Protecting the perimeter with IP cameras

September 2015 Editor's Choice, Surveillance, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

Jason McGregor, sales manager, Axis Communications.
Jason McGregor, sales manager, Axis Communications.

Whether on a small, basic scale in a residential setting, or for a critical infrastructure facility, perimeter protection is important for the safety of residents and staff and to safeguard against trespassing, theft and vandalism.

Traditionally, perimeter protection measures relied on technologies such as short distance radar, lasers, ground sensors, motion sensors or motion-sensitive fence wires.

While these technologies all perform well, they have obvious and significant limitations: they do not let the operator distinguish between real and false alarms and they provide limited detail. For every alert triggered, a person has to inspect the area in question to confirm if there is an actual breach of the perimeter and a threat that needs to be dealt with. This is not only time consuming, but frequent false alarms, for instance, set off by a passing animal, can eventually lead to more lax security checks.

Recognising how important it is to address this and to understand the nature of potential threats in real time, organisations are increasingly turning to network cameras to improve perimeter protection. Using live thermal video cameras as detection sensors and high definition video cameras to provide detail and verification, these solutions add important visual information about who or what has triggered the alarm, and about what kind of activity is going on.

In combination with traditional technologies, network cameras can be built into a more intelligent and reliable, IP-based surveillance system. With a vast range of cameras available on the market, they can be set up to be as versatile and high performing as the setting requires. Even in difficult light or weather conditions, clear and crisp images on live and recorded video footage facilitate the detection and identification of objects, people and incidents. Automated solutions and video analytics software can further reduce the need for human intervention and monitoring staff.

Challenges and solutions

The main objective of any perimeter protection system is to detect a real threat or intrusion at the earliest possible stage – and to do this 24/7. However, the areas that need to be monitored can be vast – rail yards, bus depots, car parks, harbours or the area around an industrial site – and their sheer size can pose significant challenges. Lighting conditions can be a problem, especially at night time if there is little or no electric light available.

The combination of thermal cameras with intelligent video applications and pan/tilt/zoom (PTZ) dome cameras has proven very effective in handling the protection of these sites in diverse environments.

Thermal network cameras do not need any light at all to operate and are an obvious solution to night monitoring. Even in broad daylight, they are useful in detecting people or objects that are obscured by complex backgrounds or deep shadows. The cameras available on the market today are so sensitive and accurate that they provide a perfect first line of defence. When equipped with intelligent video analytics, a thermal camera can be configured so that when it ‘sees’ a suspicious event, it automatically directs a second PTZ camera to point and zoom in to the right place and provide live HDTV video of the situation.

Working in parallel, the two camera types form an extremely secure and accurate protection mechanism. To ensure uninterrupted recording and as much functionality as possible, each camera is independent and is able to provide information as long as it is connected to the IP infrastructure. In case of communication failure, the cameras can record onto an embedded SD card for future analysis.

Fast and appropriate action

An effective perimeter protection solution needs to provide both deterrence, and immediate visual verification. The real-time information delivered by network cameras allows security staff to take quick and appropriate action, as well as minimise false alarms. In case of an incident, communication is key: evidence can be collected and transferred to the relevant stakeholders by email, or as an alert on a mobile phone.

Security managers can use their mobile phones to view live video from all their network cameras, or log on to the control room server to search recorded footage. The cameras can be set up to automatically trigger a response, such as floodlight or sirens, or network horn speakers can be used to issue verbal warnings.

The beauty of IP-based technologies is that they can be integrated with each other, and with existing security systems. Future-proof, flexible and fully scalable, network cameras in combination with other sensor systems and technologies such as fence or buried cable detection can cater to the most complex of setups, such as critical infrastructure protection, where the security solution has to be able to effectively manage multiple alarms at once.

With integrated analytic software and other clever applications, a video surveillance system can be largely automated and very cost effective. Capable of processing video information at the edge, inside the camera itself, modern units require less bandwidth and reduce the need for expensive storage. Even small and basic systems provide the high image quality required.

The versatility of network cameras in combination with the many available video analytics applications makes these systems flexible, scalable and cost efficient. Cutting the effort, stress and problems caused by misinterpreted and false alarms will also pay dividends – if nothing else, in the form of greater peace of mind.

For more information contact Axis Communications, +27 (0)11 548 6780, [email protected], www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.