Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

The 5 D’s of Outdoor Perimeter Security

By Keven Marier
Chain link fence close up
Photo by MattCL on Unsplash

Photo by MattCL on Unsplash

March 5, 2012

Outdoor perimeter security is an often-overlooked area of physical security design that can dramatically improve the effectiveness of a facility’s security system. If you are involved in designing or managing physical security the infrastructure located in the buildings likely consumes the majority of your budget. However, small investments in outdoor perimeters can provide significant protection to the building’s assets well before the other, more costly, measures are encountered. These outdoor perimeters can serve as a valuable line of defense for a physical security plan because they add distance, time and scale to a physical security plan that cannot be achieved within the building itself.  If designed correctly, outdoor preventative measures can reduce the cost of building security. In all physical security designs outdoor perimeters should be included as a supportive element.

Read more about perimeter security

Read more about crime deterrence

To correctly utilize the outdoor perimeter requires that the security plan take a holistic and complete assessment of the outdoor and indoor areas. A holistic perimeter reference design is the 5D’s of perimeter security. This design focuses on a key objective for each specific perimeter, and layers the perimeters from outside the facility to inside the secured buildings. The 5D’s starting from the outside are: Deter, Detect, Deny, Delay and Defend.  

The 5D perimeter protection design can reduce the overall cost of a facility’s security system and improve the effectiveness of the plan. Focusing the security objectives at each perimeter layer on a specific task, and designing the system in such a way that takes advantage of special purpose security systems achieve this. The following provides an overview of the key principles behind a 5D perimeter security design.

 

Deter

The deter perimeter is the farthest one from the location of the assets and is often a mix of physical infrastructure such as fences and lighting. The security objective on this perimeter is to deter the criminal from even attempting a breach of the system. Deterrence is a psychological battle, and when the security department wins, the criminal activity never starts. Applying surveillance technology along the deter perimeter typically requires the use of overt, large enclosures, which make it obvious to all approaching the perimeter that they are under surveillance. Signs saying “no trespassing” or “area under surveillance” also aid in communicating a deterrent message to unauthorized persons.

 

Detect

The detection perimeter’s security objective is to monitor large areas of space to accurately detect possible unauthorized intrusion in time to respond appropriately. Surveillance camera technology, especially megapixel cameras, is very effective as an accurate detection tool. Important objectives are the timely notification to security personnel, and having the ability to digitally or optically zoom into the area where intrusion was detected.

 

Deny

The objective at the deny perimeter is to keep unauthorized persons out, while allowing authorized persons to enter. To perform this function the deny perimeter typically has access control technology or a manned security gate at the point of entry. The intention of surveillance at this point is to provide visual verification to the biometric or card access system.

 

Delay

The delay perimeter’s objective is to slow down an active intrusion enough to force the intruder to give up, or allow the security team to respond. Often, interior locking doors or other physical barriers are used to slow down the intrusion. Surveillance cameras can be used inside the delay perimeter to provide situational awareness and measure the effectiveness of the delay countermeasures.

 

Defend

The defend perimeter is typically a security personnel response that attempts to apprehend the intruder.  Surveillance is used at this perimeter to record the apprehension and determine the effectiveness of the response.  This final perimeter often includes the involvement of law enforcement and typically overlaps the other perimeters.

 

Keys to Outdoor Perimeters

The general rule is that the farther away from a secured building the more expensive are the security measures. This holds true for cameras, sensors and access control systems. Designing outdoor systems requires detailed upfront planning because of the wide range of operating conditions to which the security systems will be exposed. For cameras, lighting and weather conditions are the biggest problems the system will have to overcome through infrared light and motion sensors. Holistic design processes that combine both indoor and outdoor perimeters, similar to the 5D’s, will provide the most effective physical security systems.   

KEYWORDS: crime deterrence outdoor security perimeter security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Software in the Middle of the New Physical Security Economy

    See More
  • How to Measure the Effect of Megapixels

    See More
  • Studying the Pros and Cons of Proprietary Wireless Surveillance

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing