Planning for Your Perimeter

Planning for Your Perimeter

Taking a hard security review of your first line of defense

The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable.

The point of strong perimeter security is to stop or deter crime or malicious activity before it enters onto your premises. Advances in AI, PTZ and multi-sensor cameras, and technologies like license plate recognition (LPR) technology are all combining to make perimeter surveillance a growing focus for security teams and a rapidly expanding business as well.

Most industry reports forecast continued growth for the global perimeter security market; Grand View Research estimates growth from $59.21 billion in 2021 at an annual rate of 9.4% through 2030. The reasons for this growth are clear. It is nearly impossible to watch the daily news without seeing the latest report of a new network intrusion or ransomware attack. Many organizations have reduced their on-site physical security teams, making it impossible for them to have “eyes” everywhere across a campus. Just like having a security alarm sticker or sign on your front lawn, the sight of pole-mounted cameras across a company’s boundaries can have a similar effect on stopping malicious activities before they occur.

What to Consider?
Security considerations include choosing the right technology for perimeter surveillance. The reasons vary from one organization to the next, based on a range of factors from a company’s market, application, location, size and, as always, budget and resources.

Camera choice can depend on how far a camera is located from a building or guard station, but typically, a company needs to cover a long field of view so they will either choose a wide-angle lens to capture a very wide area. On the other hand, if cameras are mounted on the perimeter far from a building, then the right option may be long-range cameras with a high-zoom lens and high-powered IR.

Depending on environment, an organization may need to consider the factor of “unnecessary information.” If there are many waving trees along a perimeter or pedestrian activity on sidewalks adjacent to the perimeter, then those environmental factors may trigger false alarms. A security team only needs to know if something comes over the perimeter or enters the grounds, but the elements on the outside usually are not that useful.

That is where AI-based analytics are beneficial. Surveillance camera operators can easily be bombarded with too much information – and too many false event alarms – especially if they are using conventional cameras equipped with motion-based pixel detection. AI and Deep Learning algorithms detect and classify distinct objects (people, vehicles, faces and license plates) while clearly distinguishing them from their environmental surroundings.

These smart cameras filter out irrelevant motion triggers to focus only on people, objects, and vehicles, and generate only the events users need to see for effective forensic searches and enhanced operational efficiency. As a result, they also minimize storage and bandwidth by not tracking and recording every type of object in motion.

AI is also playing a larger role in cameras with license plate recognition technology, recording vehicle entries and exits and alerting staff to potentially dangerous activities in real-time. For example, their license plates can identify persons while they are still outside a perimeter, so parking garage and security teams can intercept them before they enter the facility.

Climate can also play a role in choosing perimeter security, especially with cameras on the outside of the building, on poles or on fences and especially in remote areas with harsher weather conditions. In those cases, a customer would choose cameras with lower temperature specs and larger heating systems. Other options may include PTZ cameras with wipers to ensure constant and clear visibility along the perimeter.

The proper perimeter surveillance device is also the perfect complement to guards or security personnel either personally patrolling grounds or located in a command center. Perimeter cameras can be used for live operator viewing, virtual guard tours or perimeter sweeps, working in conjunction with AI analytics. The AI function can initiate a handover to security staff, alerting them to check an area if motion is detected in a certain zone.

For example, Hanwha’s PTZ motion detection hand-over feature allows an IP PTZ camera to zoom into a pre-set location once an alarm triggers from another camera on the same surveillance system. This feature improves system efficiency by decreasing the reliance on a security guard or system operator to track events, and increasing the likelihood critical events in a surveillance area are captured and recorded.

Multi-sensors, Multiple Applications
Multi-sensor cameras are emerging as key elements of perimeter surveillance, especially for the ability to cover one large area from one installation. Using one multi-view camera instead of several not only helps teams do their jobs more effectively, but also creates a more attractive and welcoming environment by not having as many cameras visible.

A multi-sensor camera’s ability to look left and right, as well as straight down is useful along a perimeter, and provides the flexibility of choosing from multi-view, 180-degree view, 270-degrees or 360-degrees to ensure there are no blind spots in an organization’s perimeter security monitoring.

Certain types of facilities may have specific needs for perimeter surveillance. For example, a school often needs to monitor entry and egress points, different wings of a building, or exterior doors that are only fire exits or loading docks and typically do not have people using them regularly. Again, that is where multi-sensor camera can come in handy, being able to accurately see which doors people are using.

In the case of critical infrastructure facilities – power stations, utilities, pharmaceutical or food manufacturing – it is important to ensure 24/7 monitoring in any weather or lighting condition.

Even in these situations, an organization still needs to see anything coming over their fence or onto a property. One technology that traditionally has been priced out of reach for many customers but is now more affordable for widespread perimeter deployment is thermal technology.

Thermal technology is best suited for areas where there is low light or no light, but security teams still need to track people or vehicles and discern objects like animals from long range in challenging areas, during day or night, in rain or fog. Cameras with thermal technology can also detect temperature changes in objects against their background.

With thermal, or in the case of bi-spectrum cameras where you have a thermal and visible sensor, a security team can accurately see what is happening along a perimeter, extremely beneficial for large facilities with large perimeter areas to cover.

Any perimeter surveillance technology needs to integrate seamlessly with security operations centers located in either buildings or elsewhere on property grounds. How that is done depends on the size of the perimeter, the number of cameras installed along a wall or fence, and also the number of dedicated guards or security teams and when they are deployed.

Larger campuses with more expansive facilities will usually have dedicated guard stations per building with dedicated workstations where the cameras are always on and monitoring any activity picked up along the perimeter. Often, these stations are operated with joystick interface to track subjects and fine-tune what the perimeter cameras are seeing.

Finally, defining a “perimeter” is important since it may not always be a wall or a fence. It depends on the environment where a facility sits. A corporate campus in a suburban office park may not have a hard wall or even a fence, compared to an urban area where there is usually a structured perimeter.

Some manufacturing facilities are also often located in remote areas that may not have a hard fence, or large area like an airport or shipping terminal may employ a combination of chain link fences, walls, or spots where there is no physical perimeter. There are complementary perimeter surveillance solutions that can be deployed to detect movement along the boundaries of an organization that still deliver the right combination of security, deterrence, efficiency.
Increasingly, organizations are realizing that the right video perimeter surveillance technology is an important investment that will pay off significantly over time.

For further information on Hanwha’s Video Surveillance Solutions, visit

This article originally appeared in the March / April 2023 issue of Security Today.


  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

  • Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

    Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Mobile Applications Are Empowering Security Personnel

    From real-time surveillance and access control management to remote monitoring and communications, a new generation of mobile applications is empowering security personnel to protect people and places. Mobile applications for physical security systems are emerging as indispensable tools to enhance safety. They also offer many features that are reshaping how modern security professionals approach their work. Read Now

Featured Cybersecurity


New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3