Integration: the differentiating ­factor

August 2015 Perimeter Security, Alarms & Intruder Detection

With the plethora of technology available on the market today, users must feel like they are sifting through a haystack, and perimeter security systems are no exception.

Gus Brecher, Cathexis Africa.
Gus Brecher, Cathexis Africa.

According to Gus Brecher, managing director of Cathexis Africa, the requirements for a perimeter intrusion detection system (PIDS) are generally very similar across most environments and, in principle, extremely logical. “The difference in requirements for a mining application and a housing estate for example, is really only limited to the environment, the degree of the threat, the accuracy and reliability of the detection, and the actions that are required upon detection of a perimeter breach,” he says.

“In other words, the choice of technology really lies in the finer details of what you are trying to achieve and the environment in which the products are to be deployed,” adds Brecher.

There is one common thread across all the perimeter protection solutions though, and that is the fact that surveillance cameras dramatically enhance the solution by providing visual reference related to the perimeter alarms that are triggered by the chosen solution.

Also, regardless of whether you are using electric fences, fibre fence detectors, radar, thermal cameras with video analytics, infra-red beams, sub-dermal detection, or any of the other technologies out there, there is a decision to be taken directly correlating with the trigger that is received from the perimeter technology.

“Without a decent surveillance solution, your control room is really operating blind, and relying on the deployment of guards to the activated zones,” he says. “This is not really effective as any perpetrators would be long gone by the time the guards arrived at the supposed location of breach.”

Having said this, Brecher believes that there are still too many installations that are using a combination of PIDS and CCTV only to find that their control room is still ineffective. The reason for this is because the two systems are running independently of one another without an integrated decision-making process.

The questions one needs to ask here are:

• What do you do with the information that you receive?

• How do you create an effective, efficient, repeatable environment?

• How do you associate the events from your PIDS with your other technology on site?

If you look at an ‘un-integrated solution’, it’s easy to see where the process might fall short:

1. The operator receives an alarm from the PIDS, which informs him of a possible intrusion at a specific zone on the PIDS.

2. The operator now needs to work out which cameras to look at that may be related to that specific zone.

3. To make matters worse, if the site is using PTZ cameras, the operator now needs to move the PTZ camera to the correct area.

The reliance on the operator to make the decisions and find the right cameras to look at is a recipe for errors and, possibly, disaster. If you now integrate the systems, the process looks more like this:

1. The operator receives an alarm from the PIDS, which informs him of a possible intrusion at a specific zone on the PIDS.

2. The system automatically switches the relevant camera to the relevant monitor.

3. If the camera is a PTZ, the camera is automatically moved to the correct pre-set position.

“From the two scenarios illustrated above it therefore, makes far more sense that an integrated approach makes for a far more reliable, effective environment for your perimeter intrusion detection system,” says Brecher. “The technology must, of course, be appropriately suited to the environment, but that’s a discussion for another day,” he concluded.

For more information contact Cathexis Africa, +27(0)31 240 0800, sales@catafrica.co.za, www.cathexisvideo.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.