Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Perimeter Protection Products Get Renewed Look

August 22, 2002
Products that increase security outdoors and around facilities are in greater demand today. Security buyers also are adding more video surveillance while extending electronic card access controls farther out from sensitive entrances of facilities.

Outdoor and perimeter detection, an increasingly essential line of defense since the tragedies of September 11, means even facilities that were traditionally heavily laden with security systems have stepped up a notch.

There are various product and technology approaches, according to outdoor and perimeter protection system manufacturer Senstar-Stellar of Fremont, Calif.

Outdoor security sensors detect intruders as soon as they enter a protected area and before they can gain access to people or valuable assets. Outdoor sensors can be used either to complement indoor security sensors or as primary security in situations where indoor security is not feasible. Outdoor sensors face unique challenges: temperature extremes, rain, snow, animals, blowing debris, seismic effects, terrain and traffic, just to name a few.

Covert Approaches

What security experts call “vulnerability to defeat” characteristics of different sensors are important to consider. Covert sensors obviously make them difficult to avoid and less subject to vandalism. Some perimeter product systems provide an imposing appearance for a deterrent effect. Volumetric sensors create a large invisible detection field that makes bridging difficult.

For example, Senstar-Stellar’s Intelli-Flex line is a microphonic intrusion detection system for outdoor, fence-mounted applications. By analyzing signals generated by the minute flexing of a proprietary triboelectric coaxial sensor cable, Intelli-Flex detects an intruder cutting through, climbing on or lifting the fence fabric.

There are other approaches. Check elsewhere in this article for a thumbnail description of each type of typical outdoor sensor approach.

There is also a strong integrated systems approach to outdoor perimeter protection.

For instance, Senstar-Stellar markets StarLED 200, a solid-state infrared LED illuminator that creates light which, while invisible to the naked eye, is visible to standard infrared sensitive security video cameras.

So, with or without such illuminators, video security cameras can play an important role in outdoor security. For one thing, video can verify whether or not alarms reported by intrusion detection sensors are valid intrusions.

Outdoor protection products have come a long way.

More Effective

Reliability was a potential stumbling block for the use of outdoor protection in the past, says Ephraim Rein of Crow Electronic Engineering, Fort Lee, N.J. “Previously, one of the biggest problems with outdoor technology was false alarms,” he says. Now, there are a number of approaches and products that diminish the problem. One: triple technology, combining microwave and dual-technology passive infrared. Since September 11, users are looking for more sophisticated types of security, with cost sometimes taking a back seat to proven reliability, Rein says.

Patrick O’Brien, Security Resources in Honolulu, says unique new installation applications have emerged, and facilities with minimal coverage have bolstered their existing security as well. Some of these applications are obvious: government and military facilities as well as infrastructure utilities. “We’re working with the military and the Navy to protect bases, naval areas and shipyards. In addition, we’re protecting key access points at water pumping stations, and protecting against biochemical hazards, as well,” he says.

Security Resources at times takes a multi-product approach to outdoor and perimeter protection, beyond the typical or traditional perimeter sensors..

He uses outdoor motion sensors, card access and other security integrated with alarm and video monitoring. Smart cards and fingerprint and facial recognition, which he says have dropped in price, are seen more frequently now. “Technology has become more cost-effective and we’re doing a lot more remote monitoring. This keeps users in touch with facilities that may be located a distance away. Wireless transmission and communications are also emerging more often for high-end outdoor perimeter applications,” O’Brien says.

Systems integrator Ener-Tel, San Angelo, Tex., has several high-profile jobs including protection of a municipal water-treatment facility and security for a local river authority organization. According to Ener-Tel’s Jon Allen Richardson, many applications have surfaced that focus on a facility’s perimeter. “We use fence detectors and outdoor microwave-dual technology sensors and pan-tilt-zoom cameras, often coupled with a connection to a remote network for surveillance or supervision.”

Keeping People Out

In many applications, users focus on keeping unwanted intruders from gaining access to specific areas within a facility as much as alerting to intruders, says Larry Thomas of Protection Technologies Inc., Reno, Nev. This is especially true of infrastructure. “There’s definitely a much greater awareness of security, especially for water-treatment plants, utilities, railroad hubs and bridges.”

Thomas says that the nature of the facility and how much the user has to spend will often dictate the security that’s deployed. “The end user is trying to secure the outdoor perimeter of a facility and do it the best way they can because it is the first line of defense. When you specify detection outdoors, reliable protection can be costly, so some may opt to target key vulnerable areas only, such as chemical storage tanks, for example.”

Not only are microwave, dual-technology and other sensors in the perimeter protection spotlight, but there’s renewed activity and interest in fiber optic intrusion systems, especially as some perimeter fencing systems require upgrading as well as fiber optics as a better way to send security data.

At CompuDyne Corp.’s Fiber SenSys Div. in Beaverton, Ore., Martin Roenigk firmly believes that “until we can solve perimeter fencing and access problems, nuclear plants, refineries, reservoirs, chemical plants and even our airports are still open to security breaches.” Interestingly, a CompuDyne subsidiary and installing company, Quanta Systems Inc., Gaithersburg, Md., is working on the installation of a fiber optic shoreline intrusion detection system along the Atlantic coastline. The system uses a marine-based radar system integrated with thermal imaging cameras and custom software to detect and display intrusion attempts originating from the water, allowing security personnel to track movement on the water and take appropriate action prior to the threat reaching land.

Detection and Communication

According to Duane Thompson of Fiber SenSys, the company’s fiber optic alarm sensor cabling system is useful for perimeters such as pipelines and also to monitor the structural integrity of a building, for example. Another product: fiber optic cabling “co-located” with secured communications lines to prevent tampering and access to potentially sensitive data and information.

At the recent Americas’ Security Expo in Miami, IFS International Fiber Systems of Newtown, Conn., showed off its Orion Fiber Optic Communication System which can continuously receive up to 11,000 video signals or view up to 128 real-time video channels at any time. The system can also handle data and audio communication. The system boasts photo quality MPEG2 and 19-mile coverage that can cover a good chunk of perimeter.

IFS technology underlines the growing importance of video surveillance outdoors.

A spokesperson at Ademco Video, Syosset, N.Y., agrees. He says, “Technology has done wonders for outdoor CCTV. Many cameras feature extremely low light sensitivity and infrared technologies that allow monitoring in environments once considered extremely difficult or nearly impossible. Premises monitoring can include parking lots, fences, or the grounds of a facility where you want to observe movement patterns or activity such as theft or vandalism, and even potential terrorist attacks.”

Because of September 11 and the new emphasis on homeland security, it’s obvious that there is some appeal to more perimeter protection. Jeanne McGuire of Perimeter Products Inc., Fremont, Calif., however, feels “it’s probably too early to see a lot of increased activity. Once people have completed their risk assessments and determine how much they have to spend, we’ll see more emphasis on perimeter security,” she says. “We know that certainly there is increased activity from those entities that really had little or no interest in exterior detection systems before,” she says.

Solar-powered Units, Too

Adds Bob Houston of Aressco Technologies Inc., Homestead, Fla. “Nuclear power plants, dams, water-treatment plants and reservoirs, airports, seaports, cargo terminals, areas monitored by the U.S. Border Patrol, embassies, government buildings, military installations prisons and other sites that require heavy security may now have a better opportunity against breaches of their perimeters and other protected areas,” he says. The company’s wireless, solar-powered perimeter security system has been installed at a Federal Reserve banking facility, electric distribution plants, airports and other locations.

SIDEBAR: Outdoor Sensors

Look at sensors in four groups, according to Senstar-Stellar of Fremont, Calif.

Volumetric Sensors

Generate an invisible detection field to locate intruders. Field of detection is invisible, so it’s very difficult to evade. Immune to most environmental conditions; often used in sterile zones; and may be totally covert.

Fence-Mounted Sensors

Are above ground detection sensors attach to an existing fence or wall. Detection when intruder disturbs detection field or when vibration due to cutting or climbing.

Video Motion Detection Sensors

Analyzes video output signal to create the detection field. Video also provides additional information to help identify the source of an alarm and whether or not it is valid.

Barrier Sensors

A two-in-one security option: a barrier to intrusion and a sensor system for detection. Taut-wire sensors are an example of a barrier sensor. An almost zero false alarm rate; virtually no environmental limitations.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Pre-ASIS: A First Look at Some New Products

    See More
  • Padlock on fence

    Redrawing the line of perimeter protection

    See More
  • What to Look for in Travel Security and Executive Protection Services - Security Magazine

    What to Look for in Travel Security and Executive Protection Services

    See More

Related Products

See More Products
  • Physical-Security-and-Envir.gif

    Physical Security and Environmental Protection

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!