparation processes, and implementing software solutions for optimizing and automating processes in a dedicated shop floor. Additionally, software-managed digital pick-and-place machines will enhance process tracking and optimization. The company will also innovate automatic and manual component assembly processes, integrating software solutions to reduce human error and minimize production waste.
Apricum will focus on integrating all manufacturing steps and thereby enhancing final product quality. By using state-of-the-art solder print systems, the need for cleaning and misprints is reduced, reducing waste and facilitating recycling. Reliable and precise pick and place machines avoid waste of components, saving resources. Modern automated optical inspection systems and intelligent reflow soldering ovens ensure minimum energy consumption combined with maximum production quality with high first yield rates.
The project includes the procurement of advanced equipment and software for digitizing the whole manufacturing process, enabling full traceability, and ensuring controlled quality.
Apricum will innovate the product end-assembly processes by implementing software solutions for machine management and process optimization. The project will also involve the integration of new digital technologies for product labeling and packaging, including efficient laser management software and engraving equipment.
The comprehensive digital transformation of Apricum will encompass production and related business functions. This includes integrating software solutions for document and project management, file management, and operational process optimization. Software for accounting process innovation and synchronization with the production process, machine management, and optimization, tracking the pick and place machine workflow, and optimizing business processes will be implemented.
From Germany to China: Strengthening Apricum’s International Presence
In addition to its remarkable achievements in the field of digital and green technology solutions, Apricum has also made significant strides in expanding its workforce and establishing an international presence. With its headquarters in Split, Croatia, Apricum has been successful in creating employment opportunities and fostering a diverse team of professionals dedicated to driving the company’s growth.
Currently, Apricum employs 40 individuals in its Split location, comprising the production department. Meanwhile, the company’s development segment is based in Germany, where it has witnessed substantial growth and assembled an international team. Alongside Germans and Croatians, Apricum now proudly boasts employees from Iran, Spain, and China, among other nationalities.
China stands as the largest buyer of Apricum’s products, accounting for an impressive 70% of the company’s output. The construction boom in China has created an extraordinary demand for Apricum’s offerings.
Finally, Apricum is thrilled to embark on this transformative project, which will not only enhance its competitive position but also contribute to the broader digital and green transition objectives set by the European Union. By embracing digital technologies and sustainable practices, Apricum is committed to creating a greener and more efficient future for the benefit of its customers.
About Apricum
Apricum is a leading Croatian company specializing in digital and green technology solutions. With a focus on developing KNX technology and electronic components for smart home and infrastructure management, Apricum strives to deliver innovative and sustainable solutions to its customers. Apricum is committed to driving the digital and green transition in its industry through cutting-edge technologies and forward-thinking approaches.
When buying a security system, decisions often come down to the price tag of cameras, storage, and installation, yet taking this approach can leave the end user with major challenges ahead. Surveillance systems last anywhere from five to 20+ years, so condensing all cost considerations down to the initial expense fails to consider the bigger picture.
The initial costs to purchase and set up a security system tend to account for just 30% of the total costs experienced during the lifetime of the system – also known as the total cost of ownership. Despite this, many end users may even make their decision based on the price of cameras alone. In effect, they are making their choice with just a 10-15% view of the total security system costs. The reality is that roughly 70% of expenses come after the system has been installed. Sadly, these can come as a nasty surprise for those end users who have not considered the indirect security system costs.
Taking some time to think about how the system will be used and the costs associated with that use can create significant savings in the long run. Initial choices – such as the type of device to deploy –impact future expenses, from power consumption to monitoring and maintenance. While we’ll focus on cameras specifically here, this principle applies to any device within a surveillance system. Considering the total cost of ownership will help you to identify the questions to ask as you make your decision on which new security system to purchase.
Look Beyond the Cameras’ Price Tag
Filtering is an important step in the purchase process: setting out your surveillance requirements and the available budget is key to narrowing down your choices. Unfortunately, too many initial conversations around requirements focus on the cameras alone, without considering the broader requirements of the system as a whole – from energy use to storage needs.
It might be tempting to focus the budget conversation on cameras, rather than where money will need to be spent to operate and maintain those cameras. Yet the security system will need to support your needs for the foreseeable future. It’s worth remembering that the costs to operate, monitor and maintain certain cameras often exceed the devices themselves and must therefore be weighed up before the purchase is made.
Forecasting Storage Costs
If you’re in the market for a new surveillance system, it’s very likely that you’ll need to consider how to store footage once recorded. On average, legislation requires potential evidence to be stored for a month. Yet in some regions or use cases, this is extended to 180 days – making storage a considerable factor in overall security system costs.
To avoid being caught out with significant server and electricity expenses after cameras are installed, it’s critical to consider the different storage costs associated with each camera model you’re considering. It can be a false economy to purchase cheaper cameras to cut down the initial outlay if they come with vast storage requirements, forcing you to spend more on servers and energy costs in the long run.
Equally, if you plan to reduce storage costs by shrinking the size of the video stored, you will need to carefully choose the right devices to ensure that compressing the video doesn’t compromise evidence quality by pixelating or blurring images to the point that it’s no longer possible to identify a suspect. Ending up with poor-quality footage that cannot act as useful evidence can defeat your objective of installing the security system in the first place. Some cameras come with sophisticated technology that can reserve all the important forensic detail you need while lowering bandwidth and storage requirements, and therefore long-term costs. It’s worth checking any claims of high-quality footage with low storage requirements before you install the system to ensure it meets your expectations.
Each set of requirements is unique. For example, you may require high-quality images even in the dark. While some cameras might compensate for low light levels by increasing the gain and therefore, storage requirements and costs, other options use alternative light-optimizing technologies that do not have the same large-scale impact on storage costs. They might even help you to save your budget by removing the need for additional external lighting.
Anticipating All Indirect Costs
The type of device you choose will influence costs far beyond storage. To forecast the full security system cost, monitoring, maintenance, and electricity use must also be considered.
Once you crunch the numbers, the costs can start to build up quite quickly but crucially, the devices you choose will have a knock-on impact on the extent of these figures. Opting for more economical cameras and devices at the start can result in staggering indirect costs. By contrast, choosing higher-quality cameras and devices at the outset can enable you to cut those indirect security system costs in the long term, introducing savings that you can use to reinvest in and grow your business faster.
As one example, owners of surveillance systems installed in tough environmental conditions, such as a maritime port or chemical plant, may face significant maintenance bills to clean salt water and dust off cameras. By upgrading to more sophisticated cameras that offer remote cleaning functions, or have been designed with self-cleaning materials and components, such as a hydrophilic dome, they can reduce the maintenance – and therefore costs – required.
Turning a Purchase Into an Investment
By considering how your initial decision on which type of camera to buy can impact the chain of future costs, you can shift the purchasing decision into an investment. Achieving this can be as simple as asking yourself just a few questions.
The first concerns the features you want to get with the camera, as well as the need for storage space that getting such a camera entails. Another question concerns the projected costs of powering such a system in the long run. It is important to get a picture of the role of supporting technologies in the camera in the formation of total costs. Finally, it is worth looking at their share in general costs.
The question ‘How much does a security system cost?’ goes far beyond the initial purchase. Making the right choice for you based on the bigger picture can mean a slightly higher initial outlay, but it pays itself back in the long run.
In short, taking the time to ask the right questions at the outset – and finding partners who are open to answering those questions and helping you calculate the long-term costs – allows you to avoid any nasty surprises in future electricity, storage, operational, or maintenance costs. Importantly, it will also ensure that you end up with the security system that is right for your specific requirements.
Five Steps to Optimize Your Investment
Deciding which security system to purchase demands careful consideration. After all, security systems can last for five years or more, so weighing up all relevant factors at the start can lead to significant cost savings and an improved return on your investment (ROI) in the long run. While it may feel daunting, there are five straightforward steps you can follow to ensure you are making the most of your investment. Following these steps enables you to decide on the right security system for your organization, while also optimizing your investment.
Choose the Camera According to the Value It Adds
It may seem obvious but as an initial step, ask yourself “Why are you buying cameras?” Device price and features are important considerations, but it’s vital to understand what your organization needs the cameras to do before you start to weigh up the value of the different functions on offer in each.
Clarity here is vital to figuring out if the cameras on your shortlist will perform in the way you need or provide the evidence you require. For example, are you installing a security system to protect profits in a retail environment by tackling theft and fraud? Are you aiming to optimize production and avoid downtime in a factory? Or are you looking to ensure the safety and security of your employees and passengers in a public transport setting?
There are many different ways in which security systems can be deployed to help your organization – from improving security to creating business value. Narrowing down why exactly you are purchasing the system is a key first step to ensuring you are set up to optimize your investment.
Calculate How the Device Influences the Rest of the System
Next, you will need to figure out how your camera choice affects the rest of the system. Storage is an obvious factor in this calculation. More inexpensive cameras may seem appealing but if their compression technology is limited to reducing bitrate to lower bandwidth and storage requirements, that saving comes at the cost of quality footage – jeopardizing the very reason you’re installing the system in the first place. On the other hand, more sophisticated cameras may have a higher initial cost but come equipped with intelligent algorithms that preserve relevant forensic information in full resolution and at a full frame rate while requiring a lot less storage space. As a result, you can recoup the initial price through lower storage costs in the years to come.
Yet storage requirements and costs are only one piece of the calculation to consider at this point. What about ease of installation? Or how fast it will be to configure the devices and add everything to your system?
It’s also worth thinking about what accessories you will require to ensure the security system meets your objectives if you choose certain camera models. For example, if the cameras you have chosen require extra accessories to mount, this will have a knock-on impact on installation – making it slower and more costly than initially predicted. If you realize this on the day of installation, there is a significant risk of delays to the whole project. To optimize a security system investment, the full picture of all costs – not just the devices themselves – is important.
Estimate the Cost of Using and Running the System
It’s also important to ask, ‘What happens once the system is up and running?’ This step is often overlooked: some may accept the system’s operational costs as the natural cost of doing business, while others may not put too much thought into it if it ends up under another department’s budget. Yet spending some time to think about the costs required to keep the system up and running is important for all decision-makers involved in purchasing a security system: it’s where the bigger losses creep in. While it might not affect you or your department directly, it impacts your organization. And if your company loses money through the system’s high running costs, it could eventually impact your budget too.
This means that it is worth thinking about the electricity usage, required maintenance and the costs of monitoring the system. But how can the different cameras in your shortlist affect these costs? You can assess this by writing down a few key questions.
First, you need to consider how much power your cameras use and how this might affect your electricity bill? On a related note, how much storage do you need for specific cameras and how does that affect your electricity costs in the long run? Finally, you need to know if the cameras offer any smart functionality to reduce the overall cost. For example, do they offer superior analytics performance such as deep learning and edge analytics, reducing false alarms and speeding up forensic search to reduce operational costs? The devices you choose will ultimately impact all the costs to come throughout the security system’s lifecycle.
Predict the Impact the System Will Have on the Business
Once you have mapped out the bigger picture cost implications for the cameras on your shortlist, consider the end result: how will the system help your business? Will it drive greater efficiency, reduce theft, improve the service you provide to customers, and improve employee retention by creating a safer workplace?
Ultimately, the correct security system for your organization can create business value, which translates to improving the bottom line. It’s important to quantify how the security system will impact your business so you can weigh those benefits up against the total costs when making your decision.
Thinking this through often involves collaboration across departments, ensuring the bigger picture of the system’s impact on the business as a whole is considered. As an added benefit, cross-departmental cooperation also opens up the possibility of tapping into bigger budgets and getting additional buy-in on the surveillance system as well as the advantages it can bring to the business.
Make the Best Decision for Your Organization
This final step is about evaluating the information you have uncovered in the previous stages and factoring all of those insights into your final decision. As long as you are taking some new insight from this process, whether considering the value added of the device you are choosing or calculating its associated running costs, you are taking a step in the right direction – moving from purchasing a security system to making an investment that can reap better rewards for your organization.
Completing this exercise of working through the various scenarios attached to purchasing different security devices will set you up to optimize the system you buy to your company’s benefit. Rather than making a choice based on upfront cost, you are making a decision with the long-term view in mind and reducing the risk of unpleasant surprise costs cropping up in the years to come.
Working with the right partner to select the right system
Importantly, you don’t need to do this alone. The process of asking these questions helps you identify which partners are invested in your organization’s long-term success. It’s critical to find the right partner who will work through these scenarios with you to find the system that works in your best interest – both in terms of a total cost of ownership that works for you and a system that meets your requirements to drive long-term value.
Fiber Sensys, part of the OPTEX Group, a leading sensor manufacturers for more than 40 years, has launched EchoPoint Distributed Acoustic Sensors (DAS) for advanced intrusion detection across the highest security sites
The latest evolution in fiber optic sensing technology, the new EchoPoint series utilizes intelligent detection algorithms to provide point detection of +/- 6m in a range of up to 100km. This highly accurate and reliable detection makes the sensors ideal for large perimeters and high-security sites, such as airports, logistic centers, railways, and critical infrastructure, and to protect data conduits and pipelines, where being able to locate and identify the precise point of intrusion is critical.
Advanced Algorithms
Thanks to its highly advanced pattern-recognition classification algorithm, the sensors are able to distinguish between common causes of false and nuisance alarms, such as wildlife and environmental conditions, and genuine intrusion attempts. The system is also immune to electromagnetic interference (EMI), radio frequency interference (RFI), and lightning providing a reliable and safe solution.
The flexibility and versatility of the EchoPoint series are such that they can be operated across multiple applications – installed on fences, buried, or in a hybrid layout. When mounted on a fence, the sensors can identify someone cutting the fence or attempting to climb it. When buried, the system can differentiate between footsteps, manual and machine digging, and vehicle movements.
To meet the individual needs of every site, the EchoPoint series features intelligent software zoning. This means different detection zones can be configured, with the ability to independently adjust the sensitivity and output within each zone, helping to provide maximum capture rates and minimize nuisance alarms.
Protection of Large Sites
Masaya Kida, Managing Director of OPTEX EMEA, says the new EchoPoint series has been developed to provide extremely advanced intrusion detection: “By utilizing the latest fibre optic sensing technology and highly intelligent classification algorithms, the new EchoPoint series is ideally suited to protect large sites where pinpoint intrusion location and detection is required to protect people, assets and infrastructure, and maintain business operations.”
When installed in a loop configuration, the sensors provide cut tolerance, so even if a sensor is cut or disconnected, the system will continue to operate. It can also feature dual redundancy so that in the unlikely event of a processor failure, the second processor will automatically take over to ensure the wider security system is maintained and remains operational. With an average lifespan of 20 years, EchoPoint DAS provides a cost-effective and future-proof sensing solution.
VALAMAR Riviera d.d. is the first and largest hotel chain in Croatia and the leading tourism company. It runs 36 hotels and resorts and 15 camping resorts on the Adriatic coast in Istria, on the islands of Krk and Rab, and in Makarska and Dubrovnik. In order to offer the holiday guests a consistently high standard of culinary quality, Valamar has opened a central purchasing department with modern food production called “Vinez” in Rabac, for supplying its tourist facilities from there according to HACCP standards.
Reliable Products From MSR-Electronic
In addition to the modern technology of the production plant, also called a large-scale catering kitchen, Valamar relies on products from MSR-Electronic: a reliable stationary LPG gas warning system from MSR-Electronic.
The PolyGard2 gas sensors not only reliably monitor LPG gas leaks in the production plant, but above all protect the people in this area from dangerous gas concentrations. LPG as a fossil fuel is often used for heating or cooking purposes.
C2 Exchangeable Sensors of the PolyGard2
The LPG gas sensor with digitized measured value processing, temperature compensation and self-monitoring for continuous monitoring of the ambient air is easily replaceable for recalibration on site.
The Sensor Cartridge SC2 includes a Pellistor sensor element, an amplifier, and a µController for measured values processing. All data and measured values of the sensor element are stored fail-safe in the µController and transmitted digitally via the local bus to the sensor board – in the case of Valamar to the Sensor Board SB2 by MSR.
The calibration management is also integrated into the µController of the Sensor Cartridge. Calibration is done by: simply replacing the Sensor Cartridge and using the comfortable, integrated calibration routine directly at the system.
GC-06 Gas Controller
The gas controller is designed in accordance with the standard EN 50545-1 and can monitor and evaluate up to 100 gas sensors, 96 of them PolyGard2 digital and/or 4 of them analog (4–20 mA) sensors. 4 free adjustable alarm thresholds are provided per sensor. For the alarm messages, the controller offers 4 alarm relays with potential-free change-over contact and two analog outputs with a 4–20 mA signal. A separate relay is integrated for fault message.
With the extension modules EP-06, the Gas Controller can manage up to: 32 analog gas sensors, 32 alarm relays, and 16 analog outputs. For the main and field bus outputs there is an integrated overload and reverse polarity protection.
The free adjustable parameters and set points enable very flexible use in many applications of the gas measuring technique. Simple and comfortable commissioning, however, is granted by the configuration with default parameters.
In the event of an incident, MSR-Electronic gas warning systems alert the production staff, close the gas supply via the solenoid valve, and in parallel send an alarm signal via the fire alarm control panel to the fire brigade.
Data centers are like many mission-critical facilities, overwhelmed by an ever-increasing volume of data generated by many siloed safety and security systems. While all these systems provide valuable information, the sheer volume of unfiltered and uncorrelated inputs results in data “noise” that drowns out what’s essential and overloads operators.
By Prasanth Aby Thomas, asmag.com
“Today, more data centers are implementing situational awareness platforms that allow operators to focus on critical insights and execute the necessary actions to help protect what matters most,” explains Alan Stoddard, President of Cognyte Situational Intelligence Solutions. “These types of technologies identify the data needed to protect an organization’s most significant assets — in this case, network infrastructure — and are also part of the power of the intelligent security operations center.”
Additionally, the data visualization framework empowers security leaders to present historical data from systems into a live dashboard. With this type of centralized, real-time view, security teams can transform the way they track, visualize, analyze, and reach their security goals.
Focus beyond the data in data centers
Data centers should consider deploying the same types of countermeasures that you would in any mission-critical facility, such as multi-factor authentication, anomaly detection, identity management, access control, and video surveillance.
But John Rezzonico, CEO of Edge360, points out that often the focus is still on the data security side. If the same protocols in establishing cybersecurity measures were used across physical security, these facilities would be better prepared to protect physical assets from threats.
“It’s also crucial for data centers to closely evaluate their video management platforms to ensure they can scale as risks and needs evolve,” Rezzonico said. “New VMS solutions today are built on modern IT infrastructure and containerization. A containerized system leads to better security because full-application isolation makes it possible to set each application’s primary process in separate containers. This also provides ease of maintenance and sustainment across an enterprise, which is more important when maintaining critical systems remotely.”
Physical security without compromising cybersecurity
While physical security integrators do need to look beyond data to get their work done, this should come at the cost of cybersecurity. In fact, ensuring both physical and cyber security with equal importance should become a prerogative for integrators because of the interconnected nature of modern devices.
“Security integrators need to ensure the vendors they are working with follow a security-first strategy when developing physical security systems,” Stoddard said. “Manufacturers should be providing physical security products that are cyber secure and tested regularly to ensure optimal compliance. This is non-negotiable in today’s evolving risk environment.”
Cyber security and physical security go together, and integrators need to know how to consider the impact of both physical and cyber breaches as part of their deployments. They must invest in understanding both sides of the security equation to deliver comprehensive service to mission-critical businesses like data centers. If not, they are opening the door to risk.
What integrators should know
Worldwide IT spending is projected to total $4.5 trillion in 2022, an increase of 3 percent from 2021, according to the latest forecast by Gartner. Spending on data center systems is forecast to experience the strongest growth of all segments in 2022 at 11.1 percent. This suggests the potential growth for physical security in this segment.
But while data centers offer a great business opportunity for security systems integrators, they need to make the customer realize its relevance. It’s essential for security integrators to work closely with the customer to make sure they know the considerations that need to be completed and the requirements for physical security within these complex environments.
“If integrators cannot teach the customer why they need to deploy the protections necessary, they shouldn’t be working within the data center market,” Rezzonico said. “To be truly successful in this market, integrators must understand the needs of the market and facilities as it relates to physical security and the customer’s complete business strategy.”
In short, to take advantage of the demand in this sector, integrators must have a clear understanding of the market and should be able to impart this knowledge to the customer. There are a number of solutions at their disposal for data center projects, but working with the unique requirements of each customer would prove to be the key.
Data centers often receive more attention for cybersecurity because of the nature of the assets they hold. While this is important, it leaves the physical side of things vulnerable to theft, robbery, and vandalism. Post the pandemic, this has become an even more critical issue because of the increased amount of data entrusted to these places.
The seriousness of the situation is not lost on most major data center managers. A quick search on Google for data center physical security would throw up specific pages on how AWS and Microsoft Azure protect their sites. That these companies feel the need to explain the measures they take indicates the severity of the matter.
But the biggest challenge in protecting data centers is the rapid pace at which they grow and evolve. Integrating physical and logical systems in such a dynamic environment requires careful consideration of various factors and optimized strategy. Asmag.com spoke to some of the top industry professionals to understand the biggest threats to data centers and how integrators can go about protecting them.
Major threats to data centers
Most data centers focus on software and implement data security tools such as firewalls to identify and mitigate cyber threats. But the need for the physical security of these facilities is paramount. A breach in physical security can lead to data theft and cause breaches that compromise data security.
“With the increasing threat of cyberattacks and natural disasters, we must work to ensure the security of data centers to protect intellectual property, ensure compliance and maintain security and resiliency standards to keep these facilities safe,” said Alan Stoddard President at Cognyte Situational Intelligence Solutions. “Additionally, we must be cognizant that data centers are evolving. The increased deployment of cloud-based and edge data center facilities will increase the demand for physical security solutions in the coming year.”
But perhaps the real problem now is not the lack of technology to protect data centers but the lack of its appropriate use. John Rezzonico, CEO of Edge360, pointed out that the lack of timely upgrades and maintenance is a major cause of concern.
“Data centers typically have many physical security devices in a small space or area, which can be challenging to manage,” Rezzonico said. “On top of that, many data centers establish security systems and then allow physical security software, like video management platforms, to become outdated. But this fact must change: As more businesses shift to remote work and the storage of critical data via the cloud and within these data centers expands, the need for solid security in these facilities is growing, and protecting them becomes more critical.”
It’s also important to note that the focus for these facilities has primarily been on protecting the network, which means physical security programs have taken a back seat. But the protection of the brick-and-mortar facility is just as, if not more, important as ensuring captured data is protected.
Checklist for data center physical security
Data center security should follow a specific formula for protecting assets, with the idea of concentric circles. The outer layer represents perimeter security; the next is the hardening of the facility itself and preventing unauthorized access.
Next, security leaders should focus on securing the racks where the data and servers are stored. Finally, there must be another added layer of security around the controls for those server rooms to prevent any bad actors from accessing them.
“At each level, there needs to be a standard amount of physical and cyber security protection, which should be common practice across data centers, whether public, private, co-located, or on-site,” Rezzonico said. “The same policies and methodologies should be applied no matter the size, type of data center, or location. Still, they are often not, creating a facility that lacks the proper security measures for protecting critical data.”
Stoddard agrees that the best way to secure a data center is to manage it in layers. A multi-layered approach best supports proactive planning and makes identifying and mitigating a failure or breach easy. Here are some best practices that he suggests to consider:
1.Conduct regular audits: Internal audits ensure that systems and processes are working as intended. Audits should check for vulnerabilities in the data center facilities as well as across systems and devices.
“Access control systems, video surveillance cameras, and electronic locks must be checked to ensure proper function,” Stoddard said. “Security leaders should also continually assess whether a change in personnel calls for an update in the procedures and systems.”
2. Strengthen situational awareness: Any facility requiring extra protection, like a data center, should adopt an intelligent security approach. Funneling all data and systems into one centralized platform provides a higher level of oversight over security and operations.
3. Establish redundancy: Avoid the opportunity for downtime or system failure that results in a shutdown by creating redundancy across your data center operations. Data center failures can be prevented with proactive planning, testing, and awareness.
4. Enhance video surveillance: Video systems should be comprehensive and cover indoor and outdoor areas. Additionally, 24/7 video monitoring is critical to helping identify potential anomalies before they become more significant issues. Security guards can also be an essential component in augmenting technology.
5. SOP updates: Standard operating procedures need to be evaluated and tested regularly. This process also includes refresher training on the emerging or new security measures that need to be followed. Because risks are changing and evolving rapidly, regular checks of existing processes and procedures are recommended.
Conclusion
The technology needed for physical security at data centers is not complex. But what is often not up to the mark is the maintenance and operation. Steps like regular audits and SOP updates that Stoddard suggested highlight this concern.
In the coming years, we will likely see the number of data centers increase worldwide as more customers become aware of the importance and convenience of cloud-based solutions. This means more opportunities for physical security systems integrators. While challenges are a concern, it presents new growth areas with the right approach.
Helping retailers to improve store planning and the flow of footfall, Checkpoint Systems – a global leader in source-to-shopper solutions – has launched an innovative solution: the One Way Surveillance Sensor.
Store layouts are critical, designed to influence customer behaviour and improve store flow while highlighting key promotions and merchandise. Developed to monitor directional changes of customer movements in-store, Checkpoint’s One Way Surveillance Sensor enables retailers to monitor the effectiveness of their store planning and ensure that shoppers are navigating the shop floor as intended.
Often the measures put in place by retailers, such as gates or one-way doors, can be circumvented by shoppers or shoplifters. And, with shrinkage in Europe costing €49 billion every single year, retailers are increasingly investing in measures to help manage and improve loss prevention.
Mounted at store entrances, the One Way Surveillance radar sensor can be used not only to track customer flow, but to detect suspicious behaviour. For example, when a customer moves through the entrance in the wrong direction, it identifies the direction of traffic, signaling an alarm that alerts store personnel to investigate. This can be a standalone alarm or integrated within a wider EAS system.
Xxxx at Checkpoint Systems, commented: “Maintaining the flow of traffic should enhance the experience and not negatively impact the retail environment – its an essential part of store planning. By monitoring the flow of traffic, our new One Way Surveillance Sensor can also identify conspicuous changes that may indicate a possible theft.”
One Way Surveillance Sensor is available immediately. It is available as wired as standard, while wireless installation is also available on request.
About Checkpoint Systems
A division of CCL Industries, Checkpoint Systems is the only vertically integrated RF/RFID solution provider for retail. With consumer demands accelerating at an extraordinary rate driven by technology, Checkpoint delivers intelligent solutions – bringing clarity and efficiency into the retail environment anytime, anywhere. Through a unique offering of software, hardware, labels, tags, and connected cloud-based solutions, Checkpoint optimizes retail operations and efficiencies with real-time intuitive data delivered throughout the supply chain and in-store resulting in improved profitability and an enriched consumer experience. Checkpoint’s intelligent retail solutions are built upon 50 years of radio frequency technology expertise, innovative high-theft and loss prevention solutions, market-leading software, RFID hardware, and comprehensive labeling capabilities to brand, secure and track merchandise from source to shelf.
www.checkpointsystems.com
About CCL Industries
CCL Industries, a world leader in specialty label and packaging solutions for global corporations, small businesses, and consumers, employs approximately 19,000 people and operates 150 facilities in 25 countries on six continents with corporate offices in Toronto, Canada, and Framingham, Massachusetts. For more information, visit www.cclind.com.