Defending the perimeter

Residential Estate Security Handbook 2016 - Vol 2 Editor's Choice, Surveillance, Perimeter Security, Alarms & Intruder Detection, Residential Estate (Industry)

“Prevailing crime continues to have a negative impact on the lives of all South Africans, often on a daily basis,” says Roy Alves, business development manager, MEA, Axis Communications. However, during Axis’ recent 20th celebration of the world’s first network camera, he noted, “Technology is creating the platform for an even higher level of intelligent surveillance.”

Heralding a significant shift in the deployment of analytical surveillance, Axis Perimeter Defender is a scalable and flexible video analytics application for perimeter surveillance and protection. An application, easily installed on the camera itself, it allows for the deployment of analytics directly on the device, providing for a much more sophisticated result with accurate detection capabilities and simultaneous support for multiple scenarios, including intrusion and loitering.

The last few years have seen Axis take enormous strides in pioneering its ability to load applications (aka apps) directly onto its cameras, in much the same manner as today’s smartphones. Developed by Axis, the i-LIDS approved Perimeter Defender application is able to be deployed across a number of its products, safeguarding a customer’s investment whilst enabling the next step in surveillance. “As with smartphones, the customer is not tied into using only this specific application,” says Alves. As requirements change, additional applications can be installed for a number of other purposes, from heat mapping through to people counting or even sound intelligence.

“Previously, field network cameras required the accompanying analytical software to be housed offsite, in a server room or elsewhere,” continues Alves. “By treating the analytic component as an application on the device itself, a whole new world of surveillance opens up.” Gone are the days of needing to dispatch security personnel every time an alarm is triggered by a camera on a perimeter wall. Devices housing analytics allow for the transmission of key events only, picking up authentic security breaches as opposed to those caused by animals, wind or other elements. Compatible across both thermal and normal optic cameras, it is saving time, it is saving money, but most importantly it is heightening security.

Prevention better than cure

While prevention is almost always better than cure, the same can be said for the world of security. “It is often too late to detect the intruder once he has already gained access,” says Alves. Key to effective safety and security lies in the ability to detect suspicious behaviour, vehicles or persons on the outside of one’s perimeter wall or boundary prior to entry.

“We work with many housing estates. By placing a camera down the fence line, one can create very distinct digital lines across the area. Instead of picking up traditional video motion detection, analytics from video sensors inside the perimeter is able to detect intrusion at the earliest possible phase, helping to pre-empt potential crime.

Ideally suited to the South African environment with its large number of residential housing estates, it is as relevant for local business parks, mining facilities or any other commercial property with a large perimeter wall. In most of these cases, entrances are manned by security personnel requiring every entrant to sign in or produce pre-approved access. “While essential, what about the perimeter wall or boundary at the back of the complex?” asks Alves. Axis’s Perimeter Defender application is providing an added advantage to those situations where the physical access control system needs to be reinforced with reliable intrusion detection.

Thermal solution

Thermal cameras, increasingly used in the commercial sector as opposed to the military, is further aiding surveillance and early detection while reducing the need for costly 24/7 lighting. Superior quality allows for detection in even the darkest situations, right down to footprints in wet grass. But it doesn’t end there. “Picture a parking lot with 20 cars,” says Alves. “Those parked for a number of hours will all emit the same heat signature, while a more recently parked car will emit a warmer heat signature, allowing for the analysis of relevant movements if needed.”

Following its launch earlier this year, Alves is encouraged by both the positive response and traction gained. “We have quite a number of business parks and commercial customers currently deploying Perimeter Defender,” says Alves, including one of Cape Town’s premium residential estates that comprises an area of 134 hectares.

“South Africa presents its own set of unique challenges, particularly with regards to climate,” continues Alves. “Extreme heat and sunlight can often complicate effective analytics making regular changes on optic imaging, requiring solutions to further reduce false alarms essential.”

When looking to the future, Alves reiterates the importance of constant innovation. “Technology is evolving daily,” he says. “The concept of a smarter, safer world is no longer a fallacy, but a reality.”

For more information contact Axis Communications, +27 (0)11 548 6780, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Storage Selection Guide 2024
Storage Selection Guide Surveillance
The Storage Selection Guide 2024 includes a range of video storage and management options for small, medium and large surveillance operations.

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

On-camera AI and storage create added benefits
Elvey Security Technologies AI & Data Analytics Surveillance IoT & Automation
The days of standalone security systems are long past, and the drive is now to educate system integrators, installers, and end users on the return on investment that can be derived from intelligent, integrated BMS, IoT and security systems.

Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Artificial intelligence on the edge
Axis Communications SA Surveillance AI & Data Analytics
In the world of video surveillance, one of the primary benefits of edge computing will be the ability to undertake advanced analytics using artificial intelligence (AI) and deep learning within cameras themselves.

AI enables security solutions to define business strategies
Regal Distributors SA Editor's Choice
While allowing technologies to do exactly what they should do with even more efficiency and precision, AI is also empowering these same technologies to break through their traditional boundaries and create an ecosystem where one interface delivers outcomes across highly segmented verticals.

Camera Selection Guide 2023
Camera Selection Guide Surveillance
The Camera Selection Guide 2024 includes a range of IP, thermal and speciality cameras aimed at a broad range of surveillance functions.

Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.