Interested in linking to "Access Control"?
You may use the Headline, Deck, Byline and URL of this article on your Web site. To link to this article, select and copy the HTML code below and paste it on your own Web site.
Studies have shown that humans will lose interest and be unable to detect changes shown on screens if they are forced to stare for more than 20 minutes. In many cases, the first time operators or security personnel actually see what’s on the monitor is when an alarm goes off.
On the other hand, modern digital cameras have the ability to detect when an anomaly occurs—such as someone walking into the frame. The camera can trigger an alarm that will alert security personnel. These newer video surveillance systems also can be configured to pan and zoom in to a specific location if an alarm occurs. The procedure can be triggered by the camera system, the video server, a proximity switch, an infrared detector or any other input. Security personnel can save all the images of a particular event and replay them as often as necessary to fully understand the incident.
According to Stephen Lambright, vice president of marketing and customer services for wireless networks and services provider Apprion, industrial-grade video often is a less expensive way to monitor operations. Wireless is also making inroads into security. Lambright says that wireless wireless cameras can view locations that would be too risky or too expensive to trench or wire—just the kinds of remote locations that are attractive to intruders hoping to sneak past the guard shacks.
Wireless is also making inroads into security. Lambright says that wireless wireless cameras can view locations that would be too risky or too expensive to trench or wire—just the kinds of remote locations that are attractive to intruders hoping to sneak past the guard shacks.
Using applications such as Apprion’s ION Wireless Video Monitoring, security-conscious companies can integrate the the monitoring and management of both their IP-enabled security cameras and their wireless networks to strengthen security even more. This application enables network operators using a Web-based console or mobile device to monitor the status and network activity of any IP-enabled camera and the network availability of the link to that device. When a link to an IP camera is down, operators are alerted, and may be able to diagnose and resolve the issue remotely. After all, even the highest high-tech system is useless if it’s broken.
Good perimeter security keeps bad guys from breaking into the plant. But what happens if bad guys get into the plant legally, right through the front door? That’s another story.
Rich Merritt is a Control contributing editor.
The Honeywell Specialty Materials chemical facility is located on the Mississippi River in Geismar, La. It’s the largest production site for hydrofluoric acid in the U.S., a main production site for refrigerants and a showcase for modern security technology.
Figure 2. At Honeywell’s Geismar plant, radar tracks the movement of ships on the Mississippi and in the docks.
Honeywell protects the facility by employing a comprehensive “defense in depth” strategy that integrates physical, electronic and cyber layers with building automation, security and process control systems.
To keep intruders out of the facility, Honeywell Geismar uses several methods:
Security data, alarms and camera images are transmitted on the same network used by the control systems.
From the physical perspective, Honeywell recommends an integrated solution that facilitates automated processes, giving users the ability to detect, deter, prevent and mitigate physical security threats.
ControlGlobal.com is exclusively dedicated to the global process automation market. We report on developing industry trends, illustrate successful industry applications, and update the basic skills and knowledge base that provide the profession's foundation.