Does less give you more?

July 2017 Perimeter Security, Alarms & Intruder Detection, Surveillance

Perimeter security is essential to prevent crime and create alerts before an intruder enters a company’s premises or a residential complex/gated community in order to protect people and assets. However, legacy systems and technologies are rapidly becoming obsolete and new technologies are being adopted to prevent unauthorised access.

This adoption is driven by an increase in intrusion security threats, creating a demand for perimeter protection systems that are more reliable, cost-effective, efficient and better able to keep up with technological advancements. So, what is the best approach to perimeter design?

Typically, when approaching a conventional perimeter design, visual cameras were used. However, this approach required a substantial number of cameras and operators to monitor the images. For example, in the case of an application covering 16 square kilometres (4 km x 4 km), 160 cameras, 160 lights, 160 detectors (1 every 100 m), 16 recorders and 10 LCD screens are required, along with 3-5 operators to operate this set-up. Thus, showing that the use of visual cameras for perimeter design is undoubtedly complex, costly and labour-intensive, both to set up, operate and maintain.

Says Mark Chertkow, MD at Graphic Image Technologies (GIT), “We believe that it’s time to take a fresh approach to perimeter security. By making use of thermal cameras with video analytics in perimeter design where uncooled thermal cameras can operate up to 2000 m depending on the lens used, it becomes possible to cut that equipment list down to 32 cameras (one every 500 m) that require no lights, no detectors and only one recording device, one LCD screen and a single operator. As the operator will be relying on the analytics on the cameras, they will not have to constantly monitor the cameras as he/she will be alerted should there be an intrusion.”

An end to guesswork

“To this end, we’re now offering a comprehensive service to security consultants and our partners, helping them to take a more efficient approach to scoping and designing a perimeter security solution. Using a software tool called Raven, we can assist with the technical design of new perimeter security surveillance applications. These tools use geographical (longitude and latitude) positioning to identify the physical site that needs to be protected and can be used to calculate how many cameras are needed, depending on coverage required.”

This then feeds into the quoting tool, which calculates storage requirements and then produces a bill of materials and camera design layout, which tells the consultant exactly what is required to complete the setup – right down to camera selection and placement. This is a more scientific approach than simply measuring the site and stating that a pole and a camera is required at every 50-metre interval.”

Reducing complexity and costs

Previously, the high cost of perimeter security systems would be considered a constraining factor in market adoption. By using thermal cameras in the perimeter design, it becomes possible to greatly reduce the system complexity and requirements, which has a positive impact on costs. With this simplified approach to perimeter design, fewer cameras are needed, which means less cabling is required and the cost to maintain the solution is reduced.

By making use of thermal cameras, many persistent video imaging problems can be solved and the operator will be able to see clearly, no matter the weather or lighting conditions. Furthermore, thermal cameras have built-in adaptive video analytics that automatically monitor the video feed to differentiate between the different things that could trigger a movement alarm. Video analytics have the effect of virtually eliminating the possibility of false triggers, which ultimately increases system reliability, while reducing the manpower needed to monitor the video feeds.

Thermal cameras require less storage than visual cameras, and none of the peripherals normally associated with visual cameras (detectors, spotlights etc.) in addition to requiring fewer operators. “This means that while more expensive than visual cameras, by using thermal cameras the total costs of ownership will actually be driven down when one considers the benefits of the system as a whole,” Chertkow notes.

For more information contact Graphic Image Technologies, +27 (0)11 483 0333, markc@git.co.za, www.git.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.