Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Al fresco Surveillance – Know Outdoor Dangers

April 1, 2007
A White Paper lists outdoor application problems using security video cameras built for use indoors. New technology finds success with these cameras, which can also bundle in analytics and geographic calibration. Photo courtesy of SightLogic

For perimeter monitoring, outdoor video surveillance provides information not available with other technologies.

But there is a basic challenge -- cameras that make outdoor surveillance possible are primarily designed for indoor use. The typical solution for outdoor use is to put the camera in a weatherproof enclosure; but this does not begin to solve all the problems, contends a White Paper written by Warren Simonsen of Sandra Jones and Company.

Bad illumination, shadows, rain and snow, temperature extremes, strong winds, large areas to cover, limited network connectivity and potential network vulnerability all can beat down effectiveness outside.

The White Paper lists problems and holes that need solving and filling. Understanding outdoor video challenges will make chief security officers and security directors more eager for cameras built for the great outdoors.
 

THE LIGHTING PROBLEM

Bright sunny days and cloudy moonless nights are extremes typical for outdoor surveillance. The sun moves from east to west all day, creating changing shadows and potential glare problems; lighting is always dynamic. Software that would attempt to detect moving objects or people needs to ignore shadows while still detecting movement in those shadows. Light reflections are common near large bodies of water or even the simple fountain or retention pond found in many industrial parks. These moving reflections often can generate false motion alarms in many systems. Simple systems attempt to eliminate this problem by masking the frame portion where this “motion” occurs. But the result is a hole in the system where motion is no longer detected at all.
 

THE WEATHER PROBLEM

Rain, snow and temperature extremes are hard on electronic equipment. They are the reason indoor cameras are placed in special enclosures when used outside. But even if the camera electronics are protected, temperature and precipitation can create a fog on the window the camera looks through, dramatically reducing the field of view.
 

THE PROBLEM WITH MOTION

Anyone who has fired a gun or looked through a telescope knows that at long distances a small change in angle at the source makes a big difference at the target. The same problem occurs with cameras mounted outdoors; the further an object is from the camera, the more a small movement of the camera appears to be large motion of the object. Wind moving a camera, even a little, can generate many false motion alarms. Video analysis software assumes that the camera is stable and not moving and wind introduces error making it difficult if not impossible to track small objects a long distance away.
 

THE COVERAGE PROBLEM

Longer distances and large areas are characteristics of surveillance outdoors. Usually the more area a camera can cover, the fewer cameras are needed to cover the same area. Concerning field of view, distance to the target and image resolution determine the minimum size of a detectable target, so the real key to fewer cameras is more resolution. Fortunately mega-pixel cameras are becoming commonplace today, but higher resolution is only effective if the previously described problems of lighting and stability are solved.
 

THE BANDWIDTH PROBLEM

High resolution video generates a lot of video data. Sending that data from a camera to a recorder or computer for analysis requires a high-speed network. However, high-speed, hardwired network connections are rare at outdoor locations. The common solution for limited network bandwidth is to limit the resolution or frame rate but that reduces the available data and, as a result, reduces the effectiveness of the coverage. Even if a high-speed network connection is available, most network administrators limit the amount of traffic dedicated to video surveillance.
 

THE NETWORK PERIMETER HOLE

At this time, many chief information officers have established the perimeter of their network as the first line of network defense. Firewalls and limited Internet access are used to separate the dangerous outside world from the hopefully safer internal network. Assuming a high-speed network connection is available to the camera providing outdoor surveillance, this introduces another potential problem. Any connection to the outside world must be considered a potential external network access point. Outdoor cameras connected to the network must be considered as external devices and managed accordingly.
 

THE INSTALLATION NIGHTMARE

As if these challenges were not enough, the solutions to these problems can be equally challenging as a CSO’s integrator attempts to manage the interactions between light levels, camera resolution and frame rate, motion sensitivity, alarm thresholds, camera calibration and bandwidth limitations. Finding the optimal settings can be frustrating and demand a knowledgeable expert.

To solve the problems and plug the holes, the White Paper urges CSOs and systems integrators to consider cameras built specifically for outside use.
 

About the Source

Security Magazine thanks Warren Simonsen of Sandra Jones and Company, writer of the White Paper. Simonsen’s work was under the direction of Deepam Mishra of SightLogix. For more information, e-mail Deepam at dmishra@sightlogix.com
 

The barb style used in this triple strand rapid deployment unit is commonly referred to as “short.” This material was specifically designed for military applications and is considered a “delay” barrier. Although very hazardous, it is primarily designed for maximum entanglement.

SIDEBAR: When You’re Not Kidding Outside

Some chief security officers at sprawling campuses aren’t pussyfooting around anymore. They are using barriers, bollards and barbed tape. The challenge: such solutions take time to install and, for barriers and bollards, are mostly built into a road or entrance.

Theirs is a twist on barbed tape though – triple strand rapid deployment systems.

One source, Allied Tube & Conduit, makes such a system with a tension wire core wrapped with a stamped steel strip. Just one triple strand rapid deployment unit can deploy to cover 480 feet in less than two minutes using any vehicle with fork truck attachments. Deployment requires only two people and recovery can be accomplished with three people in less than twenty minutes, an Allied Tube & Conduit executive told Security Magazine. These solutions incorporate two 30-inch concertina coils on the ground and one 60-inch concertina coil on top to provide higher security than a single strand approach.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Panasonic outdoor camera thumb

    Ease Outdoor Video Surveillance

    See More
  • Outdoor camera

    Ease Outdoor Video Surveillance

    See More
  • deblocking features of H.264

    Squeeze Play – Wonders and Dangers of H.264

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing