Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

Why you should leverage video surveillance for best perimeter security

Why you should leverage video surveillance for best perimeter security
An effective perimeter security system requires a comprehensive approach that utilizes IP-based surveillance technologies. By integrating components such as visual and thermal cameras, together with video analytics, radar and audio, security staff can take a more effective approach to perimeter security.
An effective perimeter security system today needs more than just a fence — it requires a comprehensive approach that utilizes IP-based surveillance technologies. Surveillance technologies provide the “eyes” to the system, enabling detection and verification of intrusions. By integrating components such as visual and thermal cameras, together with video analytics, radar and audio, security staff can take a more effective approach to perimeter security.

Choosing the right surveillance technology

When choosing technologies to implement in a perimeter security system, there are several things to consider.

Among them, the environment. Consider the landscape/terrain, size of area to cover, scene complexity, lighting conditions, temperature and weather. Environmental conditions help determine the requirements that the chosen surveillance camera should meet.

Another consideration is whether the response to alarms will be active or passive (responding after an incident has occurred), which will help to determine the acceptable level of false alarms. An active response will have less tolerance for false alarms, whereas a passive response will have a greater tolerance. This impacts the choice of technologies and surveillance products to use. Lower rates of false alarms require more advanced solutions.
 
Jessica Chang, Regional Director,
North Asia, Axis Communications,

For example, critical infrastructure facilities have a lower tolerance for false alarms. In this situation, Jessica Chang, Regional Director of North Asia at Axis Communications, recommends a combination of technologies, including thermal cameras with video analytics that detect with reliable accuracy; radar for detection in wide open areas; and visual cameras such as PTZs (pan-tilt-zoom) for close-ups and identification purposes. Such products can work together and be integrated with an event management system that automatically notifies remote security guards, and when connected to loudspeakers, deters suspects immediately.

Understanding the strengths of different technologies and products, and knowing when and where to use what and for what purpose is key. The use of a combination of technologies may provide the optimal security system.

Benefits and challenges of using thermal in perimeter security

Thermal cameras have been used as an important part of a perimeter security solution. Although they are generally more expensive than visual cameras per unit, in combination with certain video analytics, they are more capable of providing reliable and longer distance detection in a wide range of weather and lighting conditions. This also means that fewer thermal cameras are needed, which reduces installation costs and server requirements.

Thermal cameras, however, usually have lower resolutions than visual cameras. While the upside of this is lower bandwidth and storage requirements, the downside is that thermal cameras are not suited for identifying intruders. By pairing thermal cameras with visual cameras, especially PTZ cameras, security operators can have great detection and identification possibilities.

When you need reliable round-the-clock detection, thermal cameras are an excellent – and cost-effective – solution. “Axis thermal cameras support analytics, and in combination with visual cameras, they give you the ‘sight’ – and the insight – you need to protect property and people,” said Chang.

Smarter perimeters with fewer false alarms

Integrating a video component into a perimeter security solution also allows security operators to take advantage of intelligence and machine or deep learning.

Machine or deep learning algorithms can train an analytics application to understand what certain objects (e.g., humans, vehicles) can look like. The application can detect and classify objects that it has been trained on, making detection more accurate and reducing false alarms.

Bringing these analytics to the edge (the camera) has been made possible by the availability of high performance chipsets at a lower cost. Edge analytics, as opposed to server-based analytics, allow analysis to take place in the camera, enabling system scalability, and reducing network bandwidth and server requirements.

Consider a total solution approach

Ultimately, a comprehensive approach to perimeter security will best secure a premise. A multi-layer approach to protection — from the outer perimeter to the core (building) — ensures a superior level of security assurance. A layer-by-layer surveillance enables early alarm alerts to remote security personnel, who can then use sharp video surveillance footage to virtually place themselves at any location, assess the situation and take action based on accurate information.

Chang pointed out that Axis offers a comprehensive range of products that allow customers to maximize the benefits of an integrated system involving VMS (video management software), edge-based analytics, radar technology and audio devices. By incorporating these different components, security operators can implement an enhanced and cost-effective perimeter security solution.


Product Adopted:
Detectors / Sensors
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: