Get smarter with intelligent intruder detection and perimeter security

October 2017 Perimeter Security, Alarms & Intruder Detection, Surveillance

When it comes to perimeter protection and security, gone are the days when the cheapest solution would be acceptable. Times have changed and businesses need to keep up to date to protect their valuable assets and people. This means it is no longer advisable to rely on legacy systems and technologies that are rapidly becoming obsolete.

An ever-increasing rise in intrusion security threats has pushed up the demand for perimeter protection systems that are more reliable, cost-effective, efficient and better able to keep up with constant security technology advancements. To this end, there has been a move toward the smart integration of access control and perimeter security systems with intelligent intruder detection and proactive monitoring systems to ensure that all weak spots are eliminated. Today’s intruder detection and perimeter security systems are more reliable, more flexible and more intelligent than ever before.

Get the basics in place

There are many established methods of perimeter protection, all of which require the basics upfront. Once the physical barrier is in place, site owners have a variety of choices with regards to securing their perimeter. One of the most effective methods, however, has proven to be a combination of a CCTV system (consisting either of visual or thermal cameras) that are run with intelligent analytics software to alert of any security incidents along the perimeter.

The video analytics component is the key to maximising the functionality of thermal cameras for perimeter protection. Video analytics essentially enables ‘blank screen monitoring’, in that the system will give notifications of risks according to specific rules set up.

Get smarter, visually

Thermal cameras are particularly suited to perimeter applications for many reasons. Compared to visual cameras, thermal cameras running video analytics are ideal for perimeter protection because such cameras can operate on distances between 40 to 500 metres with the right lens, which means fewer cameras are required. Furthermore, because these cameras present thermal imaging, they require no lights, no motion detectors and only need one recording device, one operating screen and a single operator.

All monitoring and management of the CCTV system is done through a centralised portal, with the ability to send automated alerts remotely. Even better, the latest developments in these cameras have seen a combination of the best thermal image detail with high-performance edge perimeter analytics in a single visual device. This device is capable of delivering optimal intrusion detection, even in the most challenging environments and extreme weather conditions.

Intelligence doesn’t mean exorbitant costs

Getting smarter with security doesn’t have to add too many zeros to the price equation. Thanks to an intelligent and innovative FLIR tool suite called Raven, all of the guesswork in designing and planning perimeter security surveillance set-ups has been eliminated. Using longitude and latitude positioning of the actual physical site, this tool can calculate exactly how many cameras are needed and produce a bill of materials and camera design layout. This is a far more intelligent approach than simply measuring the site and stating that a camera is required at each 50-metre interval, as it eliminates blind spots and weaknesses while reducing cameras to the minimum required to cover that area.

Security solutions should be flexible according to the exact needs of each business. There is no longer any excuse to be running on standalone security systems, or to delay upgrading systems for fear that it will simply cost too much. Today, solutions are built and integrated based on the risks that require mitigation and the assets that require safeguarding and, thanks to technology, that perimeter protection is now more intelligent than ever before.

For more information contact Graphic Image Technologies, +27 (0)11 483 0333, laurence@git.co.za, www.git.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...
Storage Selection Guide 2026
Storage Selection Guide Surveillance
The Storage Selection Guide 2026 provides video storage and management options customised for small, medium, and large surveillance operations, ensuring effective support for various security requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.