Integration: the differentiating ­factor

August 2015 Perimeter Security, Alarms & Intruder Detection

With the plethora of technology available on the market today, users must feel like they are sifting through a haystack, and perimeter security systems are no exception.

Gus Brecher, Cathexis Africa.
Gus Brecher, Cathexis Africa.

According to Gus Brecher, managing director of Cathexis Africa, the requirements for a perimeter intrusion detection system (PIDS) are generally very similar across most environments and, in principle, extremely logical. “The difference in requirements for a mining application and a housing estate for example, is really only limited to the environment, the degree of the threat, the accuracy and reliability of the detection, and the actions that are required upon detection of a perimeter breach,” he says.

“In other words, the choice of technology really lies in the finer details of what you are trying to achieve and the environment in which the products are to be deployed,” adds Brecher.

There is one common thread across all the perimeter protection solutions though, and that is the fact that surveillance cameras dramatically enhance the solution by providing visual reference related to the perimeter alarms that are triggered by the chosen solution.

Also, regardless of whether you are using electric fences, fibre fence detectors, radar, thermal cameras with video analytics, infra-red beams, sub-dermal detection, or any of the other technologies out there, there is a decision to be taken directly correlating with the trigger that is received from the perimeter technology.

“Without a decent surveillance solution, your control room is really operating blind, and relying on the deployment of guards to the activated zones,” he says. “This is not really effective as any perpetrators would be long gone by the time the guards arrived at the supposed location of breach.”

Having said this, Brecher believes that there are still too many installations that are using a combination of PIDS and CCTV only to find that their control room is still ineffective. The reason for this is because the two systems are running independently of one another without an integrated decision-making process.

The questions one needs to ask here are:

• What do you do with the information that you receive?

• How do you create an effective, efficient, repeatable environment?

• How do you associate the events from your PIDS with your other technology on site?

If you look at an ‘un-integrated solution’, it’s easy to see where the process might fall short:

1. The operator receives an alarm from the PIDS, which informs him of a possible intrusion at a specific zone on the PIDS.

2. The operator now needs to work out which cameras to look at that may be related to that specific zone.

3. To make matters worse, if the site is using PTZ cameras, the operator now needs to move the PTZ camera to the correct area.

The reliance on the operator to make the decisions and find the right cameras to look at is a recipe for errors and, possibly, disaster. If you now integrate the systems, the process looks more like this:

1. The operator receives an alarm from the PIDS, which informs him of a possible intrusion at a specific zone on the PIDS.

2. The system automatically switches the relevant camera to the relevant monitor.

3. If the camera is a PTZ, the camera is automatically moved to the correct pre-set position.

“From the two scenarios illustrated above it therefore, makes far more sense that an integrated approach makes for a far more reliable, effective environment for your perimeter intrusion detection system,” says Brecher. “The technology must, of course, be appropriately suited to the environment, but that’s a discussion for another day,” he concluded.

For more information contact Cathexis Africa, +27(0)31 240 0800, sales@catafrica.co.za, www.cathexisvideo.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Advances in electric fence management
Nemtek Electric Fencing Products News & Events Perimeter Security, Alarms & Intruder Detection
Nemtek will demonstrate its newly enhanced FG7C+ Fence Controller, now featuring an advanced software upgrade that connects all Nemtek devices, aggregating data to a single point for efficient electric fence alarm monitoring and control.

Read more...
Keenfinity launches Radionix as new intrusion brand
Perimeter Security, Alarms & Intruder Detection News & Events
Keenfinity Group’s Intrusion & Access Business Unit has launched Radionix as its new brand for intrusion alarm systems, unlocking new potential and growth opportunities.

Read more...
The first choice for electric fence management
Stafix Security Centres Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
In South Africa, over 500 housing estates use JVA Perimeter Patrol, making it a widely used Electric Fence Management providing seamless integration with alarms, CCTV, VMS, access control and control room third-party software.

Read more...
New JVA MBxL energiser range
Stafix Security Centres Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
The latest MBxL energisers stand out for their simplicity, allowing you to push the “On” button and have the unit tick away, or to configure it through our virtual keypad (VKP).

Read more...
Smart protection for modern living
Products & Solutions Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry)
Recognised globally for their performance and sleek design, AJAX solutions combine professional-grade security with user-friendly control, making them ideal for both residential and commercial environments.

Read more...
How intrusion protection helps secure O&G operations
Axis Communications SA Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.