Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video SurveillancePorts: Sea, Land, & Air

Six Questions to Ask When Selecting Surveillance Systems for Harsh & Rugged Environments

By Paul Kong
ports-enews
May 22, 2018

Choosing a security system can seem complicated, particularly when factoring in the different environmental conditions to which a camera can be subjected. It’s important to take environmental factors into consideration to make sure a camera lasts as long as it should. Below are six questions businesses should ask themselves before investing in a new surveillance system.

 

  1. What type of environment will the cameras be in?

Outdoor cameras require protection from moisture and dust, but most cameras are designed with adequate protection from the basic elements. It’s important to look beyond the basics to precisely what’s in the air and water surrounding the camera.  Seawater is a perfect example of a corrosive environment that can destroy a camera prematurely if the camera is not designed for it. Indoor environments can be just as corrosive when aggressive chemical cleaners are used to sanitize all surfaces. Stainless steel housings are a necessity for cameras in marine or other harsh chemical environments. The bubble in front of the lens is also vulnerable, so a material like nylon is often used to resist corrosion in front of the lens.

 

  1. Will the camera be fixed, or is it mounted on a vehicle such as a bus or train?

A waterproof camera on the side of a building is different from a waterproof camera on a bus going through a high temperature, high pressure steam wash. It’s for this reason that there are many different standards ratings levels for both solid particle and liquid ingress protection. IP6K9K is currently the highest rating for both dust and protection from high-temperature pressure washing. Review the standards and make sure they match your conditions. Vibration and shock are also important considerations in moving environments. Look for cameras with gyroscopic sensors and digital image stabilization (DIS) to reduce motion blur and deliver sharp, stable images.

 

  1. What types of temperature variations will be encountered?

Hot and cold temperatures and their effects on recording equipment can be important, but even more important are the effects of rapid changes in temperatures. A bus parked in a freezing parking lot that gets started and suddenly has all the heaters running on full can quickly fog up a camera lens. Some cameras have built-in heaters to minimize temperature extremes and keep lenses clear.

 

  1. What about recording equipment in harsh mobile environments?

A mobile NVR (Network Video Recorder) has its own challenges in vehicle environments. Operating temperatures are extreme and fan-cooled systems can quickly fail because of dust, which makes it important to find a mobile NVR that utilizes a fan-less design.  Rugged mobile NVR units typically employ large heat-sinks (fins) in the outer housing to dissipate heat without the use of a fan. Keeping dust and debris away from sensitive electronics is critical to long life. Look for a mobile NVR with no moving parts, including the storage drives.

 

  1. What type of lighting conditions will the camera operate in?

Most cameras can deliver solid performance in daylight. It’s more difficult for cameras when the light disappears. IR (infra-red) light is one answer, but most IR lights have a fixed distance of illumination and can make it difficult to discern details when color is lost. It’s possible to choose cameras with extreme low-light sensitivity that can still provide reliable color information. In general, look for cameras with a wide dynamic range (WDR of 120-150dB is ideal) that can consistently reproduce detail from shadows even in high-contrast lighting conditions. Frames per second (fps) can impact WDR performance. Look for a camera with enough fps to deliver the WDR you require without sacrificing smooth motion capture.

 

  1. Can rugged environments also benefit from advanced analytics?

Just because the environment is rugged, don’t forget on-edge analytics. Intelligent in-camera analytics are a crucial part of any surveillance system, and rugged environments benefit from both video and audio analytics when it comes to alerting staff and finding important events. Beyond basic motion detection, a good suite of tools should include behavior analytics such as appear/disappear and loitering. Passing a virtual line, enter/exit, and directional detection are also important. A good security camera should know if it’s been tampered with or if it’s just a foggy day. Beyond video analytics, in-camera audio analytics are important tools that can detect glass breaks, explosions, gunshots or screams and send immediate notifications to a VMS. Lastly, there are analytics such as people counting, heat maps and queue management that can provide valuable market and business intelligence depending on your unique requirements.

KEYWORDS: mass transit security port security ruggedized security security budget security technology security video

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Paul Kong is the technical director for Hanwha Techwin America and former software specialist for the Hanwha Techwin headquarters in South Korea. He has been in the security industry for over 13 years working from many different vantage points ranging from technician to product development and integration manager.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • analytics

    Analytics on the Edge vs. on the Server – What’s Right for Your Business?

    See More
  • videoscreen-enews

    What is H.265 and Why Do I Need It?

    See More
  • Designed to Maintain Surveillance in Rugged Environments

    Designed to Maintain Surveillance in Rugged Environments

    See More

Events

View AllSubmit An Event
  • March 8, 2012

    iSecurity Virtual Tradeshow

    iSecurity is a FREE online event designed to put the information you need, the people you want to network with and the solution providers you want to hear from at your fingertips.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!