Perimeter security aims to safeguard the perimeter of an end user entity. Typically, perimeter security employs a variety of technologies to achieve optimal results. This article takes a look at technologies used in perimeter security.
Perimeter security aims to safeguard the perimeter of an end user entity. Typically,
perimeter security employs a variety of technologies to achieve optimal results. This article takes a look at technologies used in perimeter security.
Video surveillance
Video surveillance systems play a key role in perimeter security. According to Tracy Markum, VP of Sales at Intellicene, the type of camera used to monitor perimeters strongly depends on the environment. “In a critical infrastructure environment, security leaders can use a mixture of PTZ, thermal, and high-resolution megapixel cameras to address challenging visual conditions,” he said.
Multi-sensor camera technologies (those that combine visible light sensors with other imaging sensors such as
thermal) are also used to overcome the limitations of visible light cameras. “Traditional security cameras on their own may have blind spots, can be less effective under poor lighting conditions or certain weather conditions. Multi-sensor cameras use multiple imaging technologies that combine several types of sensors (such as optical, thermal, infrared, or radar) in one device, allowing for improved detection and monitoring in different environmental conditions,” said Brad Martin, Director Product Management at Senstar.
Access control
Access control is also critical in perimeter security. “It’s important to properly control access to your site, ensuring only authorized personnel enter and that you have an audit trail who has visits site and when. Card or biometric access control on entry turnstiles is typically the most common type of access control on your perimeter ensuring your site remains secure from casual thieves with access being restricted,” said Mark Horton, VP of Bandweaver Technology.
According to Martin, for sites with frequent gate activity operations such as deliveries, data obtained from fence or gate sensors and video analytics can be leveraged to provide further insights into operations.
“By capturing timestamped video linked to gate activity and events, operators can record inbound/outbound times of individual vehicles via automatic license plate recognition (ALPR); perform automated vehicle routing via the integration of workflow software; automate entry for authorized users (ALHR, face recognition, and access control devices); and implement two-way intercom systems to improve remote assessment and response capabilities,” he said.
Sensors
Fence-mounted sensors, for example fiber optic, cabled RF, or accelerometer-based, are popular for perimeter security. “They offer a highly effective, cost-effective solution. Simply put, they turn existing fences into smart fences by detecting and locating attempts to cut, climb, or lift the fence fabric. They are field-proven, difficult to defeat, and work reliably in rain, snow, and wind. Generated alarms (which typically include the intrusion zone or precise location) can be used to trigger on-site security resources, including automated camera call-up and deterrence devices like sirens, loudspeakers, or security lights,” Martin said.
Radar
Radar is also increasingly seen in perimeter security as well. “As the cost of radar has decreased, it’s more commonly used in perimeter security especially when coupled with other technologies. One of the drawbacks of radar detection is the requirement for line of sight, so it’s important, if deploying radar, that the ground is flat and level, and there are limited buildings and foliage to block the field of view to reduce the likelihood of blind spots. When coupled with alternative technology, radar offers good perimeter coverage,” Horton said.
The importance of integrated platforms
Since the above technologies are disparate systems, a unified management platform that integrates the technologies together is important.
“Integrated security management platforms are gaining traction among users looking to consolidate multiple systems like access control and video surveillance into one platform. Security teams can be easily overwhelmed by vast amounts of data, and solutions that bring everything together under one UI can enhance situational awareness. Security leaders are increasingly integrating solutions with other IoT and intelligent devices into their security infrastructure to help them better detect anomalies and verify alarm triggers, and integrated security management platforms can help streamline information from various sources to gain new insights,” Markum said.