Defending the perimeter

Residential Estate Security Handbook 2016 - Vol 2 Editor's Choice, Surveillance, Perimeter Security, Alarms & Intruder Detection, Residential Estate (Industry)

“Prevailing crime continues to have a negative impact on the lives of all South Africans, often on a daily basis,” says Roy Alves, business development manager, MEA, Axis Communications. However, during Axis’ recent 20th celebration of the world’s first network camera, he noted, “Technology is creating the platform for an even higher level of intelligent surveillance.”

Heralding a significant shift in the deployment of analytical surveillance, Axis Perimeter Defender is a scalable and flexible video analytics application for perimeter surveillance and protection. An application, easily installed on the camera itself, it allows for the deployment of analytics directly on the device, providing for a much more sophisticated result with accurate detection capabilities and simultaneous support for multiple scenarios, including intrusion and loitering.

The last few years have seen Axis take enormous strides in pioneering its ability to load applications (aka apps) directly onto its cameras, in much the same manner as today’s smartphones. Developed by Axis, the i-LIDS approved Perimeter Defender application is able to be deployed across a number of its products, safeguarding a customer’s investment whilst enabling the next step in surveillance. “As with smartphones, the customer is not tied into using only this specific application,” says Alves. As requirements change, additional applications can be installed for a number of other purposes, from heat mapping through to people counting or even sound intelligence.

“Previously, field network cameras required the accompanying analytical software to be housed offsite, in a server room or elsewhere,” continues Alves. “By treating the analytic component as an application on the device itself, a whole new world of surveillance opens up.” Gone are the days of needing to dispatch security personnel every time an alarm is triggered by a camera on a perimeter wall. Devices housing analytics allow for the transmission of key events only, picking up authentic security breaches as opposed to those caused by animals, wind or other elements. Compatible across both thermal and normal optic cameras, it is saving time, it is saving money, but most importantly it is heightening security.

Prevention better than cure

While prevention is almost always better than cure, the same can be said for the world of security. “It is often too late to detect the intruder once he has already gained access,” says Alves. Key to effective safety and security lies in the ability to detect suspicious behaviour, vehicles or persons on the outside of one’s perimeter wall or boundary prior to entry.

“We work with many housing estates. By placing a camera down the fence line, one can create very distinct digital lines across the area. Instead of picking up traditional video motion detection, analytics from video sensors inside the perimeter is able to detect intrusion at the earliest possible phase, helping to pre-empt potential crime.

Ideally suited to the South African environment with its large number of residential housing estates, it is as relevant for local business parks, mining facilities or any other commercial property with a large perimeter wall. In most of these cases, entrances are manned by security personnel requiring every entrant to sign in or produce pre-approved access. “While essential, what about the perimeter wall or boundary at the back of the complex?” asks Alves. Axis’s Perimeter Defender application is providing an added advantage to those situations where the physical access control system needs to be reinforced with reliable intrusion detection.

Thermal solution

Thermal cameras, increasingly used in the commercial sector as opposed to the military, is further aiding surveillance and early detection while reducing the need for costly 24/7 lighting. Superior quality allows for detection in even the darkest situations, right down to footprints in wet grass. But it doesn’t end there. “Picture a parking lot with 20 cars,” says Alves. “Those parked for a number of hours will all emit the same heat signature, while a more recently parked car will emit a warmer heat signature, allowing for the analysis of relevant movements if needed.”

Following its launch earlier this year, Alves is encouraged by both the positive response and traction gained. “We have quite a number of business parks and commercial customers currently deploying Perimeter Defender,” says Alves, including one of Cape Town’s premium residential estates that comprises an area of 134 hectares.

“South Africa presents its own set of unique challenges, particularly with regards to climate,” continues Alves. “Extreme heat and sunlight can often complicate effective analytics making regular changes on optic imaging, requiring solutions to further reduce false alarms essential.”

When looking to the future, Alves reiterates the importance of constant innovation. “Technology is evolving daily,” he says. “The concept of a smarter, safer world is no longer a fallacy, but a reality.”

For more information contact Axis Communications, +27 (0)11 548 6780, [email protected], www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Six key security technology trends in 2025
Axis Communications SA Surveillance
Axis Communications examines some new trends for the security sector in 2025, as well as some new, old trends that are once again highlighted because of their benefit to the end user in the race to obtain optimal value from technology installations.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...