Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

New Tech Takes a 'Toll'

By Bill Zalud
December 1, 2006

There’s a shift in the way enterprises view access controls, security management and life safety. While cards and readers continue to pull heavy duty, more often chief security officers center on the power of databases, security video and analytics.

Another business trend: the convergence of physical access control with financial and transaction processes that support business bottom lines.

And nowhere are these changes more visible than in operations that involve vehicles. Tollways in many states now offer long-range radio frequency identification (RFID) “tags” for vehicles so that cars and commercial vehicles can access the tollway without stopping while also paying for the privilege. Less sophisticated RFID systems act as the access control into office building garages and gate-guarded communities. Some healthcare and government buildings now use security video connected to license plate recognition to permit access.

CARDS TO VIDEO ACCESS

While they won’t kill off cards anytime soon, the combination of IP security video and image content analysis has the potential to quickly reach access decisions while also working with databases of pictures, data or even audio.

A case in point – The North Texas Tollway Authority (NTTA) is now upgrading from an analog security video monitoring and security system to an IP-based version. The dual IP/analog interface on the cameras allows for a seamless migration of the existing 600-plus surveillance cameras, Tollway officials stated to media. The magic: The design provides an analog solution while backend content analytic system developers also make the transition to IP for the more than 200-plus traffic cameras covering 54 miles of Texas toll facilities in the Dallas Metroplex.

The IP cameras “allow us to better carry out every aspect of our mission to provide a fiscally sound system of innovative toll facilities, services and solutions that improves the mobility, quality of life and economy of the North Texas region,” said James Hofmann, director of IT at the NTTA. “The system lowers the total cost of ownership compared to our legacy installation, while improving the safety and satisfaction of our customers.”

FAST ACCESS LANE

The NTTA’s video monitoring and security system is designed to monitor the 1.3 million toll transactions that take place daily, tollway officials said. The system carries out two core functions: First, it monitors conditions on the roadway for any situation or condition that might slow traffic or put travelers at risk. Second, it guards each toll plaza and on ramp, protecting property and personnel from criminal activity.

Since the initial pilot installation of what transportation officials call Intelligent Transportation Systems or ITS, over 200 pole-mounted cameras located at half-mile intervals on the roadway have been installed to keep constant watch for accidents, breakdowns and any other hazards that affect the flow of traffic. When the desire to migrate to the emerging IP-based system became clear, tollway authorities said there were increasing demands on the extensive fiber optic infrastructure created to support the rapid growth of NTTA’s roadways. Converting from analog to IP cameras significantly reduced fiber requirements, and eliminated the need for costly fiber transmission gear.

“The NTTA came to us asking how we could help move them to the IP platform, and to identify vendors who could assist,” said Kelly Black, NTTA account manager for SecureNet, a Carrollton, Texas-based security firm that has served as NTTA’s security technology partner since the initial security installation.

The biggest challenge in implementing the new system was devising a way to segue seamlessly from analog to IP, tollway officials said. The fact that a key content analysis package used to recognize events on the roadway was analog-only compounded the complexity. Early on in the search process, it was clear that dual-feed cameras could address this issue. They allow the analog elements of the system to operate alongside the IP capabilities until the back-end analytics catch up to allow for end-to-end IP operation.

OPTIMIZING RESPONSE, SAFETY AND EFFICIENCY

“Our legacy system worked fine, it’s just that there was no way we could evolve and advance with it,” said Marty Legé, NTTA Command Center Manager. “IP is where everything is going because of the new applications and the new opportunities they afford. Automated detection is essential to operating a system like this effectively, and it is clear that the IP platform is where the content analysis developers are moving and so we move with them.”

The benefits of improved analytics come through speedier, more appropriate responses to everything from fast-breaking situations and simple breakdowns to assisting police by observing numerous traffic stops that occur weekly, tollway authorities said.

After the analytics detect a situation, other cameras come into play to investigate the scene and determine the appropriate response. Being able to tailor a response to specific needs, rather than providing a standard blanket response saves money, and can provide an extra degree of safety.

“If we don’t need to dispatch a fire truck and an ambulance, that saves everyone a lot of money,” Legé said. “But if there’s a hazardous spill, we can have the first responders ready for what they’re up against before they put themselves into danger.”

NTTA’s Hofmann noted the numerous savings. The installation cost in a typical toll plaza is $140,000 less than the equivalent analog setup, Hofmann said. Ongoing savings come from the simplicity of the system, the non-proprietary architecture, and ability to perform routine maintenance remotely, among other infrastructure savings.

“We are only able to run up to eight analog cameras on a fiber optic strand under current standards, while we can connect up to 72 IP cameras. We expect to have 1,000 cameras online next year, and there’s major savings in the significant reduction of fiber strands required,” Hofmann said.

Daily maintenance, too, is far less expensive monitoring the cameras’ status via two-way IP connections, Hofmann added. A single technician can keep an eye on the entire camera array. Before, multiple crews had to be dispatched on location at odd hours shutting down lanes to provide such proactive equipment maintenance.

From Hofmann’s IT perspective, a focus on open systems gives him comfort that the investment in the IP cameras today will continue to reap rewards for many years to come. “What gets me excited as an IT director is a camera’s open API,” Hofmann said. “The software analytics are growing tremendously, and we won’t have to replace these cameras as new capabilities become available. The open architecture lets us leverage our investment, while our system continues to advance.”

Sidebar: Inside the Texas Tollway System

The IP-based system being phased into the North Texas Tollway Authority design includes Sony IPELA cameras.

Sidebar: RFID Adds to Access Controls

Card access controls provide a needed level of security but when it comes to trucks, ships and cargo, chief security officers look for other options.

One solution -- Radio Frequency Identification tags and readers help provide real-time cargo location and security information that can be accessed with information services worldwide, including international and national ports. In such designs, the data are transmitted automatically over radio frequencies to a Web-based software platform to keep better track of tagged containers and environmental changes inside them.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hospital corridor

    How to Build a Complete Access Control System

    See More
  • Smartphone used for security

    Another Evolution?

    See More
  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    Access Control is Only the Beginning for Multi-Function Cards

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!