Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Video Marches Around the Perimeter

By Bill Zalud
November 1, 2008


At the edge” camera decision-making, less expensive cameras, video motion detection, IP and wireless applications all come together to let security leaders implement security video as a perimeter protection solution.

   
Although security video is used for many purposes, its most common application is for surveillance and alarm assessment. Systems make it possible for fewer individuals to maintain a constant watch, record and archive activities under surveillance, and provide a visual record that can be used to document activities for investigative use.




THE CHALLENGE

Video cameras comprise only one component of a perimeter protection system that includes smart fences, buried cable, lighting and other technologies. Following trends in other markets, the cost of cameras continues to fall while functionality increases due to the availability of more powerful and less expensive electronic components. As a result, low-cost, high performance cameras are widely available creating the opportunity for large scale exterior surveillance applications.

   
Security video systems configured with hundreds of cameras have become commonplace. IT network technology and low-cost hardwired and wireless IP networked video cameras, with embedded video compression technology, have taken hold to mitigate the escalating communications and electrical infrastructure and network administration costs.

   
Traditional CCD and CMOS video cameras require illumination, either from visible or from very near infrared light sources in order to produce a usable display picture. Reproducing a usable image becomes exceedingly difficult as illumination decreases, which creates the need for an exterior lighting source. Yet the cost of these systems is considerable and for many applications completely impractical such as borders, waterway areas, city-wide surveillance, power generation, refinery perimeters and airport applications. In other situations, lighting can either offend local residents or draw unwanted attention.

   
Likewise, administration and infrastructure costs for video and network equipment are considerable. Multiple IP addresses and dynamic network configurations require management. Network security requires constant and vigilant monitoring, and user demand for network speed and performance requires investment in system infrastructure to ensure the bandwidth is there to support the system.

   
One solution for using security video on the perimeter: Integrated electro-optical surveillance such as systems from Axsys Technologies and comprised of passive, long-range thermal imaging video cameras with companion bore-sighted visible spectrum video cameras mounted on precision pan and tilt positioning.



PORT PERIMETER SECURITY

As another example, at the Panama Ports Company (PPC), a member of the Hutchison Port Holdings, which operates 255 berths in 44 ports across the world., security leaders sought an overall high resolution image quality, low maintenance system able to withstand the weather conditions of an ocean environment and the ability to survey wider areas in greater detail with each individual camera.

   
During an initial phase, more than 50 Mobotix IP cameras were installed, typically at 300 feet, with two cameras on each crane. The cameras are aimed at entrances and remote perimeter areas where manual surveillance would have been very labor intensive. The multiple configurations with the network camera, including single or dual lens, wide-angle or telephoto, day or low-light provide the flexibility to deploy the same basic camera type into a wide range of specific viewing requirements with varying lighting conditions. The video footage from the IP cameras is recorded on a server. Live video as well as recorded clips can be viewed on any authorized computer in the port facility.

   
Port officials had particular concerns related to the weather conditions of a tropical coastal environment: salty air, frequent wind-driven rain, intense heat and humidity. The cameras chosen are built to withstand extreme environmental conditions: from -30 to +60 °C (-22 to +140 °F). The fiberglass-reinforced and shock-resistant cameras protect the network cable and connections against vandalism as well as severe weather conditions.

   
With the cameras boasting both audio and video features, it’s a big advantage for PPC. “We don’t just need to see what’s going on, we need to hear it as well,” said Michael Hernandez, PPC CIO. “Our overall security and safety is dependent on having both those features.”



SIDEBAR: What Goes Up Must Come Down, Sometimes

With the growing use of security video to protect perimeters, the cameras – often megapixels, wide angles or infrareds – go high up on poles or other infrastructure.  Such installations are more costly but boast a strong return on investment. On the flip side, maintenance of the cameras way up there is more complex.

   
Security Magazine editors touring the exhibit floor at the recent ASIS International discovered a unique solution. From Videolarm, a lowering arm eliminates the need for lift trucks and reduces safety concerns. With its self encased motorized system, the Lowering Arm is capable of lowering and raising most camera system enclosures with a simple yet secured operation. The system is factory-wired, and incorporates an augmented cabling system which prevents long cable runs and wire entanglements.


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • perimeter-security-freepik1170x658v9067.jpg

    Around the clock protection: How steel fencing secures perimeters

    See More
  • DHS Works with Partners Across the Country and Around the World to Assess the Nation's Cyber Incident Response Capabilities

    See More
  • social-snaptrends

    The Social Media Security Problem for Corporations around the World

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products

Events

View AllSubmit An Event
  • May 7, 2026

    Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

    In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing