Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Running a Tight Ship with Intelligent Video

May 1, 2009
Champions Auto Ferry near the Michigan-Canada border discovered a comprehensive security system could make their efforts more effective.


Harsens Island is a remote island town with a population of less than 2,000 located 25 miles northeast of downtown Detroit, Michigan.
     
One of its essential businesses is Champions Auto Ferry, which provides transportation to and from Harsens Island across the St. Clair River 24 hours a day, 365 days a year. David Bryson, owner of Champions, understands the importance of his company. “There’s only one way to get to Harsens Island from mainland Michigan, and it’s Champions Auto Ferry. Champions has been providing ferry service to island residents and visitors since 1937, when my grandfather first started the business. Even the harsh winters and icy waters don’t stop us from operating.”


Corralling Passengers

Champions operates four ferries, each with the capacity to transport up to 100 people or 12 automobiles at any one time. With departures as often as every 15 minutes, the sheer volume of passengers and cars poses a challenge to track and manage, particularly during peak season. Additionally, the small staff sometimes has to round up rowdy passengers.
     
To better monitor the number of cars being transported on the ferries, and to ensure a safe and relaxing environment for passengers, the company sought a video surveillance solution that would record transactions and activities and serve as a reliable backup if particular incidents needed further examination or investigation.
     
Champions also needed a video surveillance system for another crucial reason. Because of Harsens Island’s proximity to the Canadian border, many Canadians routinely visit the island as well as mainland Michigan. Unfortunately, passengers have also included non-Canadians seeking illegal entry into the United States.
     
“There is no official port of entry into the U.S. close to Harsens Island. Once Champions became aware that unauthorized people could be entering the U.S via our ferries, we wanted to do what we could to help minimize the situation. Being able to capture the images of everyone traveling on the boats and provide this footage to the authorities if needed was of paramount importance to us.”


MOBILE UNITS NEED SPECIFIC TECHNOLOGY

For cameras to be installed on the boats, Champions needed an IP video surveillance solution that would run on Champions’ wireless mesh network. Bryson began actively looking for such a solution and turned to Data Consultants, a systems integrator specializing in video surveillance and wireless mesh technology. Joshua Bylsma, a physical security consultant for Data Consultants, worked with Champions Auto Ferry to quickly identify the best surveillance system that would meet all of Champions’ needs.
     
“Champions already had a legacy surveillance system in place,” said Bryson. “It was an outdated VHS system recording with old black and white cameras. It had obvious draw backs – poor image quality, unreliable VHS tapes, poor field of view coverage. With Champions’ 24/7 operations, we needed something that provided high-resolution images in an outdoor, day/night environment.”
     
Data Consultants recommended to Champions the VideoIQ iCVR, an all-in-one product that includes a state-of-the-art wide dynamic range day/night camera, an embedded DVR, powerful analytics and video management software. The camera had everything Champions was looking for in a video surveillance solution, including the ability to automatically capture critical events at the highest frame rate and quality, while continuously recording everything at a lesser quality to maximize storage. And because video is stored in the camera, network requirements are minimal.
     
“The minimal bandwidth and storage requirements of the iCVR made it a great choice for Champions, particularly because of their need to record 24 hours a day and operate the cameras on a wireless mesh network,” said Bylsma. “Because the new system stores all video at the edge and the analytics are performed at the camera itself, it was possible for Champions to have cameras on both the mainland and island while providing room for growth for additional cameras and systems on the wireless network. It was the perfect solution for this type of topology.”
     
Data Consultants worked with Champions to install the cameras, which took about a day and a half to complete. “Installation was very simple and went off without a hitch,” said Bryson.


Time, Energy, Expense Savings

Once the cameras were up and running, Champions was quickly impressed with the system’s powerful event detection capabilities that instantly notify them of any potential threats, including intruders or vehicles on the property. Additionally, it allows Champions staff to easily find transactions or activities that took place during a specific day or period of time.
     
In the future, Champions plans to deploy a special application that automatically counts and reports to the network the number of vehicles traveling on the ferries, which will save Champions considerable time, energy and expense in daily auditing procedures.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Intelligent Video Solution: a Definition

    See More
  • Intelligent Video Offers Electric Utilities a Solution to Copper Theft

    See More
  • Chilean Salmon Farm Enhances Security with Intelligent Video Edge

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing