Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

From Bow-wow to Oh-wow

By Bill Zalud
November 21, 2006


Ever notice that when you blow in a dog’s face, he gets mad at you. But when you take him in a car, he sticks his head out the window, big old ears flapping in the wind.

Most dogs love riding in a car. So do most people. Vehicles, ranging from those little Mini Coopers and giant Hummers to tracker-trailer trucks, are the life’s blood of America and its economy. There also are security concerns: folks run red lights; accidents and incidents on tollways; and even terror threats from trucks loaded with explosives.

According to the Insurance Institute for Highway Safety, drivers running red lights cause about 22 percent of all traffic accidents, killing some 800 people annually while causing an estimated $7 billion dollars in property damage, medical bills, lost productivity and insurance hikes.

The North Texas Tollway Authority has an upgrade pan from analog video to IP-based cameras. A dual IP/analog interface provides seamless migration of the existing 600-plus surveillance cameras.

Red-light Cameras

To fight the problem and, by the way, generate revenue for cities and their outsourced partners, so-called red-light cameras collect all of the evidence authorities need to prosecute light-runners. If a camera catches you speeding through the intersection, you can expect a ticket (along with a photograph of the violation) to arrive in your mailbox a month or two later. There are controversies – a U.S. House panel heard testimony suggesting some red-light vendors reset the “yellow” light to display and change to red more quickly and lawsuits propose unfairness when the owner of the auto is not the driver at the time of an infraction.

Analytics also has a growing role viewing, tracking and protecting vehicle traffic.

For example, the North Texas Tollway Authority (NTTA) is upgrading from analog video to IP-based cameras from Sony. The dual IP/analog interface allows for a seamless migration of the existing 600-plus surveillance cameras, tollway officials told The Zalud Report, as well as providing an analog solution while backend content analytics makes the transition to IP for the more than 200-plus traffic cameras covering 54 miles of Texas toll facilities in the Dallas Metroplex. Said James Hofmann, director of IT at the NTTA, “The system lowers the total cost of ownership compared to our legacy security video installation, while improving the safety and satisfaction of our customers.”

The system monitors 1.3 million daily toll transactions. First, it monitors conditions on the roadway for any situation or condition that might slow traffic or put travelers at risk. Second, it guards each toll plaza and on ramp, protecting property and personnel from criminal activity.

“Our legacy system worked fine, it’s just that there was no way we could evolve and advance with it,” said Marty Legé, NTTA command center manager. “IP is where everything is going because of the new applications and the new opportunities they afford. Automated detection is essential to operating a system like this effectively, and it is clear that the IP platform is where the content analysis developers are moving and so we move with them.”

Other security scenarios view vehicles as rolling bombs.

In New York City, and after the tragedy of Sept. 11th, many high-rise buildings installed bollards and barriers. More recently, some of those installations have been dismantled. But there still is no doubt that high impact vehicle barriers have an important security role.

There are a range of barriers including independently certified bollards, road blockers and beams, all should be tested and certified to internationally recognized U.S. Department of State standards to prevent aggressive vehicle intrusion at high-risk sites.

Zalud’s Report previewed hydraulic bollards, for example, from Boon Edam Tomsed, that combine an open, aesthetic appearance, combining free movement of pedestrians with a high level of perimeter control.

These barriers have traditionally been associated with government and military sites; but more organizations now consider use as the threat of terrorist attacks -- softer targets such as nuclear, pharmaceutical and petrochemical plants.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Technology's WOW Factor

    See More
  • Credible Security Services Wow CEOs

    See More
  • Wow: 29 MP HD Surveillance Camera

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing