Is Radar the Missing Piece to Your Perimeter

Yaron Zussman

Traditional perimeter solutions that provide physical and visual barriers to unauthorized access to a site include long stretches of fencing, gates and other perimeter technologies, including video surveillance. These have been the mainstays offered by integrators for applications ranging from critical infrastructure facilities and data centers to car dealerships

Best practices dictate, however, that the optimal defense incorporates a layered approach, building on these exterior physical and visual barriers to include inner rings of detection, intelligent analysis and alerts to create a secure perimeter. Ideally, a perimeter security strategy should incorporate multiple tiers, beginning with a visual deterrent and an audio warning for the intruder. In addition, it should include early detection of a potential threat and then analysis of that threat to assist security staff in determining the most appropriate response.

Radar detection systems have evolved in recent years, becoming the go-to solution for reliable, cost-effective perimeter protection for facilities traditionally underserved by video surveillance and fences alone. Here are three reasons why radar is an important piece of a perimeter security plan.

Threat Analysis Using AI Radar Systems
Radar has been a go-to technology as part of a “rings of defense” strategy for many years, most heavily used in industries such as utilities, airports, military installations, and similar applications. Traditional radar technologies have provided superior detection of an incoming target or potential threat. However, as radar has been unable to provide any additional intelligence about the threat - whether human or animal, friend or foe - it has remained as one of the outer, more utilitarian circles of protection.

Enter AI, which is transforming security technologies, including radar solutions, by providing the ability to detect, analyze and notify the threat. Building on the multi-technology solutions approaches, modern radar solutions combine superior radar detection in all weather conditions with PTZ cameras and AI-infused software that determines whether the detected threat is local wildlife or a potential intruder.

Once a potential target is identified by the radar, a PTZ camera is directed to the location of the target. After the AI-video classifier classifies the target as human, animal, vehicle, or bike, software integrated into the customer’s video management platform can send an alert to operators of a verified event needing further identification.

Radar Reduces the Total Cost of Ownership for Integrator and End-user
The combination of radar, PTZ and AI-enabled software allows for a highly reliable system that provides many benefits to integrators selling perimeter security solutions. The technology enables integrators to provide a system that is often significantly less expensive than video surveillance perimeter systems – both in upfront capital costs as well as the total cost of ownership – and is lower in nuisance and false alarms due to the reliability of detection and classification of potential threats.

A single radar unit and PTZ camera combination can provide a wider field of view for detection and replace multiple cameras using video analytics. On average, one radar/PTZ installation can replace as many as 10 fixed cameras. This can translate to significant cost savings when considering the infrastructure requirements of large perimeter camera deployments — cameras, poles, cabling and communications and power infrastructure. This is in addition to high installation costs and complexity, such as trenching and specialized equipment required to mount cameras on tall poles, such as man-lifts or other heavy machinery.

For end users, fewer cameras also mean fewer bandwidth costs and equipment maintenance expenses over the lifetime of the system. These costs can be particularly onerous for organizations with multiple locations, some of which are in remote areas.

Radar Detection Reliability Reduces Truck Rolls
Traditional video analytics are more susceptible to adverse lighting and environmental conditions, such as shadows, cloud movement, rain, and wind gusts, that can falsely interpret potential threats and trigger multiple false alarms. This makes calibration of the cameras and analytics difficult and can translate into an ongoing project for integrators, requiring multiple onsite visits to resolve issues. As a result, integrators and end users face higher costs, which, in turn, can negatively impact their satisfaction with the system.

Moreover, fewer pieces of hardware required for radar solutions also alleviate ongoing maintenance burdens for integrators, which often require software and firmware updates for cameras and other network infrastructure. A smaller number of hardware complement reduces replacement costs and the probability of equipment failure.
   
Addressing Common Challenges for Integrators
There are, however, some common challenges that integrators can face when incorporating radar into a customer’s existing perimeter solution, which can easily be overcome with training and consultation with the radar solution vendor.

Proper deployment is key to achieving the most accurate detection results. Radar deployment has a somewhat different logic than other perimeter technologies such as camera deployments or fencing installations. In addition to line-of-site, the radar devices also require careful positioning. This challenge can be resolved by providing proper training to integrators in advance, performing an initial site survey, and using site-design tools while consulting with the radar experts to validate the deployment.

Radars also need to be integrated into the customer’s existing security system and preferred security software ecosystem. Modern radar solutions that also employ PTZ cameras need to be able to easily integrate into these existing software platforms using standard solutions and offering quick support for implementing new integrations on demand or allowing the integrator to implement the integration himself based on the software’s API/SDK.

Integrators should ensure they are managing customer expectations appropriately. While radars are almost always the superior solution they are not “magic” boxes that can detect in any environment, such as through walls and heavy fauna, and provide absolutely zero false alarms in all conditions. Both the customer and the integrator must undergo basic training on radar technology to understand its advantages and where it is suitable for efficient and effective deployment.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3