What not to do: Key ‘don’ts’ in perimeter security systems

SMART Alarm, Intrusion & Perimeter Detection Perimeter Security, Alarms & Intruder Detection

Much has been said and written in the past, by me and other well-known and respected specialists in the electronic security industry, on the hows, the whats, and the whys – basically, all that can be said about the expected design outcomes in addressing the identified risk has been said. We even have a crystal ball called artificial intelligence that gives us a proverbial telescope to ever so slightly see into the future.

However, in this article, we will unpack the potential pitfalls leading up to the implementation of said solutions. Many have paid school fees, and as an industry, it is not only crucial, but also imperative, that we share this knowledge. By doing so, we can better serve the very customers we are asked to protect with physical and virtual security technologies and foster a collaborative and supportive community in the process.

For instance, perimeter security is the first line of defence in safeguarding any property, be it a residential estate, farm, higher education, commercial building, or industrial facility. A well-designed perimeter security system can deter, detect, delay and/or deny intruders, providing crucial time for the response teams to act and defend, if necessary. However, implementing such a system requires meticulous planning and consideration of various factors, including the ‘don’ts’, when crafting a turnkey solution. While a comprehensive discussion would fill many chapters, let us focus on the essentials for now.


Johan I. van Wyk.

1. Do not overlook environmental factors

Environmental factors can significantly impact the performance of a perimeter security system. For instance, heavy foliage, uneven terrain, or harsh weather conditions can cause false alarms or reduce the effectiveness of certain sensors. During the planning phase, consider how these factors will affect the system and choose equipment designed to operate under such conditions. Ignoring environmental factors can lead to an inefficient and unreliable security system.

2. Do not ignore the importance of being able to see

Yes, see. Certain environmental factors can make an optical camera go blind, so to speak, compared to thermal cameras, which work best in the most adverse weather conditions. Electrified fences that do not have a computerised system with an overview display of fence zones and the state thereof, are blind. I once asked a potential new client with an existing system if their electrified fence is working, and the answer was, ” Yes, because it is making a ‘tick-tick’ sound, so it must be working.” The answer was actually ‘no’ because the tick-tick sound, otherwise known as pulsating, is not an indication of an optimally working electrified fence, and to name but only one factor, alarm generation and notification of said, or rather the lack thereof, was a reality.

3. Do not rely solely on one type of security measure

Relying solely on one type of security measure, such as fences or cameras, is a common mistake. A fence without surveillance can be breached without detection, while cameras without physical barriers can only provide a record of a breach (if not remotely monitored) rather than prevent it. Always combine physical and electronic measures with off-site CCTV monitoring services to create a comprehensive security solution.

4. Do not neglect cybersecurity

Cybersecurity becomes increasingly crucial as perimeter security systems become more integrated with digital technologies. Networked cameras, access control systems, and other IoT devices can be vulnerable to cyberattacks if not correctly secured. Ensure that all digital components are protected with strong encryption, robust firewall settings and regular software updates. Neglecting software updates can lead to system breaches, data theft, or even complete system failure. Trusted brands are certified and accredited to international standards in this regard. Cybersecurity and associated risks are fast becoming a much more significant threat than ever, and everyone is at risk if the basic rules are not followed.

5. Do not forget about emergency procedures

Even the best perimeter security system, although difficult, could potentially be breached. Therefore, it is vital to have a well-defined emergency procedures plan in place for when a breach does occur. This includes clear communication protocols, immediate response actions, and coordination with local law enforcement. Regularly train your security personnel on these procedures to ensure a swift and effective response in case of an emergency.

6. Do not compromise on training

The effectiveness of a perimeter security system largely depends on the people operating it. Skimping on training for your security personnel is a critical mistake. Ensure that your team is well-trained, not only in operating the equipment, but also in recognising and responding to potential threats. Regular training sessions and drills will prepare your team to use the system to its full potential.

8. Do not underestimate the importance of regular reviews

Perimeter security is not a set-it-and-forget-it solution. Regular reviews and updates to your security measures are necessary to adapt to changing threats and technological advancements. What worked a few years ago might not be sufficient today. Regularly assess your security system’s effectiveness and make necessary upgrades or changes to stay ahead of potential threats.

9. Do not trust the wrong advisers

The furniture and appliance retailer, Joshua Doore, had a television advert many years ago with the slogan, ” You’ve got an uncle in the furniture business - Joshua Doore.” Great marketing and slogan for the furniture business because most of us (older folk) can sing that jingle now that you have read it. This is not at all applicable for addressing security and risk. A common occurrence I have personally been exposed to over the last 30 years doing what I do, is the comments like, ” I have an uncle that has a friend that knows someone that used to be in the security industry, that knows precisely how we must mitigate our risk, and he will do it for us very cheaply as well ...”.

The simple fact is one cannot be the best and the cheapest, nor can the solution be.

10: Do not buy a security system twice

The most expensive security system you can buy is the one you buy twice – do not do it, period.

Implementing an effective perimeter security solution requires careful planning, the right technology, and ongoing maintenance. Remember, the goal is not just to build a barrier, but to create a dynamic, adaptable security solution that can respond to evolving threats and ensure long-term safety.

For more information, contact Fang Fences & Guards, +27 21 905 1204, [email protected], www.fang.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Hadeda-proof sensor technologies
Reditron Perimeter Security, Alarms & Intruder Detection
SMART Security Solutions highlights Takex, represented locally by Reditron, speaking to Gordon Moore, Reditron’s National Sales Director, and Mark Crichton, Takex Channel Manager for South Africa.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...