SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What’s New In Perimeter Security Systems?

28 Jun 2023

What’s New In Perimeter Security Systems?
Larry Anderson
Larry Anderson
28 Jun 2023
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Perimeter security systems integrate advanced hardware and software to deter unauthorized access.
  • New developments enhance threat detection at the outermost defense layer for increased safety.
  • Preventative strategies reduce the risk of security threats escalating near business facilities.

Editor Introduction

As the first line of defense against unauthorized access to business premises, perimeter security can alert an enterprise of potential security threats while delaying or preventing any loss or damage due to criminal acts. Combining hardware and software, perimeter security addresses the outermost ring of a facility’s concentric circles of protection. Obviously, any threat addressed at the outermost edge of defense does not become a more immediate and urgent threat closer to a facility. We asked this week’s Expert Panel Roundtable: What’s new in perimeter security systems?


Card image cap
Joe Morgan Axis Communications

Perimeter security has long involved a combination of multiple strategies and devices all added together to make a hopefully impenetrable “wall.” Organizations are now looking to extend the buffer zones that lead up to the perimeter security to properly reinforce that perimeter. In addition, the idea of combining several sensors for a turnkey approach is gaining traction. This approach would likely involve combining a short-range radar, a camera, and a speaker system that could be used to warn a potential trespasser that they are in a restricted area. Analytics also play into this approach as an additional layer of detection and help contribute back into that buffer zone.

Card image cap
Justin Wilmas Netwatch USA

A lot of interest in intelligent video monitoring services to better protect perimeters and large outdoor spaces. Proactive video monitoring has experienced a significant uptick in this market because it enables organizations to take a proactive approach to security, rather than simply responding to incidents after they have occurred. This approach allows businesses, such as construction sites, critical infrastructure, and automobile dealerships, to identify potential threats before they become a problem and take action to prevent them. Proactive video monitoring services use AI to analyze video feeds from cameras installed along the perimeter. The solution can detect and classify objects and people, track their movements, and issue alerts to operators within a monitoring center in real time if a potential threat is detected. This allows businesses to monitor the perimeter more effectively, identify possible security breaches, and respond before loss or damage can occur. As a result, it is becoming an increasingly popular option for organizations looking to improve their security capabilities.

Card image cap
David Lenot Genetec, Inc.

Perimeter security systems have evolved significantly in recent years and are now moving away from intrusion detection to perimeter surveillance: Traditional Perimeter Intrusion Detection Systems (PIDS) are effective at detecting when someone is attempting to breach a fence, but they may not provide early warning of potential threats. That's why organizations are now looking for systems that can detect qualified activities such as movement or sound before intruders reach the fence. Radars and lidars can detect when objects cross lines, and track intruders outside and inside fence lines. Cameras otherwise used for monitoring or video verification can be turned into tracking systems with edge- or server-based algorithms. With a unified security system that can correlate data from a variety of sources (cameras, lasers, lidars, radars, etc.) operators are able to accurately identify the nature and location of the intrusion and are better equipped to respond faster.

Card image cap
Greg O’Neill Gallagher Security

Energized fences are a powerful deterrent for preventing or delaying intruders. At Gallagher Security, three specific updates for monitored pulse fencing. The first update looks at simplifying installation at the mid-end of the market through the introduction of slim-line modular posts. The modular design of the posts allows them to clip together for a quick installation, saving time. Each section is 7-wires with insulators molded to the posts, ready for the wire to be run through. The second development is weldless strain brackets. These are specially designed for installation without a welder, allowing for a quick and simple installation while still retaining the strength of a secure fence line. And finally, soon be releasing the Gallagher Fence Design and Estimation Tool. Focussed on a Google Maps arrangement, the estimation tool allows one to draw the outline of the boundary and helps answer specific questions needed for a Bill of Materials.

Card image cap
Doug Smith Salient Systems

Perimeter security has seen advancements in new technology and enhancements of older offerings, which include video surveillance, intrusion detection, access control, fencing, gates, and other physical barriers. Systems that are open and can work together with disparate platforms provide a broad, unified system that can adapt to and include advances in technology as they occur. Video systems have seen new advancements due to artificial intelligence, leading to real-time alerts to specific concerns and greatly enhancing forensic searches. Integrating physical access control systems with other systems allows them to leverage their technological advancements, ensuring access is granted only if certain conditions are met beyond just the users' control group. Fencing has also seen advancements with bracketless barrier and high-density chain-link offerings providing enhanced strength that are difficult to compromise.

Card image cap
Michael De Nil Morse Micro

Wi-Fi HaLow, a new version of Wi-Fi based on the IEEE 802.11ah standard and certified by the Wi-Fi Alliance, will change perimeter security systems. Wi-Fi HaLow has proven to be an exceptional solution to the connectivity challenges encountered by conventional Wi-Fi networks, offering a multitude of benefits such as extended range, energy efficiency, enhanced security, and effortless installation. One specific area where Wi-Fi HaLow excels is in battery-powered security cameras. No other wireless protocol matches its effectiveness and efficiency in meeting the unique requirements of these devices. This breakthrough technology is poised to significantly impact the market, providing consumers with reliable and cost-effective options to safeguard their homes. Wi-Fi HaLow showcases its capabilities by supporting video and security cameras deployed over long distances. Unlike traditional Wi-Fi networks that often suffer from lag or dropped connections, Wi-Fi HaLow ensures uninterrupted surveillance even when cameras are placed far from the access point.


Editor Summary

Factors impacting the deployment of perimeter security systems include multiple sensor technologies such as lidar and radar, as well as intelligent video monitoring. Electric fences can provide a deterrent to delay intruders. Newer proactive approaches are enhancing the effectiveness of perimeter security, and intelligent systems are working to automate detection and eliminate false alarms. Historically, perimeter security may have been seen as a low-tech approach (e.g., fences), but technology is having a marked impact as these systems become more effective than ever.

  • Related links
  • Gallagher Gates
  • Axis Communications Storage
  • Related categories
  • Barricades
  • Gates
  • Storage
  • Barriers
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Security experts from Axis, Netwatch USA, Genetec, Inc., Gallagher Security, Salient Systems, Morse Micro discuss "What’s New In Perimeter Security Systems?"

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec