Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Lots

May 1, 2005
The Herb Chambers car dealership in Boston has a large and valuable inventory protcted by motion dectors and interated digital video monitoring equipment.
The sprawling Herb Chambers car lots, which made up the better part of a city block in downtown Boston, were for a time a perfect playground for a game of hide-and-go-seek, if not the most secure of campuses. Today, the local children won’t find many good hiding spots; but considering the tradeoff in security, the car lot company seems to have come out ahead.

What changed things was the application of a state-of-the-art security system. Thanks to motion detectors and integrated digital video monitoring equipment from Vision Systems, Norwell, Mass., and Smart Interactive Systems (SIS), the New York security firm hired by Herb Chambers to design, install and administer the system, the entire facility is now protected from theft and vandalism.



From this centralized monitoting station in New York, Smart Interactive Systems monitors multiple high-security sites. Interactive management software can alert to an intrusive and pinpoint an intruder's location.

From guards to technology

I'd say the old system was obsolete,” said SIS Regiona It is not uncommon for facilities to deal with separate vendors for various needs like an alarm/access-control system, security video system and guard service. But Herb Chambers asked SIS to put together a custom-designed system that met all three needs. To assemble this comprehensive package, SIS in turn brought in Vision Systems.

In addition to installing about 30 more video cameras at the Herb Chambers facility, SIS chose Vision System’s ADPRO Pro 250, a passive infrared motion detector designed for perimeter protection. The long-range device could detect motion up to 300 feet away in any weather. Used in conjunction with interactive management software, the equipment would instantly alert the system operator to an intrusion and pinpoint an intruder’s location. An SIS operator at the company’s CMS in New York would assess video of the situation and respond accordingly.

Within a month of installation in October 2003, the new surveillance system led to the arrest of three men who were trying to steal car parts.

“Our main goal is to scare intruders off,” Harrow explained. “In the case of the would-be car-parts thieves, the intruders heard the audio warning, but the police response was so quick they were still on the property when the authorities arrived.”

When police are called to the scene, the operator in New York can send video of the intruder via a high-speed Internet connection and direct a responding officer with two-way audio.

Pertinent video and audio is stored for potential use by law enforcement agencies. A DVR instantly retrieves up to 120 days worth of evidence-quality archived video in addition to providing live video of the monitored site. Its image-compression capability is complemented by Video Central Gold software, which communicates with the DVR and supplies the operator with a four-picture snapshot of what caused the alarm. The CMS records activity on the site when the car lots are closed. Although the video cameras are always on, there has to be motion in a camera’s field of view (the pixels have to change) for recording to begin.

An extra benefit to the car lot is an on-site system that enhances the company’s capability for internal policing. Managers have ADPRO Video Central Lite software on their personal computers and can access live surveillance video and up to 30 days worth of archived video. This can help management.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • PSA-TEC 2010 Conference and Expo to Offer Lots of Education

    See More
  • Lots of Parking Bumps: IP, Lightning & Terrorism

    See More
  • Headaches in Parking Lots, Garages

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing