What Are The Latest Trends In Perimeter Security Technology?
Editor Introduction
Perimeter security is the first line of defense against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
With an estimated million drones entering the world's airspace each month, drone detection has become a hot topic in the discussion around perimeter protection. Some are used as flying security cameras, as part of a coordinated security installation, but others might be used for malicious intent. So it’s important to know why a drone is there, and be able to trace where it’s going, to ensure its purpose is legal and coordinated. Perimeter protection typically relies on a multi-layered approach that involves a variety of different technologies, including cameras, drones, radars, LiDARs, facial recognition technology and other standalone systems. To ensure that these systems do not work in unconnected siloes, it’s important to put in place a unified approach to cross qualify incidents and intrusions alerts. Connecting these systems into a VMS system also ensures that alarms and incident are immediately correlated to a video feed to avoid false alarms.
What’s really important in perimeter security is the minimization of false alarms, not simply the potential detection of what might be an unauthorized person or object. In light of that, many systems now include alarm validation that can confirm an alarm event using a camera. The utilization of AI-based technologies can further validate the accuracy of the alarm, making it as accurate and precise as possible. I anticipate seeing more cross-technological integrations to reduce false alarms, so that personnel in an alarm center spend as little time as possible in validating an alarm.
The adoption of accelerometer-based technology on fence monitoring systems is really gaining traction, due to its ability to overcome the age-old false alarm issues of other fence monitoring technologies. Detection accuracy is now down to 3 meters and sensitivity settings are quite broad to provide better false alarm discrimination. The beauty of this type of system is its ability to be deployed on all kinds of fence systems and wall supports. More important, though, is the move to ensure that the systems are IP compatible and provide connectivity options to the larger security network via API’s, Modbus, or IP Alarm transmission. Equally important is the need to integrate with VMS systems, such as Milestone, Genetec, Qognify, Advancvis etc. One such system on the market is the G-Fence line from Sorhea and Protec - the G-Fence 2400 being the newest addition to the range.
In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Physical architecture such as bollards, barriers and barricades can stop a vehicle from entering a high-traffic area. There are also trends to stop vehicle attacks beyond main entrance gates. The first is in a location where the primary use is pedestrian but, frequently, vehicles need to pass through. An example could be a square in which the maintenance truck comes through to clean the square periodically. Such access points are well served by bollards, some moveable that go up and down to let vehicles through and others that are fixed. The other access locations are those that are temporary. Sections normally open to traffic will be closed to create pedestrian paths and gathering points. These locations are best protected with crash-rated portable barriers that erect in 15 minutes and then removed after the event.
As the pace of physical security innovation increases, the cost of perimeter security is coming down quickly. Some technologies such as Thermal Detection were previously unaffordable for the average business owner, but have been positively impacted by these innovations. Integration of these sensors with a verified intrusion system, low-light capable cameras, and a full-featured video management system, ensure that detection and notification of intrusions are reliably reported with very low false alarm rates. Another interesting angle to these innovations is the proactive automated response to intrusions. One way of deterring intrusion is to provide an automated audio response to an intrusion event. Further, some business estates choose to establish multiple perimeters with escalating response scenarios. An auto dealership may warn people with an audio response to leave the premises after hours (without offending potential shoppers!), if intruders advance to a second perimeter, a sterner message can also be added.
Like many elements of security, perimeter technology can be enhanced with a multi-layered approach. Video analytics is one such tool that can be used as a standalone solution, or in conjunction with other technologies. With the help of AI and computer vision, security teams can not only predict, prevent, detect and respond, but they will also have access to deeper analysis for what is happening, enabling a more proactive and appropriate response. Detecting the intrusion of an individual is one thing, but the response might be escalated if that individual has a weapon in hand. Computer vision simply adds another layer of information that can be analyzed for more detailed situational awareness, ultimately resulting in a more targeted approach to perimeter security.
For many years, intercoms were used for room-to-room communication, in place of a doorbell or at a gate system. However, the capabilities of an IP video intercom system far exceed past technological functions. An IP system can easily integrate with cameras and a network video recorder, allowing the intercom to do a larger job, including offering more features and third-party streaming to an NVR. What customers are requesting these days, in terms of enhanced perimeter security, is the ability to have remote monitoring, mobile access and the ability to audit when an access code was used, where it was used at any time. The ability to access historical video footage is vital to many businesses in ensuring holistic security is being maintained. Today, this can be achieved by a video intercom.
We are seeing a steady increase in the deployment of face recognition at perimeters. The advancements recently made in AI and algorithm efficiency, like those introduced by SAFR in 2020 and 2021, have delivered amazing new levels of accuracy, speed, and stability across skin tones. Lightweight facial recognition software can now be embedded in low-cost edge hardware with minimal memory and power demands. By pushing more processing to the edge, such as performing video processing and detection tasks inside a camera directly, the total cost of ownership (TCO) of surveillance hardware is substantially lowered. Users have the option of using local servers for operations, or only performing the initial processing function onsite, while benefiting from cloud hosting for all other processes. There is new demand for touchless access control with face recognition as an option, which delivers a much friendlier and less costly alternative to key cards or fingerprints.
Editor Summary
From drones to new varieties of sensors, from video surveillance to artificial intelligence (AI), the range of technology options to ensure perimeter security is growing every day. However, basic approaches such as bollards, barriers and fencing also play a major role in keeping the bad guys out.
- Related links
- Biometric Access control systems & kits
- Biometric Access control software
- Network IP cameras
- Proximity Access control systems & kits
- Standalone / Networked Access control systems & kits
- Indoor/Outdoor IP Dome cameras
- Proximity Access control software
- IP Surveillance Software Video Surveillance software
- Real Time / Timelapse / Event Network Video Recorders (NVRs)
- Management Software Video Surveillance software
- Face Recognition Software Access control software
- Delta Scientific Bollards
- Genetec Access control software
- Genetec Video Surveillance software
- Milestone Video Surveillance software
- Qognify Video Surveillance software
- TDSi Access control systems & kits
- TDSi Video Surveillance software
- TDSi Access control software
- Delta Scientific Barricades
- Genetec IP cameras
- TDSi IP cameras
- TDSi Electronic lock systems
- Delta Scientific Gates
- Genetec Network Video Recorders (NVRs)
- Milestone Network Video Recorders (NVRs)
- TDSi IP Dome cameras
- TDSi Network Video Recorders (NVRs)
- Delta Scientific Barriers
Expert commentary
Security beat
Security bytes
- Getting To Know Dan Grimm, VP And General Manager Of Computer Vision At RealNetworks
- Big Wins And The Importance Of Showing Up: Insights From SecurityInformed.com Editor Larry Anderson
- Setting Goals, Business Travels And Radioactivity: Success Secrets From Tiandy's John Van Den Elzen
- Getting To Know Jeff Burgess, President/CEO At BCDVideo
Healthcare security articles
Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasizing responsible technology innovation across its operations. The company will host...
Just like fighting against the spread of disease in a clinical environment, healthcare providers must mobilize, coordinate with interconnected partners, and apply sufficient budgetary resources to com...
iDenfy, a Lithuania-based AI-powered identity verification, fraud prevention and compliance tool provider, has partnered with Transparent Care, an American-based innovative healthcare staffing platfor...
Carlisle Support Services appoints public and private security expert, John Lambert as Managing Director of Security and Events in the North. With a background that stems across 15 years within the pu...
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applicati...
Check Point Research (CPR) releases new data on Q2 2024 cyber attack trends. The data is segmented by global volume, industry, and geography. These cyber attack numbers were driven by a variety of re...
The faulty CrowdStrike Falcon Sensor update and subsequent outage – the CrowdOut Event – underscore the potential for Single Point of Failure (SPoF) technology outages...
Synectics has increased its rapidly growing healthcare portfolio, with two more NHS trusts opting to enhance its surveillance and security management with Synergy software. Multi-phase, multi-site up...
Siemens Smart Infrastructure has expanded its Siemens Xcelerator partner ecosystem with the addition of the AI-driven field service and asset management suite from IFS, the world’s pioneering pr...
RiverSafe, a global cybersecurity, DevOps, and AppSec professional services provider, has partnered with education-based charity - World Vision to improve access to education for children in Africa....
Aqua Security, the pioneer in cloud-native security revealed new research that shows how credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations...
MOBOTIX ONE is an extremely robust and maintenance-free video system 'Made in Germany' that impresses with both its application-oriented design and its high-quality components: fiberglass-reinforced,...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced a new partnership with Access T...
MOBOTIX celebrates its 25th anniversary this year. Founded on June 21st by Dr. Ralf Hinkel, Sabine Hinkel, and Klaus Borchers in 1999, MOBOTIX revolutionized the video technology market with the world...
Matrix SARVAM UCS is an enterprise-grade (SME and ENT) unified communication solution that offers collaboration, communication, messaging, and mobility. It brings diverse users from multiple location...
Honeywell GARD USB Threat Report 2024
DownloadThe Role Of Artificial Intelligence To Transform Video Imaging
DownloadAccess Control System Planning Phase 1
DownloadKey Findings From The 2024 Thales Cloud Security Study
DownloadVideo Surveillance
DownloadAll New exacqVision Advantage with Illustra Cameras
Anviz AI Outdoor Bullet Network Camera
Anviz Versatile Surveillance Solution for Business and Public Safety