Sunday, March 1, 2026

New Synergy in Door Security

New Synergy in Door Security

Historically, the intercom and the video surveillance industries have lived in separate but parallel universes. Electricians handled intercoms, security professionals handled surveillance cameras and rarely did the two universes intersect. The technologies relied on different sales channels, separate purchasing processes and separate installation teams. This duplication not only made door security more expensive, but also more difficult to manage and maintain.

a8004 ve deliveryman wall angle right 1504 hi 564a2b1f743f6

Network video door stations combine an IP camera with an intercom into a single unit so security personnel can both see and talk to visitors at a gate or door anywhere around the perimeter or interior of a facility.

While the network camera industry has been manufacturing products to open standards and interfaces since the mid-1990s, many traditional intercom systems are still proprietary. This forces users to rely on the expertise of a single provider to install and configure a closed and often complex hardware/software solution. If a user wants to switch from one intercom provider to another it can be prohibitively expensive, since it would necessitate a refitting of the entire system.

The good news, however, is that unifying IP technology is emerging to compete with those disconnected solutions.

Integrated Approach to Door Security

With more security devices adopting common, standardized communications protocol, intercoms and video surveillance are beginning to converge into a single universe — the network video door station. From a technical perspective, it is just as easy to transmit audio data over a network as it is to transmit video data; thus, integrating intercom functionality into an IP-based video surveillance system is a natural extension of the technology and a valuable add-on to video management systems already employed by thousands of end-users.

Network video door stations combine an IP camera with an intercom into a single unit so security personnel can both see and talk to visitors at a gate or door anywhere around the perimeter or interior of a facility. Once the visitor has been screened, they can be admitted to the premises by remote entry control directly through the door station or through a separate access control system. With video as an integral part of the door station, security has the added benefit of being able to archive a visual/audio record of any incident taking place at the entrance.

Because notifications and media data transfer through the LAN or Internet in consistent and standardized ways, security staff can monitor the door station remotely from their preferred location and operator device. Adhering to standards also means users can choose hardware and software for different parts of the security system independently with assurance that they will work together. This is not only advantageous for advanced enterprise solutions but also allows small basic systems to grow as security and business needs change — all without having to replace legacy products or systems.

Features that Amplify Door Security

There are a number of features to look for when choosing a network video door station:

Open interface: The ideal video door station is based on open APIs (Application Programming Interface) for easy integration, and adheres to international IP standards such as ONVIF and SIP. This gives you complete choice over components and system connectivity without having to worry about compatibility and interoperability. For example, ONVIF support enables integration with most IP-based video management software so that the door station can operate as a full-featured surveillance camera and communication device at the same time. A video door station that supports SIP (Session Initiation Protocol) can integrate with a company’s existing IP telephony and VoIP (Voice over IP) communication systems. While the ability to forward audio as well as pictures to security operators makes daily surveillance operations more efficient, the open interface also enables the flexibility to enhance the door station with advanced third-party software such as video analytics.

High video quality: Door stations are often installed in settings with difficult lighting conditions; thus, it is important the unit includes an HDTV-quality camera with wide dynamic range and excellent performance in low-light and backlight conditions.

High audio quality: A professional-quality video door station should be acoustically designed to deliver high-performance audio from its microphone and loudspeaker — both in terms of clarity and sound pressure level. Because door stations are often installed in noisy settings, also look for features such as echo cancellation and noise suppression to ensure clear and echo-free two-way communication with visitors.

Flexible entry control: The door station should give users the flexibility to control entry any way they choose; thus, integrators should recommend door stations with multiple inputs and outputs for controlling door locks and other peripherals. Open standards and interfaces enable connectivity to other systems such as VMS, access control, mobile applications and IP phones. Having a door station guarding the door also increases flexibility and efficiency of labor as a single operator or patrolling guard can monitor and manage several doors regardless of his physical location.

Cost-efficient and easy installation: Door stations should be simple to install. Look for ones that support Power over Ethernet (PoE), since they use a single cable to power the unit and the door lock as well as transmit the data, which will save on both cabling and labor costs.

Video Door Phone Security System - Honeywell Video Door Phone Security  System Service Provider from New Delhi

Target Installations

Because network video door stations are scalable, they work well in a variety of environments — from a single unit to a limitless number of devices at enterprise-level installations.

Single door: Usually found in smaller retail boutiques or medical offices, the video door station could be located at a receiving dock or the front entrance. Employees would communicate and control entry from a mobile device, desk phone or laptop. For example, employees could converse with the delivery truck driver before remotely unlocking the loading dock door to receive goods or screen visitors before remotely opening the front door — all without leaving customers or the register area unattended.

A growing business: Additional video door stations can be added to the network in any increment as easily as adding new IP cameras. Since the devices are managed through the VMS, operators can actively monitor events in real time and retrieve stored video for further study as needed. In an office, hotel or healthcare clinic, for example, the receptionist’s duties could include monitoring the door station along with more typical tasks such as welcoming customers/patients and answering phones. When the visitor approaches one of the video door stations and pushes the call button, video from the door station pops up on the receptionist’s screen allowing them to see and talk with the visitor before unlocking the door. Since the video door station integrates with the company’s IP telephony system, calls can also be answered from a desk phone or mobile device, even after business hours, on weekends and during holidays when the reception desk is unmanned.

A large, multi-door, high-security environment: In enterprise systems with high security demands, such as airports, logistics centers, large retail stores, hospitals and university campuses, video door stations are just one element in a comprehensive physical security information network that probably includes surveillance cameras, access control, intrusion alarms, VoIP and various third-party security applications. In this situation, open standards enable connectivity between systems so that security staff can efficiently track, monitor and react to events in real time from multiple receiving stations or a single, centralized point of operation. The video door station operates just like an IP-based phone or intercom and a surveillance camera at the same time, sending notifications to operators or the access control system to monitor doors, communicate and handle entry rights.

Sunday, February 15, 2026

Surveillance Monitoring For BESS Sites

Surveillance Monitoring For BESS Sites 

Battery Energy Storage Systems (BESS) store huge amounts of energy and with it, significant value. Remote surveillance monitoring for BESS sites protects these energy assets against a range of threats.

Surveillance monitoring for BESS sites helps detect threats in real time, reduces theft, prevents downtime, and protects your energy assets 24/7.All in all, for battery storage site operators, remotely monitored surveillance offers a range of significant security and financial benefits.

Intrusions, theft, and safety breaches put your operations, revenue, and infrastructure at risk. Standard CCTV solutions are reactive and often fail to prevent or escalate incidents fast enough. Discover how our BESS CCTV monitoring services help  you detect, deter, and deal with security threats – before they cause damage to your operations.

What are the benefits of surveillance monitoring for battery storage sites?

These sites are often located in remote areas, unstaffed at night, and filled with high-risk assets that attract theft or vandalism.

Live monitoring helps detect intrusions early, trigger fast response, and protect critical infrastructure from loss or disruption.

Now let’s take a closer look at the benefits of video monitoring for UK solar power sites.

·        Reduce theft & intrusion

·        Prevents costly downtime

·        Compliance & asset protection

·        Nighttime security & response

Reduces the risk of theft & intrusion

BESS sites are frequent targets due to their remote locations and the high value of equipment stored on-site. Surveillance monitoring acts as your frontline defence — watching over every corner and acting the moment a threat is detected.

The main benefits here include:

·        24/7 live monitoring from a secure off-site control room

·        Audio warnings that deter intruders before damage is done

·        Rapid escalation to police or on-site responders when necessary

When criminals know they’re being watched… and heard, they’re more likely to retreat.

Prevents costly downtime

Battery storage sites must stay operational. A damaged inverter, cut cable, or stolen component can take an entire system offline, costing thousands in lost energy production.

Live surveillance monitoring helps by:

·        Detecting tampering or movement around critical assets

·        Allowing operators to alert engineers or security teams instantly

·        Reducing the chance of extended downtime or operational failure

Catching threats early means keeping the lights on, literally and financially.

Improves site visibility and compliance

With live operators watching and recording incidents, BESS operators gain far better oversight of their sites.

Surveillance footage is invaluable not just for security but also for operational records and compliance audits.

You’ll benefit from:

·        Time-stamped evidence for insurance or incident reports

·        Improved tracking of personnel and contractor access

·        Footage to support HSE or audit inspections

Good visibility reduces risk and gives you confidence in how your site is managed.

Scales easily across multiple locations

Many BESS operators manage several sites. Surveillance monitoring makes multi-site oversight possible — and practical — without the need for expensive on-site teams.

This allows you to:

·        Protect remote sites from a central monitoring hub

·        Standardise response plans across your portfolio

·        Reduce staff costs and site visits

When you need to watch over multiple assets at once, remote surveillance does the heavy lifting.

Adds protection in low light or harsh weather

Remote locations often come with poor visibility, especially at night or in bad weather. The right surveillance setup keeps your site protected no matter the conditions.

This includes:

·        Thermal imaging cameras that detect movement in total darkness

·        Motion-triggered alerts and visual analytics

·        Reliable performance in rain, fog, or glare

It’s security that doesn’t sleep — or miss a thing.

Factors to consider for BESS site surveillance

When choosing a monitoring system for your battery site:

·        Ensure cameras have thermal or infrared capability

·        Look for providers with experience in energy sector security

·        Confirm secure, GDPR-compliant footage storage

·        Use smart alerts that reduce false positives

·        Regularly test the system and keep escalation protocols updated

Every second counts when you’re protecting high-value infrastructure.

Summary: Protecting power with proactive monitoring

The benefits of surveillance monitoring for BESS sites are clear: less theft, faster response, reduced downtime, and improved control over your assets. With live operators watching round the clock, you’re not just protecting batteries — you’re safeguarding the future of your energy supply.

Need protection for your battery energy storage site?

Talk to our team about remote surveillance solutions that detect threats fast and keep your power flowing.

The risks of theft and vandalism

BESS sites are valuable targets for criminals due to their high-cost components and remote locations. Stolen batteries can lead to financial loss and major operational disruptions. Copper theft from power cables also poses a serious risk to energy stability. Vandalism or sabotage can compromise site safety and cause system failures.

How remote monitoring prevents crime

When a threat is detected, immediate alerts notify security teams and keyholders to ensure rapid action. Live audio deterrents warn intruders before they can cause damage, protecting your assets 24/7.  A well designed system including AI-driven security cameras continuously monitor site perimeters, detecting intruders in real time.

BESS site security specialists

Battery storage site security requires a specialist approach. Working with an expert monitoring provider is crucial with high-value infrastructure to protect. By partnering with Safeguard Monitoring, you’re in safe, experienced, and reliable hands:

·        Industry leaders in BESS security

·        Protecting critical infrastructure 24/7

·        Remote monitoring for isolated locations

·        Preventing battery theft and power cable damage

·        Trusted by energy providers and asset managers

·        Tailored solutions for EPC & O&M companies

If you need to protect your BESS site now, or want advice from an expert remote surveillance provider, speak to a specialist today.

Audio challenge & crime deterrents

Proactive security stops intrusions before they escalate. A well-designed CCTV monitoring system should include:

·        Live audio warnings deter trespassers instantly

·        AI-powered video analytics for accurate detection

·        Visible security cameras deter criminal activity

·        Fast escalation ensures immediate intervention

·        Security lighting disrupts and repels intruders

Strong deterrents reduce risks and keep sites secure 24/7.

Key IEEE Standards and Guidelines for BESS Monitoring

  • IEEE Std 2030.2.1-2019: Provides guidelines for the design, operation, and maintenance of BESS, emphasizing safe integration with the electric power system.
  • IEEE 1547-2018: Governs the interconnection of distributed resources like BESS to the grid.
  • Battery Management System (BMS) Standards: IEEE provides recommendations for stationary storage BMS to ensure cells operate within safe voltage, current, and temperature limits.
  • Thermal Monitoring (IEEE 1188): While often focused on VRLA batteries, IEEE 1188 is a benchmark for maintenance, testing, and replacement practices. 

Core Surveillance Components

  • Predictive Maintenance Monitoring: Instead of just reacting to failures, surveillance now focuses on monitoring parameters like State of Charge (SoC), State of Health (SoH), and voltage to identify pending faults.
  • Thermal and Environmental Monitoring: Continuous monitoring of battery surface temperatures and connection points is critical to prevent thermal runaway.
  • IoT and Real-Time Data: Utilizing Internet of Things (IoT) sensors to collect high-resolution data on voltage, current, and temperature, which is essential for AI-based health prediction.
  • Infrared Inspection (IR): IR thermography is increasingly used for routine scans of PV-BESS facilities to identify hot spots. 

Advanced Monitoring & Security Trends

  • Cybersecurity for BESS: With increased connectivity, monitoring systems must defend against cyberattacks. IEEE research, such as "BESS-Set," provides datasets for developing anomaly detection algorithms to identify cyber-physical attacks.
  • AI/ML for State Estimation: Artificial Intelligence and Machine Learning (AI/ML) are being implemented for rapid, accurate SoC/SoH estimation and degradation modeling.
  • Digital Twin Technology: Digital twins are used for orchestrating BESS assets, allowing for performance optimization and predictive analytics by mirroring the physical system. 

Key Performance Indicators (KPIs) in Monitoring

  • Voltage Deviations & Frequency Support: Monitoring the BESS's ability to stabilize grid frequency and voltage.
  • Safety Thresholds: Real-time monitoring of gas emission and temperature for immediate fire suppression activation.
  • Cell Balancing: Tracking the BMS performance in balancing cells to prevent premature capacity degradation. 

IEEE continues to advance these practices to ensure that BESS, a key component of a stable grid, operates reliably and safely. 

FAQs for BESS site surveillance monitoring

What is a BESS site, and why does it need surveillance monitoring?

A BESS site stores electrical energy for future use. These sites often contain lithium-ion batteries, inverters, and cooling systems. Because they are high-value and sometimes located in isolated areas, they are vulnerable to theft and tampering — which is why surveillance monitoring is essential.


How does surveillance monitoring work for remote battery storage sites?

Surveillance monitoring uses sensor-activated cameras that stream live footage to a secure control centre. When motion or unusual activity is detected, trained operators assess the footage in real time, issue warnings, and escalate the response if needed.


Can video monitoring prevent power outages at BESS sites?

Yes. While monitoring doesn’t control the systems directly, it helps operators detect damage or tampering early. This means engineers can be alerted before a fault becomes a full-blown outage — minimising operational impact.


What kind of equipment is used for security camera monitoring?

A typical setup includes thermal imaging or infrared CCTV, motion detectors, alarm integration, and loudspeakers. These are connected to a central platform where footage is viewed and recorded, and alerts are managed by professional security staff.


Is video surveillance camera monitoring expensive for solar energy companies?

Compared to the cost of outages, stolen parts, or hiring physical guards, surveillance monitoring is a cost-effective choice. It also scales easily across multiple sites, providing centralised oversight for a fraction of traditional security spend.


Sunday, February 1, 2026

Open Access Controller Guide

 Open Access Controller Guide

In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers.

In 2019, Axis released a 3rd party-only controller, while HID purchased Mercury Security.

In this note, we contrast common access hardware providers and which brands of hardware many access management systems use.

·        The 3rd party offerings of Axis, HID, Isonas, and Mercury

·        How their pricing compares

·        Why ONVIF for Access Control Is Not A Big Factor

·        A chart explaining which controllers 34 notable access platforms support

·        The three factors that may complicate takeovers

What is an Access Control System?

An access control system is a security measure designed to regulate who can enter or exit a building or specific areas within it. These systems can range from simple mechanical locks to advanced biometric and cloud-based solutions. Modern access control systems often include features like keycards, PIN codes, mobile credentials, and facial recognition technology.

Select Access Hardware Components

Your access control system will require various hardware elements:

·        Control Panels: The brain of the system, managing access points and credentials.

·        Readers: Devices that scan keycards, biometrics, or mobile credentials.

·        Electric Locks: Magnetic or strike locks that secure doors.

·        Door Sensors: Detect whether a door is open or closed.

·        Request to Exit Buttons: Allow users to leave secured areas.

·        IT: If you run an on-premises access control system you will need a computer to run the software on and network connectivity.

Choose hardware compatible with your desired technology and ensure it meets your building’s security standards.

'Open' Controller Options

In the access market, the number of manufacturers producing door controller hardware is comparatively small to the total number of vendors writing management software.

While some companies choose to produce their own proprietary controller designs, a significant portion of the market chooses to integrate with 'open' 3rd party devices manufactured by others.

For the access control market, the most widely recognized non-proprietary door controllers are produced by three companies:

·        Axis: The company offers two different controllers, the A1001 and A1601. Both models are two-door controllers, but the A1601 is built with higher memory capacity, faster processors, form C relays. Both units use Axis' VAPIX API, although the free embedded Axis Entry Manager software is only an option for the A1001.

·        HID Global: Owned by Assa Abloy, HID also manufactures two series of controllers, Edge and Aero, that with a firmware update can be added to over 15+ different access systems.

·        Isonas: The Allegion owned access hardware manufacturer opened it's line of controllers to being integrated into other platforms in 2017. The company's line of combo readers/controllers are IP based and PoE powered.

·        Mercury Security: Purchased by HID in 2017, the hardware manufacturer sells only to other businesses. Mercury produces several lines of controllers and expansion modules, including the IP-based LP and EP series and Series 3 Redboard panels with a common firmware framework. Over 35 companies use Mercury designed hardware, or other hardware using Mercury's standard firmware.

These offerings compose most of the 'open' controller options in the market.

Defining 'Open' for Access

In the case of access control and the broader security market, 'Open' has a different general meaning than IT and software development use. 'Open' for access essentially means 'non-proprietary' that is potentially compatible with several systems.

This differs from 'openness' in other tech areas where 'open-source' generally means use is free, collaboration is public, and licensing (if implemented) is light and provisional.

Cost Comparison

While pricing varies for each controller, the hardware cost alone may also be subject to additional software licensing. However, on a hardware only basis, pricing looks like:

·        Axis A1001 & A1601: The A1001 is widely available online for ~$500, while the A1601 runs ~$700.

·        HID Edge EVO: The single door controller is available from distribution with a street price of ~$350, with options for units with integrated readers for ~$450.

·        HID Aero: The base controller and two-door expansion module is available through resellers for ~$650, but total cost varies depending on which base controller and how many expansion modules are used.

·        Isonas: The company's line of RC-04, PowerNet, and IP Bridge controllers range from $700 (single door) - $1,100 (three door bridge) depending on configuration of the included reader.

·        Mercury Security: None of these products are available as direct purchases from Mercury or through distribution. Single door controllers typical range in price from $250 - $400, but the final cost is often heavily negotiated and drops for projects with large door counts.

Compatibility Chart

The chart below provides a look at leading access brands, and which door controllers they work with:-

The Disadvantages of Proprietary Solutions

Discussions around the “myth” of open architecture often come from advocates of proprietary solutions who argue against the flexibility of open systems. However, this perspective can be compared to the fox guarding the henhouse—those who benefit from vendor lock-in are the ones discouraging open architecture. The primary aim of proprietary manufacturers is to secure ongoing reliance on their products, leaving organizations with little ability to switch to alternative solutions without a major cost.

Hardware installation is typically the most expensive part of an initial Physical Access Control System (PACS) deployment. By opting for a proprietary solution, organizations essentially commit to that manufacturer for the duration of the product’s lifespan. If the solution no longer meets operational needs, a costly overhaul is required to migrate to another system. This dependency aligns perfectly with the goals of proprietary vendors, keeping organizations tied to one source indefinitely.

The Advantages of Open Architecture Solutions

Open architecture solutions offer a range of benefits that boost security, flexibility, and efficiency. Companies like Mercury Security, HID Aero, and Axis provide open hardware platforms that are interoperable and supported by numerous technology partners. Choosing an open architecture approach means futureproofing your hardware investment, allowing for a flexible transition across providers without needing a complete system replacement.

For example, Mercury Security has the world’s largest access control hardware base, supported by over 20 OEMs. This extensive adoption enables users to switch to another Mercury OEM if the current solution is insufficient, preserving the existing hardware infrastructure and avoiding significant costs.

Five Reasons to Choose Open Architecture

1.   Interoperability and Integration: Open architecture supports seamless integration across various hardware and software, enabling vendor independence, smooth communication between platforms, and easy customization to meet unique security needs.

2.   Scalability and Flexibility: Open architecture systems are scalable and flexible, allowing for expansion and adaptability. Incremental upgrades are possible without major overhauls, reducing costs and supporting long-term system value.

3.   Cost-Effectiveness: Open architecture reduces expenses tied to proprietary systems, such as costly upgrades and vendor-specific maintenance. By supporting partial upgrades and enabling competitive pricing, it provides short- and long-term savings.

4.   Enhanced Security: Open systems allow organizations to implement the latest security protocols and quickly respond to emerging threats. They also support compliance with industry standards, ensuring a resilient and compliant security environment.

5.   Future-Proofing: Open architecture preserves initial hardware investments by allowing integration of new technologies through standard protocols. This approach ensures long-term relevance, efficiency, and cost savings.

Proprietary Private Brand Hardware Common

Notice not all platforms use or are compatible with third party panels.

For example, major providers like Tyco's Software House use proprietary controllers, which differ and are not compatible with other Tyco access products like the distribution access line Kantech that uses its own proprietary panels.

Startups like Openpath and Proxy sell 3rd-party compatible mobile readers, but also are available in versions that use their own proprietary controller boards/relays in a standalone management software.

Access ONVIF Not A Factor

When it comes to interoperability standards, access control is significantly less accepting of standards like ONVIF and no 3rd party standard is widely adopted.

As noted in Access Control Does Not Want ONVIF, despite being so readily adopted by video platforms, both ONVIF interoperability standards, Profile A and Profile C have weak adoption with support from only two vendors:

Three Common Takeover Exceptions

While generally possible, 'takeovers', where controllers associated with one platform are switched to another, have exceptions.

The three common factors that complicate system takeovers and controller interoperability are:

·        Unsupported Features/Integrations

·        New Licensing/OEM Mask Codes

·        Voided Warranty or Support

Unsupported Features/Integrations

First, in terms of existing system integrations and features, just because another system supports the same controller hardware, there is no certainty a new platform supports the same range of features and integrations. Individual features, like OSDP or event cross-linking may be supported at the panel in one system, but not the other.

New Licensing/OEM Mask Codes

Another pitfall, as noted in Does Lenel Support Unbranded Mercury Security Hardware? is some platforms may observe a 'Product OEM Mask' that codes hardware to a specific brand.

The codes are not always observed and not all 3rd party vendors have them in place, but adding existing hardware to a new system can be blocked and potentially require additional licensing fees or risk being refused by the new vendor.

In other cases, like Honeywell Prowatch, physically changing chips on the controller board may be required.

Voided Warranty or Support

Finally, vendors may choose to not 'tech support' taken-over devices, nor do they typically warranty them when something goes wrong.

Thanks to Mr. Brian Rhodes, IPVM writer.