Who Goes There?

IP video cameras enhance security and safety at petroleum processing facility

In an age of heightened security concerns, potentially vulnerable manufacturing and processing plants are re-evaluating their security systems and looking for new ways to protect assets. This is particularly true of expansive facilities handling vast amounts of volatile materials, as monitoring large, dimly lit areas has long been a security challenge.

When a petroleum processing facility came to Pacific Beach Tower looking for a video surveillance solution to cover sensitive and hard-to-monitor areas, officials did a walk-through security assessment and designed a system to tighten the facility’s security net.

Security officials solved the challenge of monitoring many acres of pipelines, storage tanks, equipment sheds, railways and gantries by strategically placing PTZ network cameras to watch over the facility’s sensitive, hardto- see areas 24/7. The Canon cameras were selected because of low-light capabilities and 40x optical zoom. By capturing images in low-light situations, security staff can be alerted and zoom in on suspicious activity from inside the security command center.

Put to the Test
Shortly after their installation, the cameras proved their value.

One night, a suspicious car drove into a remote corner of the facility and parked in a newly constructed parking lot with no lighting. Fortunately, the recently installed cameras revealed the presence of the vehicle and alerted security. In virtually no light -- no street lamps or other nearby lighting sources -- security was able to watch the suspects enter, observe their silhouettes moving around and provide critical information to help police make positive identifications.

The cameras were set up to record on motion detection, as this saves drive space and makes finding important video segments easier. The built-in, prerecord set-up, and the cameras’ robust software, provides the ability to capture video of the area three, five or even 10 seconds prior to the motion event.

In addition, motion detection and auto-tracking features enable users to designate up to four motion-detection areas, each with varying levels of sensitivity.

The cameras have the ability to track a subject’s movement following a motion event (indicated by a change in pixels) by automatically panning and tilting to keep the subject in the frame.

Although not used in this particular application, pre-recorded audio also can be set to play back on cue.

During the day, the cameras are monitored from a remote location to watch over all activity around the facility and ensure that workers and contractors comply with all regulations.

To keep images consistently looking sharp, the cameras use a Smart Shade Control that automatically adjusts contrast to compensate for backlit subjects.

This proved valuable in identifying and preventing a potential safety issue at the facility. Recently, one of the cameras captured someone breaking one of the rules, and the client was overheard calling the manager responsible for that person to notify them of the error.

The cameras also offer a number of other useful features in addition to its 40x optical zoom lens, such as image stabilization. The lens is equipped to automatically focus on the subject while quickly conforming to resolution.

The image stabilization feature helps keep images steady in locations prone to vibration, such as on towers or poles or next to rail tracks and hightraffic areas.

Sending Images Back to Base
The facility’s video security system is configured to transmit images captured by the on-site cameras wirelessly over a HauteSpot Networks router to an NVR. Images can be transmitted in both high-quality VGA-size -- 640x480 -- MPEG-4 and M-JPEG formats at a full 30 fps simultaneously without loss of frame rate. The cameras’ powerful hardware-based compression engine performs all encoding, encryption and transmission, while also enabling them to simultaneously distribute M-JPEG video in three sizes.

The router provides high data rates and superior throughput for data-intensive and latency-sensitive applications.

It can be configured to use either the “TDMA-like” protocol, which delivers unparalleled video streaming performance for the most demanding IP surveillance applications, layer-2 or layer-3 mesh, or standard 802.11.

Powering Up
The cameras can be powered with PoE -- via Cat-5 cable -- or DC. In this case, independent A-plus and A-minus lines were used so the cameras are on an uninterruptible power system and tied to the grid. This same power system also can be tied directly to solar panels.

The biggest consideration when marrying solar power with a camera and a wireless system is the efficiency of the products. Even when these cameras are actively running all PTZ and auto-focus servos at once they only draw about 6,000 milliwatts, which makes them very adaptable to alternative power options.

Safe, Secure and Happy
The petroleum facility is pleased with the high-quality results of their new networkbased video-surveillance system and the “live-looking” images it provides.

Clients are increasingly looking for real live-looking video in their surveillance solutions. The images on these cameras look really outstanding -- even when the NVR requires that settings be adjusted down.

This article originally appeared in the issue of .

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”