Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityVideo SurveillanceInfrastructure:Electric,Gas & Water

How to Protect Sub-Perimeters with Advanced IP Technology

By Joe Morgan
fencing-enews
December 11, 2018

By definition, a perimeter is the outer boundary, and securing that perimeter means protecting that area. Everything has a perimeter, from a large university campus to your own personal space on that campus. Law enforcement and security personnel have predefined outer perimeters that keep people either in or out in the case of an event. But you should also look within the perimeter to criticalities that could present problems.

Engineering labs storing equipment or chemicals, on-campus hospitals, dormitories and others all have boundaries of concern and importance. Known as sub-perimeters within the main perimeter, they fall into three main categories: those that require general security, those where processes must be secured, and those where security is employed for safety purposes.

For example, within a hospital on a campus, there are additional sub-perimeters that need security. A pharmacy might have access control and/or monitoring to protect the entry and might also employ additional security where narcotics might be stored.

It’s no longer enough to focus all your efforts on keeping unauthorized individuals out of a facility, building, etc. There are a number of additional concerns, such as espionage or monitoring critical equipment and processes, that come into play within these smaller areas inside the overall perimeter.

Should someone breach a sub-perimeter, they could sabotage or steal equipment or wiring, causing a plant shutdown, which could lead to millions of dollars in lost revenue. In addition to securing areas to keep people out, it’s also important to monitor the assets that are critical to the operations of a facility from both a security and process standpoint. Consider the ramifications of a piece of equipment that is prone to heating up, potentially causing a failure followed by a shutdown.

Therefore, these sub-perimeters must be addressed with the same level of security and technology as the outer perimeter, often with the same types of solutions.

IP-based technology is one of the main drivers behind innovation and new solutions for protecting different layers of facilities more effectively than in the past.

For example, a critical infrastructure facilities in the past, you had a fence, a guard post and maybe barbed wire and possibly a black-and-white camera at the guard shack to watch the entry.

Today, newer devices – such as access control, speaker systems, subterranean sensors, radar sensors and others – have become less expensive, opening up these types of vertical markets for enterprise or critical infrastructure-type applications. Thanks to the Internet of Things phenomenon, the list of IP-based solutions continues to grow due to increases in processing power and available bandwidth. This has created a number of solutions that are ideal for protecting critical sub-perimeters. New lower-cost housings for hazardous areas within the perimeter are now available, so class 1, division 1, zone 1 areas can now have cameras monitoring the process and activity in these hazardous areas.

IP Camera Advancements

From a surveillance camera perspective, processing power of the chipsets on the back end of cameras has become a key differentiator in the marketplace. This edge-based processing has led to powerful software and analytics capabilities, which decreases bandwidth by processing high-resolution images on the edge rather than sending video back to a central location for server-based analysis. Low-light technology is another advancement that has made cameras more powerful today than ever. In a sub-perimeter, cameras can be used to zoom in on a pressure gauge to visually verify that it is within accepted parameters without sending a person out to perform that task.

Thermal Cameras

Once considered mainly for installation on outer perimeters to detect people, objects or events in darkness, thermal cameras have become less expensive today, creating additional uses, such as monitoring the temperature of critical equipment to detect a possible failure before it can occur. Pan-tilt capabilities allow cameras to switch views between multiple critical areas and devices throughout the day. If the temperature has elevated or decreased beyond a predetermined threshold, the camera can generate an alarm to a command center. Prior to IP devices, this would require someone to investigate in person whereas today, additional advanced technologies like optics allow operators to view a situation remotely.

Short-Range Radar

An affordable solution that offers a 150-foot range and operates on a low frequency, radar doesn’t require a license to install a solution to monitor 120 degrees at 165 feet and can classify objects as a person or a vehicle, filter out what the object is and track a target in real time. Like thermal cameras, radar is not affected by environmental challenges such as fog or rain. This makes radar a powerful solution that can be installed within a perimeter for a number of purposes, including controlling access at a materials yard or a substation, providing an additional layer of detection and security on top of surveillance cameras. And while thermal cameras are more cost-effective than in the past, radar offers an even lower-cost alternative.

Sound and Communication

The ability to communicate with and provide ambiance at a site may not be top of mind when it comes to security, process or safety, but but both have strong applications for protecting sub-perimeters, enabled primarily by IP-based speakers.

Voice over IP (VoIP) allows users to deliver voice commands via speaker systems over the IP network to direct egress from a facility in case of fire, chemical leak, active shooter, critical weather event or other emergency. These solutions can also be used to notify unauthorized individuals who enter a sub-perimeter that they are not allowed to be in the area. While two-way VoIP is no replacement for first responders’ direct communication using walkie-talkies, it is excellent for emergency communications.

In non-emergency situations, the same system can be used to provide music to a location via an IP-based speaker. From a background perspective, music is a powerful tool for providing the desired atmosphere for schools, retail establishments, hospitals and other applications.

Shared Situational Awareness

All these IP devices generate data that can be shared thanks to their interconnectivity. The combination of networked devices allows end users to obtain, assess, analyze and share data in real time between systems and solutions, and the intelligence gleaned from all this data and analysis creates a shared situational awareness, which enables beneficial early intervention for both security and preventative maintenance.

The ability to set and monitor parameters within a larger area is key for security, processes and safety. For example, if a perpetrator comes into an area, radar, thermal and traditional cameras can be combined to provide real-time situational awareness for first responders, who can track a situation minute by minute and adapt to evolving conditions to ensure the safest, fastest and most effective response.

While much of the focus is on protecting outer perimeters, the potential fallout from events or situations in smaller areas within that larger area make protecting sub-perimeters equally vital from security and safety perspectives.

Advances in IP-based technologies allow end users to deploy a variety of interconnected systems to deliver security, process monitoring and safety within sub-perimeters. By sharing data, these solutions provide layered protection and real-time awareness that allows problems to be addressed proactively before they can become catastrophic.

KEYWORDS: audio monitoring perimeter security security radar security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joe Morgan, Business Development Manager, Critical Infrastructure, Axis Communications, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • visitor-enews

    How businesses can protect employees and visitors with video intercom security

    See More
  • AI

    Using AI, machine learning and advanced analytics to protect and optimize business

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing