The days when Chinese video surveillance products were associated with lower quality are mostly gone now. Certainly, it’s easy enough to test the quality and functionality of any Chinese-made product in a shootout against products made anywhere in the world. In that sense, the quality of Chinese goods is no longer an obstacle for security customers: Their ability to judge quality for themselves eliminates any dependence on previously held opinions.

But what about other preconceived ideas and opinions about products made in China? Such concerns range from who owns the companies to concerns about cybersecurity.

Hikvision is the largest Chinese company participating in the video surveillance market (and the largest company of any nationality). Their ascendance in the U.S. market in the last couple of years has been remarkable. Even so, questions and concerns linger surrounding the fact that they are a Chinese company. Are the concerns legitimate or ill-informed? We presented some of these questions to Jeffrey He, President of Hikvision USA Inc. and Hikvision Canada Inc., who agreed to present the company’s perspective.

SourceSecurity.com: We often hear that Hikvision is owned by the Chinese government. What exactly is the nature of that relationship?

Jeffrey He: First, I think we can all agree that it is no longer the case that only lower quality products come from China. Today we see a wide variety of products coming from China that not only meet but actually exceed Western expectations for quality and value. Hikvision is a perfect example of a Chinese-based, yet publically traded, company that provides such products, which certainly helps our ascendance in the market.

In terms of your question regarding the Hikvision’s ownership structure, I appreciate this question and value the opportunity to address any rumours out there. The company’s ownership is composed of a diverse set of private and public entities. Hikvision USA Inc. and Hikvision Canada Inc. are wholly owned by Hangzhou Hikvision Digital Technology Co., Ltd., 42% of which is owned by state-owned-enterprises (SOE), with the remaining stock owned by a combination of general public stockholders and venture capital investors, including 18% from private equity in Hong Kong. Like many companies across the globe, Hikvision does benefit from a certain amount of investment from the government. However, equating a company partially owned by SOEs with the government itself is simply incorrect and misleading.

There are two state-owned enterprises that own 42% of the company, with other people and venture capital investors owning the rest, including private equity in Hong Kong. Then in the open stock market there are shareholders all over the place. Some of the shareholders are foreign investors, as well.

Hikvision addresses cybersecurity concerns

SourceSecurity.com: Hikvision has in the past been associated with questions (and incidents) of cybersecurity of their cameras. How has Hikvision addressed those incidents and concerns? Are the products “safe” now? What about other common cybersecurity concerns of IP cameras?

Jeffrey He: The security of our products is of the utmost importance to us, and we have both internal and external teams in place that conduct ongoing testing for cybersecurity vulnerabilities. Our proprietary Network and Information Security Lab upholds the highest level of internal process control, security management, and independent auditing.

It’s true that some of our products have suffered cyber-attacks. In the past two years our products have been affected by several cyber-attacks. During a recent webinar we did with the Electronic Security Association (ESA), we went into each of them in detail. If vulnerability is found, we react swiftly to resolve it and notify our customers. Most of the time this means creating new firmware and releasing it to the public, which in most cases we were able to accomplish in a matter of days.

These attacks not only affected Hikvision products but also impacted other manufacturers as well. Being the world’s largest IP video surveillance manufacturer, we become a natural target. In comparison, some of the world’s largest software manufacturers issue new security updates almost weekly to address threats to their products. We live in a very connected world, and unfortunately this world comes with risks. 

No network product on the market – whether Hikvision or otherwise – can ever officially be declared “safe,” since new cyber-threats are constantly emerging. We continually monitor for new threats and mitigate any risks should they occur.

SourceSecurity.com: One idea floating around the industry is that Chinese surveillance products might have a “backdoor” to allow access to video by the Chinese government or other third party.

Is there any credence to the notion that Chinese surveillance products have a backdoor? What can you tell your North American customers about the security of Hikvision equipment?

Jeffrey He: There have been some misguided accusations targeting Hikvision’s public and industry image, sometimes seeking to create controversy where none exists. Over the past 15 years, Hikvision has built strong and valuable relationships with security industry stakeholders around the globe. In North America, we have made it our responsibility to not only provide outstanding video surveillance products and solutions but also to build our partnerships based upon trust. These questions are geared in general not just to Hikvision but to many Chinese manufacturers, and none of these accusations have been proven to be true. These accusations are baseless.

The Cold War was officially over when the Berlin Wall came down, but I’m seeing that, in the minds of some, it never ended. We all would be better served if, instead of living in the past, we would look towards the future and the realities of world changes and technology changing along with it. People living in the past or pursuing their own agendas are not discussing the real threats of terrorism. Instead, they are going after the very manufacturers providing the solutions to fight criminal and terrorist activities.

We continue to take steps to improve our products, including having them tested by leading third-party cybersecurity firms in the United States to minimize any potential security risks. So far, we have seen no evidence to suggest any “backdoor” access to our products by a government or a law enforcement agency anywhere in the world.

And as you know, we are using SourceSecurity.com’s recent Technology Report on Cybersecurity and IP Video Systems to further educate our customers and end-users.

SourceSecurity.com: How did the company perform overall in 2015? Are you really taking over the video surveillance market (as we often hear)?

Jeffrey He: Hikvision had worldwide sales revenue of US $3.88 Billion in 2015, with a growth rate of 47%.

Given the size of our company, we did quite well. In North America we will continue to grow because of the right proposition set, including our versatile, innovative product suite, service, and customer support and our North America-based talent base.

We are not taking over the market. Rather, we are part of the healthy competition one sees in the video surveillance market today. There will always be new innovations, and somebody will naturally take the lead because of type and quality of technology they can provide to the market. There are market participants that used to be leaders, but things change, due to many factors, including the effect of lack of innovation. Innovation is the key factor, not pricing. Pricing can only go so far before it becomes irrelevant.

Hikvision global surveillance share

SourceSecurity.com: How is Hikvision addressing competition, both from other established manufacturers and new entrants to the video surveillance market?

Jeffrey He: Healthy competition is really the driving force for innovation: delivering value to integrators and end-users. This is true not only of video surveillance but of any industry. North America is dramatically different as a competitive landscape versus Asia or Europe.

Just a few years ago the Chinese security market was dominated by foreign brands. Talking from personal experience, I worked for a company that sold billions of dollars’ worth of equipment and services to China. However, as the technology changes, so do the value expectations in the market. Hikvision was able to drive its success with significant investment in R&D and service delivery. We were able to fulfill the value expectations for video surveillance products and solutions in the marketplace. I do want to mention that despite some accusations of protectionism that we sometimes hear, even today there are two foreign brands that dominate the intrusion market in China and probably hold the major market share there. The truth of the matter is that competition is what truly drives innovation, which creates additional value for the customers. 

One clear example of technology innovation is the 4K standard. With our 4K products we are trying to deliver value to the market. Without any competition, the industry would still be at 4 CIF. Out of this drive to compete comes a technology that has widespread benefits in the marketplace today and will at one point be the standard.

SourceSecurity.com: We understand Hikvision has been involved in some significant tenders in China. Can you tell us more about it?

Jeffrey He: We do engage in commercial tenders in China and around the globe. As a part of tender process, end-users or an organization ordering equipment or services decide on the aspects for selecting the winner. As the Chinese economy grew in the past 15 years, the security industry also expanded.  Looking at the industry reports and analytics, the Chinese security market is even larger than it is in the US. This certainly allowed Hikvision to grow in the security segment, and the company observed significant growth. As the company continues to strengthen its position as a security products and solutions provider, the opportunities for tenders increase as well. Because of our success in technology innovation and our investment in R&D, we hope for even more success in winning these tenders in the future. 

SourceSecurity.com: There have been claims that Hikvision is being subsidized by the Chinese government. Do you care to comment on that?

Jeffrey He: This is simply not accurate. We are a commercial enterprise competing with international and domestic companies in every aspect. In every government project there are commonly policies and regulations managing the costs of projects; it is clear that the pricing of those tenders is extremely competitive. Considering that, it is hard to imagine a government subsidizing a company under these conditions; it’s quite illogical to suggest that we are being subsidized by the Chinese government. There are many factors being taken into consideration during the selection process for projects in this industry. We became a market leader organically, because of our technology and customer service, not because of government subsidies.

When questions like these are raised, I can’t think of anything but the naive nature and potentially misguided principles behind them. Having said that, I’m confident the company will persevere by continuing to offer outstanding value to our customers and partners.

Download the White Paper on Cybersecurity and IP Video Systems here

 

 

Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Virtual Worlds Disrupt Building Security & Facility Management
Virtual Worlds Disrupt Building Security & Facility Management

From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge.  Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts."   Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects.  Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared.  They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.

What’s New In U.S. Government Procurement For Security?
What’s New In U.S. Government Procurement For Security?

Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the program, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative Review Team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the program by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Center Director sales are growing for GSA Schedule 84. Advocating For The Security Industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organized paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavor to direct things along when challenges occur or to improve the program. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the center’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilizing the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018.   GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes In The GSA Program Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical Access Control Products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labor SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates To Guidance For Procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA program for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorized by the manufacturer. GSA Pricing Tool Since the GSA utilizes a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming Challenges For The Security Community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) program that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorized under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 Leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forward The GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernization is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable Tools For Vendor Training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod program have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.

Which Segments Are Under-Served In The Physical Security Industry?
Which Segments Are Under-Served In The Physical Security Industry?

Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s Expert Panel Roundtable to reflect on instances when the industry may fall short: Which segments of the physical security industry are most under-served and why?