Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity & Business ResiliencePhysical Security

Redrawing the line of perimeter protection

By Sunil Mudholkar
Padlock on fence

Image via Unsplash

October 22, 2024

The concept of creating a barrier or ring around an environment for safeguarding can be traced back to ancient civilizations, where they had to protect themselves from marauding armies or spies infiltrating their settlements. Today, organizations are facing ever-evolving threats from outside and within their boundaries from terrorism, state-sponsored cyber-attacks, industrial espionage, politically driven activism — the list goes on. What’s more, the tools at the disposal of bad actors are more powerful than ever, be it the use of spies, drones, social media or the Dark Web to coordinate protests and attacks.

Irrespective of the changing attack vectors, the problem faced by those responsible for protecting the perimeter and everything within it has changed little in thousands of years. How do protectors deter, detect and defeat highly motivated lone rangers, organized groups or unmanned attempts from penetrating and attacking? It is a question complicated further by the blurring of the lines between the physical and digital worlds. Organizations now have physical and virtual perimeters to defend, and attacks may not occur in isolation. Perhaps the bad guys want to gain access to the CCTV cameras, intruder alarms or access control systems, all of which reside on the IT network. 

The concept of erecting a form of virtual perimeter fence was adopted in the 1980s by those wanting to protect IT networks. They built firewalls and endpoint protection to keep the bad guys out. However, as cybersecurity threats evolved, so has the approach to protection and it is now the turn of the physical security industry to follow the lead of their cyber counterparts by adopting zero trust models. Put simply, this means adopting a default position that anyone could present a potential threat, whether they are ‘inside’ or ‘outside’ of a designated perimeter. 

To make this work in the physical world requires organizations to embrace a more holistic approach. The good news is that transition is made easier by video management systems (VMS). 

In recent years, the VMS has evolved to be far more useful than managing the camera estate, as important as that is. Today, a VMS can be the central nervous system for the physical security operations of an organization, managing complex ecosystems that encompass a vast array of camera types and associated technologies, such as edge and server-based video analytics, as well as other core systems like access control, alarms, LiDAR and other sensors.

Using VMS as the hub for these powerful technologies creates the perfect environment for prevention, early detection (using alarm and sensor alerts, live monitoring and virtual patrols) and rapid response to perimeter breaches, regardless of where lines have been drawn. This can be augmented further with the use of incident management workflows (such as those within PSIM solutions) to give control room operators situational awareness at the perimeter and all points in between, coupled with necessary tools to make the right decision at the right time to coordinate the appropriate level of response that delivers a positive outcome. 

For example, if a movement sensor is triggered at a control zone, live feeds from the nearest cameras can be displayed on-screen. Footage can be replayed to determine the point at which the sensor was triggered and events leading up to it, at the same time persons or objects of interest can be located and tracked to determine where else they have been, what they did, and who they interacted with. At the same time, coordinated action can be taken, whether that is managing multi-agency resources dispatched to the scene, or simply making an audio warning.

Enabling those permitted to work, travel, consume and be entertained unimpeded inevitably requires a degree of trust. However, starting from a point of zero trust ultimately gives greater control over who comes in, who goes out and what they do in between, creating a safer, more secure and more productive environment. 

KEYWORDS: IT security perimeter protection perimeter security zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sunil mudholkar headshot

Sunil Mudholkar is Vice President of Products, Physical Security, Hexagon Safety, Infrastructure & Geospatial. Image courtesy of Mudholkar 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Chain-link fence with city views behind it

    The new standard in facility protection: Enhancing perimeter security

    See More
  • Perimeter protection FLIR

    Determining the right combination of visible and thermal imaging for perimeter security

    See More
  • perimeter security

    Mitigating risk with perimeter protection

    See More

Related Products

See More Products
  • Physical Security and Environmental Protection

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing