Three levels of security

March 2012 Surveillance

Security or operations managers should be aware that there are three levels that need to be protected when designing a physical security programme. These include the outer perimeter, the inner perimeter and the interior.

The outer perimeter is defined by the actual property lines. In securing the outer perimeter the objective is to control who can walk or drive onto the property. In deciding the type of perimeter security to implement, one needs to weigh the risk of an intruder entering the property with the cost of the available security measures. Criminals like to feel in control as they enter and exit the property. The perception is then one of lower risk. A way to deter criminals is to use natural access control, which includes building, and landscape features. The idea is to guide people as they enter and exit an area. This can also prove useful to block any potential escape routes.

The use of territorial reinforcement can effectively prevent unauthorised entry by creating a clear distinction between public and private property. By adopting this distinction, legitimate occupants have a sense of ownership and will notice any perpetrators who will have a hard time blending in.

The inner perimeter includes doors, windows and walls of a building. Traditional methods used to protect these include locks and keys, or proximity readers with access tags and cards. A common problem is loss of control of access media, which includes these keys, access tags and cards. Recent developments have seen the increased usage of biometric readers which read some type of unique human feature such as fingerprints. The advantage of these systems is the inability to do buddy clocking.

Selecting IP

Commercial security solution providers should seriously consider an IP-based system when designing a surveillance system. The uptake of megapixel IP camera utilisation has seen the price of these systems dropping over recent times. Studies have shown that the total cost of ownership of an IP solution of 32 cameras is actually cheaper than a similar 32 camera analogue system.

Of course, the resolution of the IP solution is better (currently a magnitude of 10 times). The higher resolution of the megapixel allows for a certain amount of digital zooming without picture degradation. This makes identification of an intruder or perpetrator a lot more reliable as well as having a better chance of the video footage standing up in court as legitimate evidence. There is also less cable (about one-third) required when compared to analogue.

Video analytics are proving to be an important factor in the future implementation of video surveillance. Surveillance systems are becoming larger with the count of cameras regularly exceeding 100 cameras on an average commercial site. It is impossible for an operator to monitor all the cameras all the time. Video analytics can be implemented to overcome this issue.

For example, a surveillance system can be set up to do a ‘screen pop’ when a restricted area has been entered. Any surveillance platform (example NVR or DVR) will allow you to record and store video on cost-effective hard drives. The point has been reached where the amount of video storage has exceeded the ability to analyse. Video analytics can also help in this aspect. For example, an intelligent search option will allow the operator to search through hours of video and only list the incidences where people entered a building. Typical types of video analytics include general motion, missing object, camera occlusion, foreign object, focus lost and signal loss.

The technologies used in providing perimeter and interior security can and should overlap (for example cameras can be used on the perimeter or inside the buildings). The effectiveness of security technology is the ability to ensure a safe environment. However, only implementing one technology in each of the three levels can present the possibility of a security breach. Security or operations managers should look at implementing two or three measures at each level.

For more information contact IP Security Solutions, +27 (0)11 553 3300,  [email protected], www.ipsecuritysolutions.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.