BIM models are essential to reap the benefits of digital construction projects. Axis CAD Tools make it easy to visualize and design the right video surveillance at the drawing stage. With the rapid technological developments around the world, more and more industries embrace digitization. For example, the Internet of Things, automation, virtual and augmented reality, and machine learning take production and business processes to the next step.

However, the engineering and construction industry (E&C) - with 13 percent of global GDP the largest in the world - has been notably reluctant to adopt new and digital technology. But there is a wind of change as building projects get more and more complex. Digital technology is increasingly used to create smart buildings and smart cities. The development is snowballing and already disrupting the E&C industry. New players are introducing digital business models. 

Adopting digital technology

The use of BIM models can lower error sources by 60 percent and speed up the communication flow

Change is also driven by the public sector, which sees massive advantages of adopting digital technology, such as 4D and 5D building information modeling (BIM). BIM, defined as “a digital representation of physical and functional characteristics of a facility,” can be used to manage the information during a construction project. It covers every component of a building and the process from design to operation and maintenance to end-of-life.

It improves collaboration across projects as well as efficiency, which reduces time, costs, and errors. The use of BIM models can lower error sources by 60 percent and speed up the communication flow by 50 percent. Small wonder that large organizations and governments are starting to demand the use of BIM, including Finland and the UK. The big German railroad company Deutsche Bahn has introduced the use of 5D BIM solutions.

Getting the right software

5D BIM brings together design (3D), time management (4D), and budget (5D). With the addition of 6D and 7D, environmental and sustainability, and life-cycle management aspects are also included. To reap the benefits of BIM, one needs software that can handle the information about a building or structure. One renowned software is Autodesk Revit, which is used by architects, structural engineers, MEP (mechanical, electrical, and plumbing) engineers as well as designers and contractors.

One of the benefits of Revit is the possibility of analyzing and simulating systems and constructions and creating 3D visualization models. The building blocks of these models are BIM objects, which are digital descriptions of products and materials and can cover practically everything one could imagine. And it is here that Axis enters the picture.

IP video surveillance systems

Our plugin and the BIM objects let them see how the video surveillance will work, already at the drawing stage"

The Axis camera family plugin for Revit is a goldmine for anyone who wants to add cameras or other surveillance products when planning entire IP video surveillance systems directly in a building plan. One can download it for free from the company’s official website, and start downloading cameras and other Axis BIM objects from one’s preferred BIM library.

Explaining why Axis has made these BIM objects available, Mikael Flygh, globally responsible for the Axis Architects & Engineers program, says, “It’s about innovation and understanding our partners. The objective is to simplify and help them be more efficient. Our plugin and the BIM objects let them see how the video surveillance will work, already at the drawing stage.

Realistic 3D BIM objects

Flygh continues, “The 3D animations let you see how the cameras fit into the general architecture. Not only will it create better safety and security solutions; you - and the end-customer - can also experience the final product, which is important.

All Axis cameras are available as realistic 3D BIM objects. Using the selector tool embedded in the plugin, one can quickly choose a suitable camera. Downloaded to the building plan, one get valuable information about the cameras, such as focal range and resolution. One can adjust focal length, pan-tilt-zoom, and other settings. One can experience a 3D view, as seen through the camera lens.

Complete camera coverage

The improvements will continue, and Axis will add new products to the BIM libraries

It is also easy to change and get the right mounting. When the users are satisfied with the camera placement, it is easy to verify the entire solution's camera coverage. Axis plugin for AutoDesk Revit has been around for some years, but “during the last 12 months, we’ve committed to updating it, listening to and acting on customer feedback,” says Flygh. The improvements will continue, and Axis will add new products to the BIM libraries, and new features upon their release.

For example, the plan is to introduce multi-sensor cameras during the third quarter of 2020. “We will continue to invest in this because we believe in digitization,” Flygh says. “It involves the entire value chain, reducing errors and misunderstandings, improving efficiency and communication, but above all, it’s about the end-customer experience.”

Covering various needs

Axis offers several tools that will help one during the planning and design phase. One example is a plugin for Trimble Sketchup that provides 3D CAD models that let the user find the right camera and visualize its coverage.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

What Are The Positive And Negative Effects Of COVID-19 To Security?
What Are The Positive And Negative Effects Of COVID-19 To Security?

The COVID-19 global pandemic had a life-changing impact on all of us in 2020, including a multi-faceted jolt on the physical security industry. With the benefit of hindsight, we can now see more clearly the exact nature and extent of that impact. And it’s not over yet: The pandemic will continue to be top-of-mind in 2021. We asked this week’s Expert Panel Roundtable: What have been the positive and negative effects of Covid-19 on the physical security industry in 2020? What impact will it have on 2021?

Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More
Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More

Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.