Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

The 5 D’s of Outdoor Perimeter Security

By Keven Marier
Chain link fence close up

Photo by MattCL on Unsplash

March 5, 2012

Outdoor perimeter security is an often-overlooked area of physical security design that can dramatically improve the effectiveness of a facility’s security system. If you are involved in designing or managing physical security the infrastructure located in the buildings likely consumes the majority of your budget. However, small investments in outdoor perimeters can provide significant protection to the building’s assets well before the other, more costly, measures are encountered. These outdoor perimeters can serve as a valuable line of defense for a physical security plan because they add distance, time and scale to a physical security plan that cannot be achieved within the building itself.  If designed correctly, outdoor preventative measures can reduce the cost of building security. In all physical security designs outdoor perimeters should be included as a supportive element.

Read more about perimeter security

Read more about crime deterrence

To correctly utilize the outdoor perimeter requires that the security plan take a holistic and complete assessment of the outdoor and indoor areas. A holistic perimeter reference design is the 5D’s of perimeter security. This design focuses on a key objective for each specific perimeter, and layers the perimeters from outside the facility to inside the secured buildings. The 5D’s starting from the outside are: Deter, Detect, Deny, Delay and Defend.  

The 5D perimeter protection design can reduce the overall cost of a facility’s security system and improve the effectiveness of the plan. Focusing the security objectives at each perimeter layer on a specific task, and designing the system in such a way that takes advantage of special purpose security systems achieve this. The following provides an overview of the key principles behind a 5D perimeter security design.

 

Deter

The deter perimeter is the farthest one from the location of the assets and is often a mix of physical infrastructure such as fences and lighting. The security objective on this perimeter is to deter the criminal from even attempting a breach of the system. Deterrence is a psychological battle, and when the security department wins, the criminal activity never starts. Applying surveillance technology along the deter perimeter typically requires the use of overt, large enclosures, which make it obvious to all approaching the perimeter that they are under surveillance. Signs saying “no trespassing” or “area under surveillance” also aid in communicating a deterrent message to unauthorized persons.

 

Detect

The detection perimeter’s security objective is to monitor large areas of space to accurately detect possible unauthorized intrusion in time to respond appropriately. Surveillance camera technology, especially megapixel cameras, is very effective as an accurate detection tool. Important objectives are the timely notification to security personnel, and having the ability to digitally or optically zoom into the area where intrusion was detected.

 

Deny

The objective at the deny perimeter is to keep unauthorized persons out, while allowing authorized persons to enter. To perform this function the deny perimeter typically has access control technology or a manned security gate at the point of entry. The intention of surveillance at this point is to provide visual verification to the biometric or card access system.

 

Delay

The delay perimeter’s objective is to slow down an active intrusion enough to force the intruder to give up, or allow the security team to respond. Often, interior locking doors or other physical barriers are used to slow down the intrusion. Surveillance cameras can be used inside the delay perimeter to provide situational awareness and measure the effectiveness of the delay countermeasures.

 

Defend

The defend perimeter is typically a security personnel response that attempts to apprehend the intruder.  Surveillance is used at this perimeter to record the apprehension and determine the effectiveness of the response.  This final perimeter often includes the involvement of law enforcement and typically overlaps the other perimeters.

 

Keys to Outdoor Perimeters

The general rule is that the farther away from a secured building the more expensive are the security measures. This holds true for cameras, sensors and access control systems. Designing outdoor systems requires detailed upfront planning because of the wide range of operating conditions to which the security systems will be exposed. For cameras, lighting and weather conditions are the biggest problems the system will have to overcome through infrared light and motion sensors. Holistic design processes that combine both indoor and outdoor perimeters, similar to the 5D’s, will provide the most effective physical security systems.   

KEYWORDS: crime deterrence outdoor security perimeter security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Keven Marier

    Software in the Middle of the New Physical Security Economy

    See More
  • sec strategies feat

    Studying the Pros and Cons of Proprietary Wireless Surveillance

    See More
  • Keven Marier

    How to Measure the Effect of Megapixels

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing