The Four Main Components of a Perimeter Security System

Perimeter security components build on each other—which makes it important to select and set them up in the right order.
4 de diciembre de 2024 por
Spotter Global, Jamie Mortensen

Intruders, whether their motive be theft, sabotage, concealment, or any other purpose, depend on their intended targets being unprepared to detect and counter them. Which is why it is never “too early” to begin putting together a perimeter security system to protect a valuable location. 

In perimeter security system design, as with many things, the right steps completed in the right order can expedite things. Want to save a lot of time, money, and worry when it comes to perimeter security? 

Simply follow the process outlined below.  

Step 1: Command and Control (C2)

Any technology-based perimeter security system needs, first and foremost, a command and control center. This is the central hub, the “brain” of a perimeter security system.

Command and control centers take all the data from all of a site’s perimeter security sensors and associated systems and combine it all to: 

  • Present an easy-to-understand visual representation of all possible threats across the entire enterprise
  • Deliver automated snapshot pictures or live camera feeds of active threats in question to security personnel for verification and response
  • Coordinate and combine data from discrete sensors (cameras, radars, thermal sensors, seismic sensors, etc) for easy interpretation
  • Automate the collaboration of perimeter security measures, i.e. automatic cueing of PTZ cameras to radar-detected targets
  • Filter and otherwise reduce nuisance alarms*
  • Maintain site-customized alarm zone filters*
  • Coordinate automated deterrence responses to perimeter zone breaches (floodlights, alarms, security personnel notifications, etc)*
  • Initiate and outline pre-determined Standard Operating Procedures (SOP’s) for various scenarios.
  • Record alarm histories
  • Communicate with enterprise-level management systems*

*Special features of Spotter Global’s Command and Control Center, called NetworkedIO or “NIO”. See details here. 

Choosing a command and control system first is critical because it enables customers to then choose cameras, sensors, deterrence measures, and other perimeter security hardware that is compatible with the site’s overall security objectives. 

Also, by choosing the command and control system first, customers can be sure that their overall security system can and will include four layers of perimeter protection: detection of threats, delay of threats, deterrence of threats so they retreat, and defense if the threat proceeds forward through the first perimeter security thresholds towards the site. 

Step 2: Radars & Other Long-Distance Sensors 

The simple rule for threat detection is “the sooner, the better”. Long distance perimeter security sensors allow security personnel and automated security systems to pick up on potential threats before they can do any damage. 

Early detection allows all subsequent delay, deterrence, and defense efforts to be more effective. So, depending on the local geography and value of the site, it is generally best for the first “lines” of detection to extend as far beyond the property’s fenceline as possible, monitoring the surrounding areas, over fields, water, or urban sprawl for anyone or anything approaching the site that could become a hazard.

Radars can be especially useful for this purpose. When there is a lot of ground that needs to be covered, a compact surveillance radar system becomes the force multiplying lynchpin in a perimeter security system. Compact surveillance radar can pick up threats more than a thousand meters away and aren’t inhibited by darkness, snow, rain, fog, or other obscuring conditions. 

It’s not just about detection though, it’s about pulling the entire perimeter security system together. Compact surveillance radars and other long-distance sensors such as the drone-specific Remote Drone ID (RDID), can combine with the unique software that allows them to integrate with other perimeter security measures and systems, can: 

  • Detect threats from up to 1500+ meters away by radar and 750+ meters away by RDID, often long before thermal cameras, motion detection cameras, or human eyes can pick them out
  • Detect threats through fog, snow, rain, smoke, or low-light conditions
  • Combine the data from cameras, radar, and other perimeter sensors into an easy-to-read picture for security personnel
  • Monitor both the ground and airspace, detecting and distinguishing between human, vehicle, drone, and other target types
  • Filter nuisance alarms (distinguishing birds from drones, local foraging deer from intruders, etc)
  • Create intrusion alerts according to a site-customized design of alarm zones (low alert, mid alert, and high alert areas), filtered also by time of day and target type if the customer desires
  • Guide security personnel in their intervention efforts with specific, geo-referenced locations and tracking information on all targets
  • Automatically trigger notifications, alarms, floodlights, and other deterrence and defense measures whenever the conditional logic conditions of an alarm zone are met
  • Maximize the effectiveness of a site’s security cameras by directing the slew-to-cue action of PTZ cameras often resulting in a need for fewer cameras to maintain site situational awareness

Step 3: Cameras 

There’s nothing quite like having “eyes” on the scene continuously monitoring for any irregular activity or potential threats. Live feeds from security cameras help on-site and remote security personnel: 

  • Maintain situational awareness over large areas, including more precise target information that radars can’t detect
  • Deter intruders with their onsite presence
  • Coordinate security responses more effectively
  • Prove compliance with established security standards
  • Obtain legal evidence 
  • Promote a sense of safety for all site workers and visitors

While some sites use fixed-lens CCTV cameras, security professionals often recommend PTZ (Pan-Tilt-Zoom) cameras for securing the perimeter around important sites. PTZ cameras can cover more ground than CCTV cameras, more often come equipped with advanced filtering options, and are often compatible with advanced perimeter security command and control systems. 

A few of the leading brands of PTZ cameras are: 

  • Honeywell
  • Avigilon
  • Axis Communications
  • Bosch
  • Canon
  • Ganz
  • Teledyne Flir
  • Hanwha
  • Moog
  • Panasonic
  • Pelco
  • RVision
  • Samsung
  • Silent Sentinel
  • Sony
  • Videotec
  • Vivotek

Step 4: Video Management System (VMS)

Security cameras become very limited in their effectiveness if there’s no way to go back and watch previously recorded camera footage. 

Video management systems allow security personnel to see, from their on-site center of security or remotely from a connected device, what the site’s security cameras are currently seeing or have seen. These systems take in the video data from the cameras and store it on a server that is accessible to authorized personnel. 

In some cases the video management system is equipped with video analytics, alarm zone specifications, and other features that enhance security, mainly by allowing the system to pick out threats/potential threats and alert personnel as needed. 

A few of the leading vendors/brands of VMS systems are: 

  • Maxpro VMS by Honeywell 
  • Genetec
  • Avigilon
  • Milestone
  • Teledyne Flir
  • exacqVision
  • Pelco
  • Axis Communications
  • Intellicene
  • ISS
  • Digifort

Additional Layers of Detection

Once the site’s Command and Control center, radars, cameras, and VMS system are chosen, it will be easier to budget for and choose any other layers of intrusion detection, delay, deterrence, or defense the customer may want for their site. 

Detection options include fiber optic fencing, lidar, seismic sensors, motion detectors, glass break sensors, and more. Customers are encouraged to discuss their security concerns with an experienced security integrator to find the best solutions to match their budget, site, and threat environment. 

Options for Deterrence, Delay, and Defense

What is the perimeter security system supposed to do once an approaching intruder is first detected? When the intruder gets too close? When they cut through the fence? 

Firstly, customers should make sure they have their perimeter security system set with alarm zones of varying grade (low-alert, mid-alert, high-alert) etc. Post-installation systems checks should ensure that the sensors are capable of picking up and recognizing threats in the various zones and responding accordingly with automated triggers for deterrence measures. 

A site’s passive deterrence measures are, first and foremost, its fence and any signs around the property that prohibit entry. Active deterrence measures that usually stand idle but can be instantly triggered when an alarm zone breach is logged may include floodlights, alarms, notifications or alarms sent to security personnel, hyperspikes, automatic calls to law enforcement, etc. 

Conclusion 

Securing a high-value site against intrusion can seem like a daunting task, particularly if it follows a recent security incident. However, many organizations have successfully protected critical infrastructure, data centers, and private properties from determined threats, whether they come on foot, by vehicle, or via drone. It's important to remember that there is no 'one-size-fits-all' solution. Tailoring security measures to each site is essential, while also recognizing that not all intrusions are malicious. In some cases, security systems also help safeguard curious individuals from potentially dangerous areas.

While the process requires effort, and every site has its own unique vulnerabilities to address, choosing the right consulting partners and following the steps outlined above will set you on the path to securing your site effectively and efficiently. 


Spotter Global, Jamie Mortensen 4 de diciembre de 2024
Learn More

To learn more about how Spotter compact radars can benefit your organization, fill out the form below or call (801) 742-5849 and ask for Nerah.

Thank You For Your Interest

 A Spotter Radar Consultant will contact you soon!

Compartir
Categorías
Archivar