Sunday, February 15, 2026

Surveillance Monitoring For BESS Sites

Surveillance Monitoring For BESS Sites 

Battery Energy Storage Systems (BESS) store huge amounts of energy and with it, significant value. Remote surveillance monitoring for BESS sites protects these energy assets against a range of threats.

Surveillance monitoring for BESS sites helps detect threats in real time, reduces theft, prevents downtime, and protects your energy assets 24/7.All in all, for battery storage site operators, remotely monitored surveillance offers a range of significant security and financial benefits.

Intrusions, theft, and safety breaches put your operations, revenue, and infrastructure at risk. Standard CCTV solutions are reactive and often fail to prevent or escalate incidents fast enough. Discover how our BESS CCTV monitoring services help  you detect, deter, and deal with security threats – before they cause damage to your operations.

What are the benefits of surveillance monitoring for battery storage sites?

These sites are often located in remote areas, unstaffed at night, and filled with high-risk assets that attract theft or vandalism.

Live monitoring helps detect intrusions early, trigger fast response, and protect critical infrastructure from loss or disruption.

Now let’s take a closer look at the benefits of video monitoring for UK solar power sites.

·        Reduce theft & intrusion

·        Prevents costly downtime

·        Compliance & asset protection

·        Nighttime security & response

Reduces the risk of theft & intrusion

BESS sites are frequent targets due to their remote locations and the high value of equipment stored on-site. Surveillance monitoring acts as your frontline defence — watching over every corner and acting the moment a threat is detected.

The main benefits here include:

·        24/7 live monitoring from a secure off-site control room

·        Audio warnings that deter intruders before damage is done

·        Rapid escalation to police or on-site responders when necessary

When criminals know they’re being watched… and heard, they’re more likely to retreat.

Prevents costly downtime

Battery storage sites must stay operational. A damaged inverter, cut cable, or stolen component can take an entire system offline, costing thousands in lost energy production.

Live surveillance monitoring helps by:

·        Detecting tampering or movement around critical assets

·        Allowing operators to alert engineers or security teams instantly

·        Reducing the chance of extended downtime or operational failure

Catching threats early means keeping the lights on, literally and financially.

Improves site visibility and compliance

With live operators watching and recording incidents, BESS operators gain far better oversight of their sites.

Surveillance footage is invaluable not just for security but also for operational records and compliance audits.

You’ll benefit from:

·        Time-stamped evidence for insurance or incident reports

·        Improved tracking of personnel and contractor access

·        Footage to support HSE or audit inspections

Good visibility reduces risk and gives you confidence in how your site is managed.

Scales easily across multiple locations

Many BESS operators manage several sites. Surveillance monitoring makes multi-site oversight possible — and practical — without the need for expensive on-site teams.

This allows you to:

·        Protect remote sites from a central monitoring hub

·        Standardise response plans across your portfolio

·        Reduce staff costs and site visits

When you need to watch over multiple assets at once, remote surveillance does the heavy lifting.

Adds protection in low light or harsh weather

Remote locations often come with poor visibility, especially at night or in bad weather. The right surveillance setup keeps your site protected no matter the conditions.

This includes:

·        Thermal imaging cameras that detect movement in total darkness

·        Motion-triggered alerts and visual analytics

·        Reliable performance in rain, fog, or glare

It’s security that doesn’t sleep — or miss a thing.

Factors to consider for BESS site surveillance

When choosing a monitoring system for your battery site:

·        Ensure cameras have thermal or infrared capability

·        Look for providers with experience in energy sector security

·        Confirm secure, GDPR-compliant footage storage

·        Use smart alerts that reduce false positives

·        Regularly test the system and keep escalation protocols updated

Every second counts when you’re protecting high-value infrastructure.

Summary: Protecting power with proactive monitoring

The benefits of surveillance monitoring for BESS sites are clear: less theft, faster response, reduced downtime, and improved control over your assets. With live operators watching round the clock, you’re not just protecting batteries — you’re safeguarding the future of your energy supply.

Need protection for your battery energy storage site?

Talk to our team about remote surveillance solutions that detect threats fast and keep your power flowing.

The risks of theft and vandalism

BESS sites are valuable targets for criminals due to their high-cost components and remote locations. Stolen batteries can lead to financial loss and major operational disruptions. Copper theft from power cables also poses a serious risk to energy stability. Vandalism or sabotage can compromise site safety and cause system failures.

How remote monitoring prevents crime

When a threat is detected, immediate alerts notify security teams and keyholders to ensure rapid action. Live audio deterrents warn intruders before they can cause damage, protecting your assets 24/7.  A well designed system including AI-driven security cameras continuously monitor site perimeters, detecting intruders in real time.

BESS site security specialists

Battery storage site security requires a specialist approach. Working with an expert monitoring provider is crucial with high-value infrastructure to protect. By partnering with Safeguard Monitoring, you’re in safe, experienced, and reliable hands:

·        Industry leaders in BESS security

·        Protecting critical infrastructure 24/7

·        Remote monitoring for isolated locations

·        Preventing battery theft and power cable damage

·        Trusted by energy providers and asset managers

·        Tailored solutions for EPC & O&M companies

If you need to protect your BESS site now, or want advice from an expert remote surveillance provider, speak to a specialist today.

Audio challenge & crime deterrents

Proactive security stops intrusions before they escalate. A well-designed CCTV monitoring system should include:

·        Live audio warnings deter trespassers instantly

·        AI-powered video analytics for accurate detection

·        Visible security cameras deter criminal activity

·        Fast escalation ensures immediate intervention

·        Security lighting disrupts and repels intruders

Strong deterrents reduce risks and keep sites secure 24/7.

Key IEEE Standards and Guidelines for BESS Monitoring

  • IEEE Std 2030.2.1-2019: Provides guidelines for the design, operation, and maintenance of BESS, emphasizing safe integration with the electric power system.
  • IEEE 1547-2018: Governs the interconnection of distributed resources like BESS to the grid.
  • Battery Management System (BMS) Standards: IEEE provides recommendations for stationary storage BMS to ensure cells operate within safe voltage, current, and temperature limits.
  • Thermal Monitoring (IEEE 1188): While often focused on VRLA batteries, IEEE 1188 is a benchmark for maintenance, testing, and replacement practices. 

Core Surveillance Components

  • Predictive Maintenance Monitoring: Instead of just reacting to failures, surveillance now focuses on monitoring parameters like State of Charge (SoC), State of Health (SoH), and voltage to identify pending faults.
  • Thermal and Environmental Monitoring: Continuous monitoring of battery surface temperatures and connection points is critical to prevent thermal runaway.
  • IoT and Real-Time Data: Utilizing Internet of Things (IoT) sensors to collect high-resolution data on voltage, current, and temperature, which is essential for AI-based health prediction.
  • Infrared Inspection (IR): IR thermography is increasingly used for routine scans of PV-BESS facilities to identify hot spots. 

Advanced Monitoring & Security Trends

  • Cybersecurity for BESS: With increased connectivity, monitoring systems must defend against cyberattacks. IEEE research, such as "BESS-Set," provides datasets for developing anomaly detection algorithms to identify cyber-physical attacks.
  • AI/ML for State Estimation: Artificial Intelligence and Machine Learning (AI/ML) are being implemented for rapid, accurate SoC/SoH estimation and degradation modeling.
  • Digital Twin Technology: Digital twins are used for orchestrating BESS assets, allowing for performance optimization and predictive analytics by mirroring the physical system. 

Key Performance Indicators (KPIs) in Monitoring

  • Voltage Deviations & Frequency Support: Monitoring the BESS's ability to stabilize grid frequency and voltage.
  • Safety Thresholds: Real-time monitoring of gas emission and temperature for immediate fire suppression activation.
  • Cell Balancing: Tracking the BMS performance in balancing cells to prevent premature capacity degradation. 

IEEE continues to advance these practices to ensure that BESS, a key component of a stable grid, operates reliably and safely. 

FAQs for BESS site surveillance monitoring

What is a BESS site, and why does it need surveillance monitoring?

A BESS site stores electrical energy for future use. These sites often contain lithium-ion batteries, inverters, and cooling systems. Because they are high-value and sometimes located in isolated areas, they are vulnerable to theft and tampering — which is why surveillance monitoring is essential.


How does surveillance monitoring work for remote battery storage sites?

Surveillance monitoring uses sensor-activated cameras that stream live footage to a secure control centre. When motion or unusual activity is detected, trained operators assess the footage in real time, issue warnings, and escalate the response if needed.


Can video monitoring prevent power outages at BESS sites?

Yes. While monitoring doesn’t control the systems directly, it helps operators detect damage or tampering early. This means engineers can be alerted before a fault becomes a full-blown outage — minimising operational impact.


What kind of equipment is used for security camera monitoring?

A typical setup includes thermal imaging or infrared CCTV, motion detectors, alarm integration, and loudspeakers. These are connected to a central platform where footage is viewed and recorded, and alerts are managed by professional security staff.


Is video surveillance camera monitoring expensive for solar energy companies?

Compared to the cost of outages, stolen parts, or hiring physical guards, surveillance monitoring is a cost-effective choice. It also scales easily across multiple sites, providing centralised oversight for a fraction of traditional security spend.


Sunday, February 1, 2026

Open Access Controller Guide

 Open Access Controller Guide

In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers.

In 2019, Axis released a 3rd party-only controller, while HID purchased Mercury Security.

In this note, we contrast common access hardware providers and which brands of hardware many access management systems use.

·        The 3rd party offerings of Axis, HID, Isonas, and Mercury

·        How their pricing compares

·        Why ONVIF for Access Control Is Not A Big Factor

·        A chart explaining which controllers 34 notable access platforms support

·        The three factors that may complicate takeovers

What is an Access Control System?

An access control system is a security measure designed to regulate who can enter or exit a building or specific areas within it. These systems can range from simple mechanical locks to advanced biometric and cloud-based solutions. Modern access control systems often include features like keycards, PIN codes, mobile credentials, and facial recognition technology.

Select Access Hardware Components

Your access control system will require various hardware elements:

·        Control Panels: The brain of the system, managing access points and credentials.

·        Readers: Devices that scan keycards, biometrics, or mobile credentials.

·        Electric Locks: Magnetic or strike locks that secure doors.

·        Door Sensors: Detect whether a door is open or closed.

·        Request to Exit Buttons: Allow users to leave secured areas.

·        IT: If you run an on-premises access control system you will need a computer to run the software on and network connectivity.

Choose hardware compatible with your desired technology and ensure it meets your building’s security standards.

'Open' Controller Options

In the access market, the number of manufacturers producing door controller hardware is comparatively small to the total number of vendors writing management software.

While some companies choose to produce their own proprietary controller designs, a significant portion of the market chooses to integrate with 'open' 3rd party devices manufactured by others.

For the access control market, the most widely recognized non-proprietary door controllers are produced by three companies:

·        Axis: The company offers two different controllers, the A1001 and A1601. Both models are two-door controllers, but the A1601 is built with higher memory capacity, faster processors, form C relays. Both units use Axis' VAPIX API, although the free embedded Axis Entry Manager software is only an option for the A1001.

·        HID Global: Owned by Assa Abloy, HID also manufactures two series of controllers, Edge and Aero, that with a firmware update can be added to over 15+ different access systems.

·        Isonas: The Allegion owned access hardware manufacturer opened it's line of controllers to being integrated into other platforms in 2017. The company's line of combo readers/controllers are IP based and PoE powered.

·        Mercury Security: Purchased by HID in 2017, the hardware manufacturer sells only to other businesses. Mercury produces several lines of controllers and expansion modules, including the IP-based LP and EP series and Series 3 Redboard panels with a common firmware framework. Over 35 companies use Mercury designed hardware, or other hardware using Mercury's standard firmware.

These offerings compose most of the 'open' controller options in the market.

Defining 'Open' for Access

In the case of access control and the broader security market, 'Open' has a different general meaning than IT and software development use. 'Open' for access essentially means 'non-proprietary' that is potentially compatible with several systems.

This differs from 'openness' in other tech areas where 'open-source' generally means use is free, collaboration is public, and licensing (if implemented) is light and provisional.

Cost Comparison

While pricing varies for each controller, the hardware cost alone may also be subject to additional software licensing. However, on a hardware only basis, pricing looks like:

·        Axis A1001 & A1601: The A1001 is widely available online for ~$500, while the A1601 runs ~$700.

·        HID Edge EVO: The single door controller is available from distribution with a street price of ~$350, with options for units with integrated readers for ~$450.

·        HID Aero: The base controller and two-door expansion module is available through resellers for ~$650, but total cost varies depending on which base controller and how many expansion modules are used.

·        Isonas: The company's line of RC-04, PowerNet, and IP Bridge controllers range from $700 (single door) - $1,100 (three door bridge) depending on configuration of the included reader.

·        Mercury Security: None of these products are available as direct purchases from Mercury or through distribution. Single door controllers typical range in price from $250 - $400, but the final cost is often heavily negotiated and drops for projects with large door counts.

Compatibility Chart

The chart below provides a look at leading access brands, and which door controllers they work with:-

The Disadvantages of Proprietary Solutions

Discussions around the “myth” of open architecture often come from advocates of proprietary solutions who argue against the flexibility of open systems. However, this perspective can be compared to the fox guarding the henhouse—those who benefit from vendor lock-in are the ones discouraging open architecture. The primary aim of proprietary manufacturers is to secure ongoing reliance on their products, leaving organizations with little ability to switch to alternative solutions without a major cost.

Hardware installation is typically the most expensive part of an initial Physical Access Control System (PACS) deployment. By opting for a proprietary solution, organizations essentially commit to that manufacturer for the duration of the product’s lifespan. If the solution no longer meets operational needs, a costly overhaul is required to migrate to another system. This dependency aligns perfectly with the goals of proprietary vendors, keeping organizations tied to one source indefinitely.

The Advantages of Open Architecture Solutions

Open architecture solutions offer a range of benefits that boost security, flexibility, and efficiency. Companies like Mercury Security, HID Aero, and Axis provide open hardware platforms that are interoperable and supported by numerous technology partners. Choosing an open architecture approach means futureproofing your hardware investment, allowing for a flexible transition across providers without needing a complete system replacement.

For example, Mercury Security has the world’s largest access control hardware base, supported by over 20 OEMs. This extensive adoption enables users to switch to another Mercury OEM if the current solution is insufficient, preserving the existing hardware infrastructure and avoiding significant costs.

Five Reasons to Choose Open Architecture

1.   Interoperability and Integration: Open architecture supports seamless integration across various hardware and software, enabling vendor independence, smooth communication between platforms, and easy customization to meet unique security needs.

2.   Scalability and Flexibility: Open architecture systems are scalable and flexible, allowing for expansion and adaptability. Incremental upgrades are possible without major overhauls, reducing costs and supporting long-term system value.

3.   Cost-Effectiveness: Open architecture reduces expenses tied to proprietary systems, such as costly upgrades and vendor-specific maintenance. By supporting partial upgrades and enabling competitive pricing, it provides short- and long-term savings.

4.   Enhanced Security: Open systems allow organizations to implement the latest security protocols and quickly respond to emerging threats. They also support compliance with industry standards, ensuring a resilient and compliant security environment.

5.   Future-Proofing: Open architecture preserves initial hardware investments by allowing integration of new technologies through standard protocols. This approach ensures long-term relevance, efficiency, and cost savings.

Proprietary Private Brand Hardware Common

Notice not all platforms use or are compatible with third party panels.

For example, major providers like Tyco's Software House use proprietary controllers, which differ and are not compatible with other Tyco access products like the distribution access line Kantech that uses its own proprietary panels.

Startups like Openpath and Proxy sell 3rd-party compatible mobile readers, but also are available in versions that use their own proprietary controller boards/relays in a standalone management software.

Access ONVIF Not A Factor

When it comes to interoperability standards, access control is significantly less accepting of standards like ONVIF and no 3rd party standard is widely adopted.

As noted in Access Control Does Not Want ONVIF, despite being so readily adopted by video platforms, both ONVIF interoperability standards, Profile A and Profile C have weak adoption with support from only two vendors:

Three Common Takeover Exceptions

While generally possible, 'takeovers', where controllers associated with one platform are switched to another, have exceptions.

The three common factors that complicate system takeovers and controller interoperability are:

·        Unsupported Features/Integrations

·        New Licensing/OEM Mask Codes

·        Voided Warranty or Support

Unsupported Features/Integrations

First, in terms of existing system integrations and features, just because another system supports the same controller hardware, there is no certainty a new platform supports the same range of features and integrations. Individual features, like OSDP or event cross-linking may be supported at the panel in one system, but not the other.

New Licensing/OEM Mask Codes

Another pitfall, as noted in Does Lenel Support Unbranded Mercury Security Hardware? is some platforms may observe a 'Product OEM Mask' that codes hardware to a specific brand.

The codes are not always observed and not all 3rd party vendors have them in place, but adding existing hardware to a new system can be blocked and potentially require additional licensing fees or risk being refused by the new vendor.

In other cases, like Honeywell Prowatch, physically changing chips on the controller board may be required.

Voided Warranty or Support

Finally, vendors may choose to not 'tech support' taken-over devices, nor do they typically warranty them when something goes wrong.

Thanks to Mr. Brian Rhodes, IPVM writer.