Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Video Marches Around the Perimeter

By Bill Zalud
November 1, 2008


At the edge” camera decision-making, less expensive cameras, video motion detection, IP and wireless applications all come together to let security leaders implement security video as a perimeter protection solution.

   
Although security video is used for many purposes, its most common application is for surveillance and alarm assessment. Systems make it possible for fewer individuals to maintain a constant watch, record and archive activities under surveillance, and provide a visual record that can be used to document activities for investigative use.




THE CHALLENGE

Video cameras comprise only one component of a perimeter protection system that includes smart fences, buried cable, lighting and other technologies. Following trends in other markets, the cost of cameras continues to fall while functionality increases due to the availability of more powerful and less expensive electronic components. As a result, low-cost, high performance cameras are widely available creating the opportunity for large scale exterior surveillance applications.

   
Security video systems configured with hundreds of cameras have become commonplace. IT network technology and low-cost hardwired and wireless IP networked video cameras, with embedded video compression technology, have taken hold to mitigate the escalating communications and electrical infrastructure and network administration costs.

   
Traditional CCD and CMOS video cameras require illumination, either from visible or from very near infrared light sources in order to produce a usable display picture. Reproducing a usable image becomes exceedingly difficult as illumination decreases, which creates the need for an exterior lighting source. Yet the cost of these systems is considerable and for many applications completely impractical such as borders, waterway areas, city-wide surveillance, power generation, refinery perimeters and airport applications. In other situations, lighting can either offend local residents or draw unwanted attention.

   
Likewise, administration and infrastructure costs for video and network equipment are considerable. Multiple IP addresses and dynamic network configurations require management. Network security requires constant and vigilant monitoring, and user demand for network speed and performance requires investment in system infrastructure to ensure the bandwidth is there to support the system.

   
One solution for using security video on the perimeter: Integrated electro-optical surveillance such as systems from Axsys Technologies and comprised of passive, long-range thermal imaging video cameras with companion bore-sighted visible spectrum video cameras mounted on precision pan and tilt positioning.



PORT PERIMETER SECURITY

As another example, at the Panama Ports Company (PPC), a member of the Hutchison Port Holdings, which operates 255 berths in 44 ports across the world., security leaders sought an overall high resolution image quality, low maintenance system able to withstand the weather conditions of an ocean environment and the ability to survey wider areas in greater detail with each individual camera.

   
During an initial phase, more than 50 Mobotix IP cameras were installed, typically at 300 feet, with two cameras on each crane. The cameras are aimed at entrances and remote perimeter areas where manual surveillance would have been very labor intensive. The multiple configurations with the network camera, including single or dual lens, wide-angle or telephoto, day or low-light provide the flexibility to deploy the same basic camera type into a wide range of specific viewing requirements with varying lighting conditions. The video footage from the IP cameras is recorded on a server. Live video as well as recorded clips can be viewed on any authorized computer in the port facility.

   
Port officials had particular concerns related to the weather conditions of a tropical coastal environment: salty air, frequent wind-driven rain, intense heat and humidity. The cameras chosen are built to withstand extreme environmental conditions: from -30 to +60 °C (-22 to +140 °F). The fiberglass-reinforced and shock-resistant cameras protect the network cable and connections against vandalism as well as severe weather conditions.

   
With the cameras boasting both audio and video features, it’s a big advantage for PPC. “We don’t just need to see what’s going on, we need to hear it as well,” said Michael Hernandez, PPC CIO. “Our overall security and safety is dependent on having both those features.”



SIDEBAR: What Goes Up Must Come Down, Sometimes

With the growing use of security video to protect perimeters, the cameras – often megapixels, wide angles or infrareds – go high up on poles or other infrastructure.  Such installations are more costly but boast a strong return on investment. On the flip side, maintenance of the cameras way up there is more complex.

   
Security Magazine editors touring the exhibit floor at the recent ASIS International discovered a unique solution. From Videolarm, a lowering arm eliminates the need for lift trucks and reduces safety concerns. With its self encased motorized system, the Lowering Arm is capable of lowering and raising most camera system enclosures with a simple yet secured operation. The system is factory-wired, and incorporates an augmented cabling system which prevents long cable runs and wire entanglements.


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Guy Grace

    Retrofit Fits the Bill for Outdated Security Technology

    See More
  • ip feat

    Measuring the Next Step in IP-Based Access Control

    See More
  • Multi-tasking – It’s in the Cards

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing