More sites are requesting centralized platforms that can integrate these technologies and help end-users use data to lower false alarms and improve security.
Solutions for perimeter security have improved over the last few years, leveraging the power of intelligent algorithms and new hardware. According to Gallagher, most perimeter technologies used today are electric pulse fences that use a combination of sensors and video analytic technology.
Speaking to asmag.com recently, Richard Tsui, Technical Business Development Manager for Gallagher in Asia, explained that his company sees more sites requesting centralized platforms that can integrate these technologies and help end-users use data to lower false alarms and improve security.
“By integrating all systems into a single security management system, like Gallagher’s Command Centre software, security operators are trained on one application, with a single point for reporting on detail such as fence voltage levels, operator use statistics, or specific zone alarm data,” Tsui said. “Furthermore, by integrating a perimeter solution with an imaging system, it provides sites with a visual and audible record of events that can be viewed as a live stream or relied upon as evidence if required.”
For example, when sensors in the system detect a potential attack, users can cross-check with video and delay the attack from the perimeter to the building entry through an electric pulse fence. The operator can then call the security department and lock down the zone by utilizing access control technology, delivering an end-to-end security system that monitors and manages the site’s security.
Also read: What integrators can expect from perimeter security in 2022
ANPR, the popular analytic
Among the different kinds of video analytic solutions in demand for perimeter security, license plate recognition is among the most sought after, according to Lee Copland, Managing Director of Maxxess EMEA. This has become even more relevant now as supply chain constraints and economic concerns have brought businesses under pressure.
“Integrating license plate recognition with access control and visitor management software not only enhances perimeter security but automates workflows and drives efficiency gains,” Copland said. “We are seeing increased demand for tighter integration of these technologies and the ability to manage them from a single user interface. This is especially the case in the oil and gas, industrial, logistics, and manufacturing sectors, as they keep up with continued demand while facing the pressures of supply chain disruptions, increasing commodity costs, and wage inflation, as well as the ongoing challenge of staff retention.”
Demand higher for large projects
The demand for such an integrated approach to perimeter security is high in large, critical infrastructure projects such as utilities, government, corrections, aerospace, and defense implement a perimeter solution alongside access control technology to protect their site.
Tsui pointed out that these sites often see an increase in threat and must meet increasing government regulations. Using intelligent perimeter security solutions that protect the fence line is inevitable. But that’s not to say there isn’t any interest from other verticals.
“With the increasing need for the safety and security of people, we’re also seeing strong interest among the education and residential market for perimeter solutions that integrate with CCTV to achieve greater cost-savings,” Tsui said. “For luxury residential premises, the installation of a perimeter security system increases the overall value of the building, while also providing an extra layer of security for the reassurance of the residents that live there.”
Jamie Barnfield, Senior Sales Director at IDIS Europe, agrees, adding that there is a significantly increased demand for perimeter solutions in the education sector, particularly for large schools and university campuses.
“In the US, education institutions are dealing with a wide range of challenges including active shooter threats through to gangs taking control of student drug trade,” Barnfield said. “And they have a wide range of funding streams which are helping them to upgrade their video surveillance capabilities. For schools and universities in EMEA, the threats are primarily theft and anti-social behavior. In the UK there is significant concern around ‘county-lines’ drug gangs who recruit and groom school children targeting them close to school perimeters.”
False alarms continue to challenge
Despite new technologies coming into this sector, the biggest challenge continues to be the high rate of false alarms. Because perimeter security is often about protection outdoors, the number of irrelevant elements that may trigger an alarm is high.
“Not only do false alarms increase operational costs, but they also waste staff resources and cause widespread inconvenience that can delay response times,” Tsui explained. “For this reason, sites are always looking for intelligent perimeter systems that minimize the frequency of false alarms by differentiating between environmental disturbances and intruder attacks.”
Another challenge that’s as pressing as false alarms is cybersecurity. With security technology continuing to evolve, cyber security protection will continue to be vital.
“When selecting security technology, an end-to-end approach that protects each component, from the fence line to the alarm system, is crucial,” Tsui said. “By choosing a cyber-responsible security manufacturer who meets government standards, sites have the reassurance that their physical security system is protected should the worst occur.”
Providing value in perimeter
Given the high demand and the new technologies coming in, how do systems integrators add more value to this sector?
Tsui lists several ways. One is providing end-users with professional consulting services to help develop a perimeter infrastructure design customized to fit unique requirements. Others include better integration.
“Another way is providing sites with an integrated solution that includes technology such as CCTV or mobile capability alongside the perimeter solution,” Tsui said. “This enables the end-user to benefit from added functionality such as event notification with a video screen capture or being able to manage and control their perimeter by mobile remotely.”
Integrators can also offer a system maintenance service to provide sites with yearly system health checks and ensure that their sites utilize regular software upgrades to ensure their perimeter solution is working at its optimum. Such service offerings can also improve the integrator’s recurring monthly revenue, making it an even more attractive business proposition.