A common security problem plaguing the oil and gas production companies in the booming South Texas oilfield is securing the many entrances to the thousands of active oil and gas leases. With multiple oil companies and associated vendors accessing these busy sites 24/7, security and site integrity can quickly get out of hand. In the past, the only means of providing log in/log out of vehicles and gate control was by use of costly personnel stationed around the clock.
Using “Virtual Gate Guard” from Security Technology of South Texas, Inc., entrances to remote locations can be controlled remotely from our UL Listed Video Monitoring Center. Cameras provide live view connectivity to our video monitoring center and a two way IP intercom system between the gate and our facility provide an instant communication link to the gate. Our operator, following a predetermined set of rules established by the customer, compiles a report of the person requesting entry and can either deny or allow access by sending an “open” command to the gate. “Credentialed” users (drivers who have pre-approved clearance to enter the facility) simply present their access card to the proximity reader at the intercom and are logged into the system and granted access without having to interact with our personnel. An electronic record of the entry for both the presentation of the access card and a video file of the vehicle license plate and driver are logged and provided to the customer on a weekly basis.
Based on the costs of manning a gate with security personnel 24/7 vs. the costs of a virtual gate guard system, the savings over the course of less than six months is substantial to the customer.Copper Theft vs. The Videofied ® Video Intrusion System →
The use of drones for surveillance is no longer confined to the pages and scripts of sci-fi stories. While it is true that we have been using sophisticated camera systems combined with flight to spy across the Ocean at least since the development of the U2 program during the Cold War, it is the addition of modern “IOT” style tech to this equation that has opened the possibility for open (or closed) networks of semi-autonomous security devices to be used in securing important locations.
The advent of the "smart-phone", for instance, brought with it some pretty serious improvements to the types of technologies you might want to strap to a drone. Global Positioning, high-efficiency LI-ion batteries, megapixel IP cameras, bluetooth and wifi ; As far as the hardware is concerned these are the same types of tech we already use in high-end "ground-level" security systems, such as IP cameras, decentralized computing and storage. The promise of a mobile platform such as a drone is not necessarily in its hardware, but in the possibilities afforded by moving the element of human observation and choice to where it is needed in the most efficient manner.
It is the writer's opinion that these devices will eventually be absolutely essential in high security of the future, as the advantage that having a GPS/GLONAS based waypointing system and an LTE connection attached to a quadracoptor with a camera and a piece of software telling it what to watch for can gift overall operational security in large outdoor areas is significant. As a consumer, I can purchase a drone that can track me as I move, hit several points in a row and return to me, and fly several kilometers on one charge. There are features that allow some devices to return "home" when faced with a battery with just enough life left to get to the charger.
In some ways, it doesn't sound particularly incredible on paper. We have had cameras attached to flying machines for decades. Drones have been used to survey large swaths of farm and ranch land and to manually patrol other areas where a human element is needed as part of the security presence.
It is more the marriage of the architecture of our cellular ecosystems to the increasingly affordable and scalable hardware that stands to be a game-changer for certain sectors of the industrial security market in the near future. STST has already implemented systems which can differentiate between human activity and other types of on-screen movement, and it is this sort of tech, working in tandem with global positioning routing software that could help realize a new standard for securing large areas during times where no one should be there.
For more information on access control systems for your
facility contact Security Technology of South Texas, Inc. at: www.gostst.com
or call (210) 710-5881
To what extent any niche in the overall market will open up in response to some of these new possibilities is not certain right now. It could be that for some reason, consumer drone tech becomes unavailable in the near future. Economy of scale might not be dialed in just right.
Regardless of any of that, the fact remains that the technology to create a simple team of drones is more or less with us today. When the first murder by drone occurs, culpability could be all but impossible to prove. Using software not unlike that which Lyft uses to parse and sort passengers for pick up and drop off in tandem with hardware for pattern detection, it could easily be possible for the type of person who typically gets their kicks “trolling” or otherwise harassing to get in too deep.
And as for those who say that such an idea sounds like something from the future, I would not blame you. The media is full of ominous images of “intelligent” machines. From "The Terminator" to this year's, "Horizon:Zero Dawn", there is no shortage of human fear surrounding drones.
Sometimes even the imagery of the language we use to describe our “IOT” seems to evoke something more sinister. But the days of an AI “ecosystem” complex enough to take advantage of the machines in which it is embedded are certainly not upon us yet.
As I said before, the idea of using a UAS (Unmanned Aerial System) to oversee an area or complex is not a new one. Machines with the ability to recognize and respond to their surroundings have been a staple of the human imagination for thousands of years of recorded history; right alongside flight, so there is something very attention grabbing about mixing the two. Naturally, there is a flurry of application to the FAA for permits for commercial drone use, and it is anticipated that new regulations concerning these types of devices will be necessitated as more and more people own them.
To our universe, we are organizers and processors of information, its sensory and perceptual organs, if you can tolerate the metaphors. As a result, the responsibility for whether or not we write home-brew targeting software will be with us. With drone technology in its infancy, not much can be truly said. But with the exposure the devices are currently getting, I personally do not think it will be long before someone bolts a WalMart purchased assault rifle onto some consumer drone that thinks it is playing an AR game with whomever it is looking for.
For more information on access control systems for your
facility contact Security Technology of South Texas, Inc. at: www.gostst.com
or call (210) 710-5881
The days of using on-site DVRs to record and store data has increasingly become a thing of the past in the industry of professional security. While many electronics and outlet stores still sell $500 DIY systems using this old technology, managing data using cloud hosting has become otherwise ubiquitous.
Interoute.com defines it as “hosting on virtual servers which pull their computing resource from extensive underlying networks of physical web servers”. All this means is that instead of using more expensive on-site computing power, the data is sent to the servers of a hosting company. In systems using computers to run high-end video analytics, however, it may still be necessary to use on-site servers.
As a Brivo authorized dealer, Security Technology of South Texas has access to industry-leading cloud technologies. “Brivo OnAir” accomplishes the management of the large databases necessary in securing heavily-trafficked gates or with access control systems where many different people are using assigned key fobs. Video-footage for each recorded event is stored on Brivo’s computers, and accessible to the user via desktop, smartphone, or other internet capable device.
Finally, one of the most important advantages that cloud hosting offers is the protection and security of your data. Video stored on local disk space is not as secure, and hardware failure is always a possibility. The distributed computing of “the cloud” ensures all your data remains protected.
Although you will still see decades old analog cameras recording in 240p in many businesses, the security industry has benefited from the last 15 years of progress in computer analytics and networking technology more than most. “No longer will you need some kind of server to store the camera data, it will all be stored on the cloud from now on.” (proclaims the innovationenterprise.com). The move from onsite data storage to cloud based archiving has lowered the cost while increasing the amount, quality, and security of data.
“The value of a security solution increases in relationship to the extent of its integration with other security and information technology components.” ( securitymagazine.com) Adding in analytics devices can screen against false alarms by being “taught” over time to distinguish between an intruder and, for instance, an animal passing through. Highly integrated systems can create extensive metadata logs as well. Combining a system of key fobs with 1080p IP cameras and analytics allows an ecosystem of interconnected devices to perform tasks that would be unfeasible using outmoded technologies.
The advent of the massive web of 4GLTE connected phones over the last decade permits quicker and smarter security solutions, particularly at the industrial level. It is increasingly possible to detect intrusion and dispatch police with a “video verified” break in in progress rather than simply have a grainy black and white recording to try and discern a face in after the fact, a fact which often piques the interest of business owners who may not have looked into security until a break in.
For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at: www.gostst.com or call (210) 710-5881
On July 30, Christus St. Vincent Regional Medical Center in Santa Fe, New Mexico underwent a full lockdown for over an hour. A nearby gang related shooting prompted the hospital to “[go] into lockdown mode until the situation [was] resolved and it's been determined that there is no danger to patients or visitors", according to Arturo Delgado, a hospital spokesman.
In the past, emergency lockdowns of this sort were achieved through the physical act of locking all entrances to a complex, and often using human security guards to enforce the lockdown. A modern, state of the art access control system can dramatically reduce response times and overall security, “giving you the ability to lock all exterior doors with a couple clicks of a button, not allowing any entry whatsoever.” (action1st.com)
The ability to selectively limit access to certain areas through the use of key fobs (or even biometric scans) can of course also do much to limit lockdown emergencies from occurring in the first place. A log of who went where and when can be consulted later during any investigation, and is a further measure of protection from liability.
In a setting like a school or hospital, where there is typically a lot of traffic from the public, a professional access control system designed and installed “turn-key” can be the difference between a lawsuit and “crisis averted”.
Traditionally, school video surveillance security consisted of a few low quality analog cameras, connected to a DVR, watching exterior areas and hallways. As is the case with analog cameras, the video quality was poor and the recorded video required an onsite visit to view footage.
Thanks to Eagle Eye Networks, that has all changed. As an authorized integrations provider for Eagle Eye Networks cloud video surveillance in the South Texas market, Security Technology of South Texas, Inc. is helping school districts as well as all types of commercial enterprises with high resolution smart cameras and cloud connected/managed services. Cloud cameras eliminate the need for local recorders and allow instant access to video on campus in real-time. In case of an emergency situation – when information delivered to first responders quickly becomes the difference in life and death – the Eagle Eye system has the unique advantage of delivering crisp, clear video via the cloud interface. Below is an example of how Eagle Eye Networks have helped Oakwood High School address their safety and security issues:
Oakwood High School did not have a video surveillance system on campus, so they did not have complete visibility into what was happening among their 300 students. The principal was looking for a solution that would allow the staff to view multiple locations at once to ensure safety and to assist with resolving on-campus disputes.
Oakwood High School decided to implement Eagle Eye’s Cloud Security Camera VMS throughout their campus. They granted access to key faculty members as well as the city’s police chief so that all parties can view video footage from their phones, adding an extra layer of security should any incidents occur. The principal also monitors the video footage to ensure no students are loitering in the halls, the third shift custodial staff is doing their job properly, and that no suspicious activity is taking place near or on the campus.
“Eagle Eye is better than I imagined. I’ve used it beyond our intended security purposes. When there’s a disciplinary issue, the video gives me a better idea of what happened. There’s no more dealing with he said, she said arguments – Eagle Eye has become my third eye. We have already decided to implement this system throughout our district.”
Principal, Oakwood High School
To learn more about Security Technology of South Texas, Inc., and the revolutionary Eagle Eye Networks cloud video surveillance system, please contact us at 210-446-4863 or by email at email@example.com . Or visit us at www.gostst.com .
(article provided by Eagle Eye Networks)
With tough times in any market, though, comes innovation. And stepping up to meet the challenge to innovate in a difficult energy market is Security Technology of South Texas, Inc., with the “Virtual Gate Guard System”.
The Virtual Gate Guard, using cloud-based video and access control technology, replaces costly manned gate guard services, and does so for a fraction of the monthly cost. In fact, Security Technology has been installing such innovation for various oil and gas producers and saving them hundreds of thousands of dollars per year at multiple gate entry locations throughout south Texas. One of the largest O&G producers in Texas reports savings of approximately one million dollars on an annual basis using this unique technology.
The Virtual Gate Guard uses high resolution video cameras that connect directly to a remote 24/7 call center where video analysists view – in real time – drivers requesting entry to a property, lease or facility. Using a cloud-based intercom system, the driver communicates with the security center and are “logged in” with the same information as a physical guard would collect. The gate is then remotely opened and the driver enters the property, without ever having to leave the vehicle, creating a safer environment for the driver and smoothly logging in and moving all drivers onto the property.
Since the system can be installed for no initial investment, the company only pays a monthly fee, which is a fraction of what they were paying for a guard service, and the savings is realized immediately. For more information on the Virtual Gate Guard System contact Security Technology of South Texas, Inc. at 210.446.4863. Or to learn more go towww.gostst.com.
Managing safety and protecting workers in the oil and gas industry, especially given the rugged environment of the Eagleford Shale territory, has always been a challenge. Understanding a safety issue in real-time, as it is happening, is critical in creating a safe environment for the men and women who work in this vast – and dangerous – part of the country.
A breakthrough technology being deployed for some of the most active oil and gas companies in South Texas is the use of Smart Cameras. The high tech video systems are solar powered, and use a private cellular network canopy that has been deployed over the vast majority of the Eagleford area. Using special analytics, the cameras can be installed anywhere, and do not require power or Internet connection. Using the camera’s analytics, it is “taught” to only detect what its told to, such as truck traffic into leases, over bridges, into tank fields, pad sites, etc. This new technology extends the reach of O&G field managers by allowing them to “see” multiple locations at once and detect any safety issues which might be happening.
Ignoring everything except the presence of human or vehicular traffic, the Smart Camera – upon detecting a vehicle entering the detection zone – records a video clip of the event and instantly transmits it to the cloud-based system provided by Security Technology of South Texas, Inc. and then the video event is sent to the end-user’s smart phone, tablet or PC.
Marketing this technology as “Camera Anywhere”, Security Technology can deploy the system to a site within one day and be tracking and sending video notifications from the site that same day. And because the system is completely self-contained, it can be relocated to other sites should the need arise. Some of the critical areas O&G companies that currently use this system to cover are:
- Entrances to leases (it can even incorporate a keypad and electrically control a gate while sending video clips)
- Pad Sites (employee can see what is happening at the pad site before arrival. Also, by doing remote video tours of multiple sites, cut down on travel for routine inspections)
- Tank Fields and SWD (be alerted to vehicle traffic as they pull oil and help mitigate oil theft)
- Monitor traffic on critical areas inside of lease, i.e. one lane bridges and other areas where traffic safety is a concern
To learn more about Camera Anywhere and remote video technology contact Richard Youngman, President, Security Technology of South Texas, Inc. at 210-710-5881 or on the web at www.gostst.com .
What good is a video surveillance camera if no one is watching it?
This is a common question asked by business owners, managers and security directors. Traditionally, video surveillance systems provide a recorded image history and that’s about it. This does little to help companies protect themselves in “real time”, as the crime is occurring at their facility. That’s all changing…..and fast!
Remote video monitoring services are quickly becoming the service of choice for businesses that want to avoid the high cost of guards and patrol services, and use technology to protect their assets – and at a fraction of the cost of physical security. Using an offsite Security Call Center, the remote video monitoring service operators connect to video cameras at the customer’s facility and perform scheduled or random “patrols” and document the event in a report that is provided to the customer daily, weekly or monthly. Also, in the event that an unauthorized person or vehicle appears at the facility, operators at the call center can interpret video feed from the scene, and take action. Options available to the operator are:
Who are some of the types of facilities and businesses that benefit from remote video monitoring:
To learn more about remote video monitoring go to:
or call us toll free at (855) 688-2718