Does less give you more?

July 2017 Perimeter Security, Alarms & Intruder Detection, Surveillance

Perimeter security is essential to prevent crime and create alerts before an intruder enters a company’s premises or a residential complex/gated community in order to protect people and assets. However, legacy systems and technologies are rapidly becoming obsolete and new technologies are being adopted to prevent unauthorised access.

This adoption is driven by an increase in intrusion security threats, creating a demand for perimeter protection systems that are more reliable, cost-effective, efficient and better able to keep up with technological advancements. So, what is the best approach to perimeter design?

Typically, when approaching a conventional perimeter design, visual cameras were used. However, this approach required a substantial number of cameras and operators to monitor the images. For example, in the case of an application covering 16 square kilometres (4 km x 4 km), 160 cameras, 160 lights, 160 detectors (1 every 100 m), 16 recorders and 10 LCD screens are required, along with 3-5 operators to operate this set-up. Thus, showing that the use of visual cameras for perimeter design is undoubtedly complex, costly and labour-intensive, both to set up, operate and maintain.

Says Mark Chertkow, MD at Graphic Image Technologies (GIT), “We believe that it’s time to take a fresh approach to perimeter security. By making use of thermal cameras with video analytics in perimeter design where uncooled thermal cameras can operate up to 2000 m depending on the lens used, it becomes possible to cut that equipment list down to 32 cameras (one every 500 m) that require no lights, no detectors and only one recording device, one LCD screen and a single operator. As the operator will be relying on the analytics on the cameras, they will not have to constantly monitor the cameras as he/she will be alerted should there be an intrusion.”

An end to guesswork

“To this end, we’re now offering a comprehensive service to security consultants and our partners, helping them to take a more efficient approach to scoping and designing a perimeter security solution. Using a software tool called Raven, we can assist with the technical design of new perimeter security surveillance applications. These tools use geographical (longitude and latitude) positioning to identify the physical site that needs to be protected and can be used to calculate how many cameras are needed, depending on coverage required.”

This then feeds into the quoting tool, which calculates storage requirements and then produces a bill of materials and camera design layout, which tells the consultant exactly what is required to complete the setup – right down to camera selection and placement. This is a more scientific approach than simply measuring the site and stating that a pole and a camera is required at every 50-metre interval.”

Reducing complexity and costs

Previously, the high cost of perimeter security systems would be considered a constraining factor in market adoption. By using thermal cameras in the perimeter design, it becomes possible to greatly reduce the system complexity and requirements, which has a positive impact on costs. With this simplified approach to perimeter design, fewer cameras are needed, which means less cabling is required and the cost to maintain the solution is reduced.

By making use of thermal cameras, many persistent video imaging problems can be solved and the operator will be able to see clearly, no matter the weather or lighting conditions. Furthermore, thermal cameras have built-in adaptive video analytics that automatically monitor the video feed to differentiate between the different things that could trigger a movement alarm. Video analytics have the effect of virtually eliminating the possibility of false triggers, which ultimately increases system reliability, while reducing the manpower needed to monitor the video feeds.

Thermal cameras require less storage than visual cameras, and none of the peripherals normally associated with visual cameras (detectors, spotlights etc.) in addition to requiring fewer operators. “This means that while more expensive than visual cameras, by using thermal cameras the total costs of ownership will actually be driven down when one considers the benefits of the system as a whole,” Chertkow notes.

For more information contact Graphic Image Technologies, +27 (0)11 483 0333, markc@git.co.za, www.git.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...
Storage Selection Guide 2026
Storage Selection Guide Surveillance
The Storage Selection Guide 2026 provides video storage and management options customised for small, medium, and large surveillance operations, ensuring effective support for various security requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.