Combine technologies for effective intruder detection

May 2019 Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring

Physical security is never about a single layer of technology – the tighter the mesh, the stronger your security. The secret is to have an integrated solution where devices talk to each other; for example, when a beam, seismic sensor or vibration sensor is triggered the nearest camera should be automatically activated to zoom in on that zone. This is the holy grail of intelligent intruder detection and perimeter security.

Rudi Potgieter
Rudi Potgieter

In its simplest form, cameras can be associated to alarm zones, allowing a feed to automatically pop up when an alarm is triggered. There are products out there that condenses this feed into, say, 10 x 1 frame pictures, providing you with a short video clip of the event, without abusing bandwidth. One must be cognisant that while connectivity on premise might not be a problem, the user might be mobile without access to stable, high-speed connectivity.

Connectivity is the conduit to deliver next-generation services. Faster, stable connectivity enables the delivery of rich content. An alarm signal on a radio frequency network has now evolved to a video alarm over a fibre network. This starts a larger movement in the market, driving the industry towards self-monitoring.

By getting the client to eliminate false alarms before they even hit the armed response control room, we assist in driving down operational expenses, which in turn should result in a decrease in armed response subscription fees. This ultimately will drive the industry towards an Uber-like model for security, where armed response becomes about the person who gets to the incident first, as opposed to the dinosaur model of being locked into a single provider.

Video verification is still in its infancy, but slowly but surely making inroads. The current rate of adoption is higher in the corporate industry than with the consumer, with access to technology being the biggest inhibiting factor. With the evolution of artificial intelligence (AI) and computer vision and access to cloud-based products, the adoption rate is set to increase in the consumer space.

Ultimately, it is important to have a healthy mix of technology. There is no silver bullet here, but rather strength in numbers. One does not need to break the bank when securing your valuables, but rather have the right mix of various layers of technology.

For more information contact Rudi Potgieter, Vox, +27 87 805 0000, rudi.potgieter@voxtelecom.co.za, www.vox.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unintended consequences of ­technology
June 2019, Leaderware , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
The development of general AI capabilities has seen an accompanying concern among some of the key players in the IT space as well as academics internationally.

Read more...
A platform to the future
June 2019, Genetec, Cathexis Technologies, Milestone Systems, Gijima Electronic and Security Systems (GESS) , Integrated Solutions, CCTV, Surveillance & Remote Monitoring, IT infrastructure
With AI, IoT and cloud changing the security technology landscape, will your security management platform be able to adapt to new demands?

Read more...
Managing visitors effectively and responsibly
June 2019, Powell Tronics, IDEMIA , Vox Telecom, Technews Publishing , Access Control & Identity Management
Managing access for visitors has always been something of a balancing act between keeping unwanted people out, and letting authorised people in. Particularly in a business environment, it is also crucial to make guests feel welcome and safe.

Read more...
Foresight means secure offices
June 2019, Bosch Building Technologies , Commercial (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.

Read more...
Axis 7th generation ARTPEC chip
June 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
Axis has launched its 7th generation ARTPEC chip, optimised for network video, to improve all the signature Axis technologies created to address difficult light conditions.

Read more...
Hyper-converged simplicity
June 2019 , IT infrastructure, CCTV, Surveillance & Remote Monitoring
Hyper-converged infrastructure combines all of the data centre’s critical components, such as storage, networking, compute, backup and more into pre-packaged units.

Read more...
Network cameras with strobe light and alarm
June 2019, Hikvision South Africa , Perimeter Security, Alarms & Intruder Detection
Hikvision has introduced the new AcuSense network camera series to its EasyIP 4.0 security solutions, featuring a strobe light and an audio alarm.

Read more...
Enhancing perimeter security with video
June 2019, Pelco by Schneider Electric , CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
Securing perimeters, whether they surround an airport, seaport, or an oil and gas facility, require a layered approach.

Read more...
Intrusion detection with visual ­verification
June 2019, Secutel Technologies , Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Products
Secutel Technologies’ Visual Verifier is an effective intrusion system designed specifically to accommodate for low bandwidth availability and low power usage.

Read more...
A secure home on your phone
June 2019, Fidelity ADT Security , Home Security, Perimeter Security, Alarms & Intruder Detection
The latest offering in home security from Fidelity ADT is a product that gives the customer the control they need over their home security – no matter where they are.

Read more...