The days when Chinese video surveillance products were associated with lower quality are mostly gone now. Certainly, it’s easy enough to test the quality and functionality of any Chinese-made product in a shootout against products made anywhere in the world. In that sense, the quality of Chinese goods is no longer an obstacle for security customers: Their ability to judge quality for themselves eliminates any dependence on previously held opinions.

But what about other preconceived ideas and opinions about products made in China? Such concerns range from who owns the companies to concerns about cybersecurity.

Hikvision is the largest Chinese company participating in the video surveillance market (and the largest company of any nationality). Their ascendance in the U.S. market in the last couple of years has been remarkable. Even so, questions and concerns linger surrounding the fact that they are a Chinese company. Are the concerns legitimate or ill-informed? We presented some of these questions to Jeffrey He, President of Hikvision USA Inc. and Hikvision Canada Inc., who agreed to present the company’s perspective. We often hear that Hikvision is owned by the Chinese government. What exactly is the nature of that relationship?

Jeffrey He: First, I think we can all agree that it is no longer the case that only lower quality products come from China. Today we see a wide variety of products coming from China that not only meet but actually exceed Western expectations for quality and value. Hikvision is a perfect example of a Chinese-based, yet publically traded, company that provides such products, which certainly helps our ascendance in the market.

In terms of your question regarding the Hikvision’s ownership structure, I appreciate this question and value the opportunity to address any rumours out there. The company’s ownership is composed of a diverse set of private and public entities. Hikvision USA Inc. and Hikvision Canada Inc. are wholly owned by Hangzhou Hikvision Digital Technology Co., Ltd., 42% of which is owned by state-owned-enterprises (SOE), with the remaining stock owned by a combination of general public stockholders and venture capital investors, including 18% from private equity in Hong Kong. Like many companies across the globe, Hikvision does benefit from a certain amount of investment from the government. However, equating a company partially owned by SOEs with the government itself is simply incorrect and misleading.

There are two state-owned enterprises that own 42% of the company, with other people and venture capital investors owning the rest, including private equity in Hong Kong. Then in the open stock market there are shareholders all over the place. Some of the shareholders are foreign investors, as well.

Hikvision addresses cybersecurity concerns Hikvision has in the past been associated with questions (and incidents) of cybersecurity of their cameras. How has Hikvision addressed those incidents and concerns? Are the products “safe” now? What about other common cybersecurity concerns of IP cameras?

Jeffrey He: The security of our products is of the utmost importance to us, and we have both internal and external teams in place that conduct ongoing testing for cybersecurity vulnerabilities. Our proprietary Network and Information Security Lab upholds the highest level of internal process control, security management, and independent auditing.

It’s true that some of our products have suffered cyber-attacks. In the past two years our products have been affected by several cyber-attacks. During a recent webinar we did with the Electronic Security Association (ESA), we went into each of them in detail. If vulnerability is found, we react swiftly to resolve it and notify our customers. Most of the time this means creating new firmware and releasing it to the public, which in most cases we were able to accomplish in a matter of days.

These attacks not only affected Hikvision products but also impacted other manufacturers as well. Being the world’s largest IP video surveillance manufacturer, we become a natural target. In comparison, some of the world’s largest software manufacturers issue new security updates almost weekly to address threats to their products. We live in a very connected world, and unfortunately this world comes with risks. 

No network product on the market – whether Hikvision or otherwise – can ever officially be declared “safe,” since new cyber-threats are constantly emerging. We continually monitor for new threats and mitigate any risks should they occur. One idea floating around the industry is that Chinese surveillance products might have a “backdoor” to allow access to video by the Chinese government or other third party.

Is there any credence to the notion that Chinese surveillance products have a backdoor? What can you tell your North American customers about the security of Hikvision equipment?

Jeffrey He: There have been some misguided accusations targeting Hikvision’s public and industry image, sometimes seeking to create controversy where none exists. Over the past 15 years, Hikvision has built strong and valuable relationships with security industry stakeholders around the globe. In North America, we have made it our responsibility to not only provide outstanding video surveillance products and solutions but also to build our partnerships based upon trust. These questions are geared in general not just to Hikvision but to many Chinese manufacturers, and none of these accusations have been proven to be true. These accusations are baseless.

The Cold War was officially over when the Berlin Wall came down, but I’m seeing that, in the minds of some, it never ended. We all would be better served if, instead of living in the past, we would look towards the future and the realities of world changes and technology changing along with it. People living in the past or pursuing their own agendas are not discussing the real threats of terrorism. Instead, they are going after the very manufacturers providing the solutions to fight criminal and terrorist activities.

We continue to take steps to improve our products, including having them tested by leading third-party cybersecurity firms in the United States to minimize any potential security risks. So far, we have seen no evidence to suggest any “backdoor” access to our products by a government or a law enforcement agency anywhere in the world.

And as you know, we are using’s recent Technology Report on Cybersecurity and IP Video Systems to further educate our customers and end-users. How did the company perform overall in 2015? Are you really taking over the video surveillance market (as we often hear)?

Jeffrey He: Hikvision had worldwide sales revenue of US $3.88 Billion in 2015, with a growth rate of 47%.

Given the size of our company, we did quite well. In North America we will continue to grow because of the right proposition set, including our versatile, innovative product suite, service, and customer support and our North America-based talent base.

We are not taking over the market. Rather, we are part of the healthy competition one sees in the video surveillance market today. There will always be new innovations, and somebody will naturally take the lead because of type and quality of technology they can provide to the market. There are market participants that used to be leaders, but things change, due to many factors, including the effect of lack of innovation. Innovation is the key factor, not pricing. Pricing can only go so far before it becomes irrelevant.

Hikvision global surveillance share How is Hikvision addressing competition, both from other established manufacturers and new entrants to the video surveillance market?

Jeffrey He: Healthy competition is really the driving force for innovation: delivering value to integrators and end-users. This is true not only of video surveillance but of any industry. North America is dramatically different as a competitive landscape versus Asia or Europe.

Just a few years ago the Chinese security market was dominated by foreign brands. Talking from personal experience, I worked for a company that sold billions of dollars’ worth of equipment and services to China. However, as the technology changes, so do the value expectations in the market. Hikvision was able to drive its success with significant investment in R&D and service delivery. We were able to fulfill the value expectations for video surveillance products and solutions in the marketplace. I do want to mention that despite some accusations of protectionism that we sometimes hear, even today there are two foreign brands that dominate the intrusion market in China and probably hold the major market share there. The truth of the matter is that competition is what truly drives innovation, which creates additional value for the customers. 

One clear example of technology innovation is the 4K standard. With our 4K products we are trying to deliver value to the market. Without any competition, the industry would still be at 4 CIF. Out of this drive to compete comes a technology that has widespread benefits in the marketplace today and will at one point be the standard. We understand Hikvision has been involved in some significant tenders in China. Can you tell us more about it?

Jeffrey He: We do engage in commercial tenders in China and around the globe. As a part of tender process, end-users or an organization ordering equipment or services decide on the aspects for selecting the winner. As the Chinese economy grew in the past 15 years, the security industry also expanded.  Looking at the industry reports and analytics, the Chinese security market is even larger than it is in the US. This certainly allowed Hikvision to grow in the security segment, and the company observed significant growth. As the company continues to strengthen its position as a security products and solutions provider, the opportunities for tenders increase as well. Because of our success in technology innovation and our investment in R&D, we hope for even more success in winning these tenders in the future. There have been claims that Hikvision is being subsidized by the Chinese government. Do you care to comment on that?

Jeffrey He: This is simply not accurate. We are a commercial enterprise competing with international and domestic companies in every aspect. In every government project there are commonly policies and regulations managing the costs of projects; it is clear that the pricing of those tenders is extremely competitive. Considering that, it is hard to imagine a government subsidizing a company under these conditions; it’s quite illogical to suggest that we are being subsidized by the Chinese government. There are many factors being taken into consideration during the selection process for projects in this industry. We became a market leader organically, because of our technology and customer service, not because of government subsidies.

When questions like these are raised, I can’t think of anything but the naive nature and potentially misguided principles behind them. Having said that, I’m confident the company will persevere by continuing to offer outstanding value to our customers and partners.

Download the White Paper on Cybersecurity and IP Video Systems here



Download PDF version

Author profile

Larry Anderson Editor,

An experienced journalist and long-time presence in the US security industry, Larry is's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Social Media Data Provides Security Professionals With Real-time Situational Awareness
Social Media Data Provides Security Professionals With Real-time Situational Awareness

Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarizes the ongoing sequence of events Algorithms For Actionable Security Signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations.  “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a cell phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various Security Platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public Safety And Security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organization. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.

How To Make School Security Effective And Unobtrusive For Students
How To Make School Security Effective And Unobtrusive For Students

Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.

Government Institutions Should Utilize VSaaS For An Integrated Video Surveillance System
Government Institutions Should Utilize VSaaS For An Integrated Video Surveillance System

Video surveillance as a service (VSaaS) is not just for commercial organisations. Federal, state and local governments can also realize benefits from the technology—and use it to deliver an integrated video surveillance system that addresses some of their unique security needs. Video Surveillance as a Service (VSaaS) What is VSaaS? Simply stated, it’s a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of your plan (i.e. number of cameras, amount of storage, software features, etc.), and you pay a monthly subscription price to use it. How does it work? Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data center via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Retail, health care, education, and transportation all benefit from the flexibility and architecture of VSaas Growing VSaaS Providers Solution providers such as Axis Communications, Genetec, and G4S among many others offer VSaaS solutions, and the market is growing. According to IHS Markit, the market is expected to reach $2.3 billion in 2021. VSaaS is a solution with cross-industry appeal. Retail, health care, education, and transportation all benefit from the flexibility and architecture of the solution. But how does VSaaS address the surveillance needs of government institutions? Geographic Coverage And Access To protect cities and towns, law enforcement must watch over widespread geographic areas. Their work involves monitoring and policing many different neighborhoods, buildings, garages, parks, and walking paths—basically anywhere there is property or people to protect. They rely on video surveillance to help them keep these environments safe. But it’s more than local law enforcement officers who use video footage. From local city officials to federal and state law enforcement agencies, many other people, at times, need access to video footage captured by city surveillance cameras. Centralized Remote Monitoring How does VSaaS help? VSaaS enables the installation of cameras throughout cities and communities and stream footage to a central location via the Internet. Because the system is centralized, it eliminates the need to manage a lot of different standalone DVRs or NVRs, which enables organizations to monitor a large area from a remote command center. VSaaS enables the installation of cameras throughout cities and communities and stream footage to a central location via the Internet Plus, anyone with proper credentials can access the footage from an Internet-connected device—whether that be a smartphone, laptop, desktop, or tablet. That makes it easier for multiple agencies to work together, which in turn can improve communication and response time to incidents. Budget Concerns And Flexibility Tight budgets are normal in government. As a result, it’s often a challenge to procure capital for new technology purchases—and that sometimes leads to underfunded projects and difficulty upgrading old technology. VSaaS changes the expense model. It allows you to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into a service, you don’t need a large capital outlay up front—you simply pay a predictable expense every month. VSaaS provides the capability for you to increase storage capacity when you need it Feature And Storage Capacity Upgrade Features VSaaS also makes it easier to upgrade old technology. When new technology becomes available, you can upgrade to it as part of the service. You no longer have to stick with old technology because of capital budget restrictions. Instead, you can upgrade to better cameras and management software features as they become available. The same is true for storage capacity. As camera resolution increases, the amount of data captured also increases. In addition, with the evolution of smart city technology and big data analytics, video data has become more valuable. As a result, there is a need not only to store more data but also to keep that data accessible for a longer period of time. VSaaS provides the capability for you to increase storage capacity when you need it. You can scale to accommodate growth, and since the storage is delivered as part of the service, you can leverage the “pay for use” model to manage your costs. On-Premise Storage Or Hybrid Where should surveillance video be stored? It’s an important question. After all, government entities must always comply with data privacy laws and handle data properly to ensure it can be used as evidence if needed. As a result, officials may prefer to be selective about where they store video data. In fact, the concern over regulatory requirements and security and privacy issues, according to Gartner, will lead governments to implement private cloud at twice the rate of public cloud through 2021. The provider’s ability to store large amounts of data cost-effectively makes VSaaS possible That’s not necessarily a show-stopper when it comes to video surveillance. Some VSaaS providers offer hybrid options. Plus, one of the things that makes VSaaS possible is the provider’s ability to store large amounts of data cost-effectively. Because service providers can manage their storage infrastructures economically, they can offer their service at an attractive price. Multi-Tier Storage Infrastructure In a way, government institutions (as well as commercial organizations) can do the same thing. If a government entity—for example, a small municipality—wanted to store their data on-premise or implement a hybrid configuration, they could solve some of their video storage challenges by implementing a multi-tier storage infrastructure similar to what a VSaaS provider might use to provide the actual service. A multi-tier storage infrastructure uses different storage media—disk, object storage, tape, and cloud—and combines them to deliver the total capacity needed while balancing performance and cost. The diagram below is an illustration of a multi-tier infrastructure: As the diagram shows, storage capacity grows using lower cost forms of media as volume and long-term retention requirements change. Files are moved between tiers based on user-defined policies. When the policies are met, the files are moved to a lower cost tier. Some file systems allow for multiple copies be written at ingest which not only minimizes the traffic of moving files across the network, but also provides much needed data protection through a second copy on a lower-cost tier. This scenario enables you to optimize the amount of high-performance media in your infrastructure and lower the long-term cost of retaining files. VSaaS offers many benefits for government institutions and commercial organizations alike Choice Of Implementations VSaaS offers many benefits for government institutions and commercial organizations alike. But not every implementation has the same needs or requirements. The good news is, when it comes to video surveillance solutions, you have options. You can leverage the benefits of VSaaS, in either a public cloud or hybrid scenario, depending on the service provider. Or if your needs dictate, you can achieve some of the same capacity and cost-saving benefits you would get from a VSaaS solution by implementing an on-premise solution based on a centralized VMS system and multi-tier storage. The choice is yours.