28 Jun 2023

Editor Introduction

As the first line of defense against unauthorized access to business premises, perimeter security can alert an enterprise of potential security threats while delaying or preventing any loss or damage due to criminal acts. Combining hardware and software, perimeter security addresses the outermost ring of a facility’s concentric circles of protection. Obviously, any threat addressed at the outermost edge of defense does not become a more immediate and urgent threat closer to a facility. We asked this week’s Expert Panel Roundtable: What’s new in perimeter security systems?


Joe Morgan Axis Communications

Perimeter security has long involved a combination of multiple strategies and devices all added together to make a hopefully impenetrable “wall.” Organizations are now looking to extend the buffer zones that lead up to the perimeter security to properly reinforce that perimeter. In addition, the idea of combining several sensors for a turnkey approach is gaining traction. This approach would likely involve combining a short-range radar, a camera, and a speaker system that could be used to warn a potential trespasser that they are in a restricted area. Analytics also play into this approach as an additional layer of detection and help contribute back into that buffer zone.

Justin Wilmas Netwatch USA

A lot of interest in intelligent video monitoring services to better protect perimeters and large outdoor spaces. Proactive video monitoring has experienced a significant uptick in this market because it enables organizations to take a proactive approach to security, rather than simply responding to incidents after they have occurred. This approach allows businesses, such as construction sites, critical infrastructure, and automobile dealerships, to identify potential threats before they become a problem and take action to prevent them. Proactive video monitoring services use AI to analyze video feeds from cameras installed along the perimeter. The solution can detect and classify objects and people, track their movements, and issue alerts to operators within a monitoring center in real time if a potential threat is detected. This allows businesses to monitor the perimeter more effectively, identify possible security breaches, and respond before loss or damage can occur. As a result, it is becoming an increasingly popular option for organizations looking to improve their security capabilities.

David Lenot Genetec, Inc.

Perimeter security systems have evolved significantly in recent years and are now moving away from intrusion detection to perimeter surveillance: Traditional Perimeter Intrusion Detection Systems (PIDS) are effective at detecting when someone is attempting to breach a fence, but they may not provide early warning of potential threats. That's why organizations are now looking for systems that can detect qualified activities such as movement or sound before intruders reach the fence. Radars and lidars can detect when objects cross lines, and track intruders outside and inside fence lines. Cameras otherwise used for monitoring or video verification can be turned into tracking systems with edge- or server-based algorithms. With a unified security system that can correlate data from a variety of sources (cameras, lasers, lidars, radars, etc.) operators are able to accurately identify the nature and location of the intrusion and are better equipped to respond faster.

Greg O’Neill Gallagher Security

Energized fences are a powerful deterrent for preventing or delaying intruders. At Gallagher Security, three specific updates for monitored pulse fencing. The first update looks at simplifying installation at the mid-end of the market through the introduction of slim-line modular posts. The modular design of the posts allows them to clip together for a quick installation, saving time. Each section is 7-wires with insulators molded to the posts, ready for the wire to be run through. The second development is weldless strain brackets. These are specially designed for installation without a welder, allowing for a quick and simple installation while still retaining the strength of a secure fence line. And finally, soon be releasing the Gallagher Fence Design and Estimation Tool. Focussed on a Google Maps arrangement, the estimation tool allows one to draw the outline of the boundary and helps answer specific questions needed for a Bill of Materials.

Doug Smith Salient Systems

Perimeter security has seen advancements in new technology and enhancements of older offerings, which include video surveillance, intrusion detection, access control, fencing, gates, and other physical barriers. Systems that are open and can work together with disparate platforms provide a broad, unified system that can adapt to and include advances in technology as they occur. Video systems have seen new advancements due to artificial intelligence, leading to real-time alerts to specific concerns and greatly enhancing forensic searches. Integrating physical access control systems with other systems allows them to leverage their technological advancements, ensuring access is granted only if certain conditions are met beyond just the users' control group. Fencing has also seen advancements with bracketless barrier and high-density chain-link offerings providing enhanced strength that are difficult to compromise.

Wi-Fi HaLow, a new version of Wi-Fi based on the IEEE 802.11ah standard and certified by the Wi-Fi Alliance, will change perimeter security systems. Wi-Fi HaLow has proven to be an exceptional solution to the connectivity challenges encountered by conventional Wi-Fi networks, offering a multitude of benefits such as extended range, energy efficiency, enhanced security, and effortless installation. One specific area where Wi-Fi HaLow excels is in battery-powered security cameras. No other wireless protocol matches its effectiveness and efficiency in meeting the unique requirements of these devices. This breakthrough technology is poised to significantly impact the market, providing consumers with reliable and cost-effective options to safeguard their homes. Wi-Fi HaLow showcases its capabilities by supporting video and security cameras deployed over long distances. Unlike traditional Wi-Fi networks that often suffer from lag or dropped connections, Wi-Fi HaLow ensures uninterrupted surveillance even when cameras are placed far from the access point.


Editor Summary

Factors impacting the deployment of perimeter security systems include multiple sensor technologies such as lidar and radar, as well as intelligent video monitoring. Electric fences can provide a deterrent to delay intruders. Newer proactive approaches are enhancing the effectiveness of perimeter security, and intelligent systems are working to automate detection and eliminate false alarms. Historically, perimeter security may have been seen as a low-tech approach (e.g., fences), but technology is having a marked impact as these systems become more effective than ever.