Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyPhysical SecurityVideo Surveillance

Education & Training

Trends in perimeter security

By William Plante
education in security

Serjio74 / iStock / Getty Images Plus via Getty Images

perimeter security
education in security
perimeter security
February 11, 2022

Does anyone else remember the good ol’ days when all you needed to secure your perimeter was to clear the land around your boundary and construct a palisade with some earthworks to fortify the line? Perhaps deploy a flock of guard geese and post some pilum-porting sentries, and you were set to stand off a horde? Of course, the notion of establishing a perimeter to protect interior spaces goes further back than the Romans, and perimeter protection principles, also known as the Five D’s, remain the same: Deter, Detect, Deny, Delay and Defend. A sixth D — Demarcation — while often not identified, is important to asserting spatial ownership as part of Crime Prevention Through Environmental Design’s territoriality concept. 

The modern perimeter spans many forms, from high-security, access-restricted locations, such as military bases, to high-end luxury retail locations with significant foot traffic passing by the front door. Applying the Five D’s in any of these applications has the same principle of protecting interior assets, but with vastly different options, controls and permissive uses available. Importantly, effective psychological demarcation is an increasingly important characteristic of establishing a perimeter when standard techniques, such as fences, aren’t available.

Threats against companies from modern aggressor technology, such as rogue aerial drones, present new challenges to vertically-expanding perimeters. Security leaders and risk management professionals are confronted with thwarting more sophisticated intrusion vectors, while building designers and operators often have user experience requirements and campus aesthetics that preclude some standard controls. However, the good news is that there are a variety of new tools to help design a more intelligent and protected perimeter.


Redefining the Perimeter

Some security planners use a simple technique — the classic defense-in-depth layer model — with the Five D’s applied in each layer. This model includes descriptions of permitted and prohibited uses that account for times and other events, such as storms and natural disasters. Defining use is key as this informs the site security plan, and the model should also now include airspace.

The key to designing a cost- and performance-effective solution is to understand how people and vehicles moving from one perimeter layer to the next impact potential threats. Often, campus planners do not want hard access control measures that conflict with the company’s brand along the perimeter, such as fencing and gates. Therefore, the actual “hard line” is often the building itself. Each opening in the building, including entrances, windows and utility portals, must be identified and secured by a robust design. Lately, trends also include improved access control systems and credentials, such as smart cards, optical turnstiles and intelligent video surveillance systems.


Rogue Drone Threats

The security perimeter now includes both physical and cybersecurity issues in an environment where security costs are always a concern. Planners need to design control measures for each boundary layer while factoring in threats to people’s privacy and the company’s wireless networks by rogue drones and other technologies. Rogue drones are becoming increasingly common, and planning a perimeter defense in collaboration with cybersecurity is an increasing necessity, especially where a business justification for the cost is expected. Identifying the location of every exterior cyber asset — both physical and digital — along with the route to them and the control measures needed to protect them reduces the likelihood of a cybersecurity breach. The axiom, “If I can touch it, I can own it,” applies physically and digitally. In some cases, tools such as anti-drone systems, jammers and even takeovers are possible under certain situations. Regardless of how likely the rogue drone risk may be, it’s a threat that needs to be factored into a perimeter security plan.


Perimeter Protection Technology

Many standard perimeter protection technologies have improved as new technologies have appeared. Perimeter-missioned security drones and robots are moving from the innovation phase into mainstream use while perimeter detection technology, including LiDAR and radar, artificial intelligence (AI) camera systems and fence intrusion detection systems, are technologically improving. Improvements are aimed to fine-tune accuracy and time performance while also allowing more autonomous and intelligent alarm assessment and response initiation. For example, fence accelerometers are reducing nuisance alarms on fence intrusion detection systems, and AI-enabled cameras have advanced behavior identification algorithms. 

Similarly, GPS tracking and geofencing for virtual perimeter protection are gaining traction. Many of these control measures can be integrated into a unified system via APIs that seamlessly integrate detection and alerting functions, helping ensure greater efficiency and operator confidence while minimizing false and nuisance alarms.

For example, a distributor of luxury retail goods may have a warehouse and distribution facility, but they may be precluded from installing no-climb fencing topped with barbed wire with vehicle and pedestrian access control. By applying the Five D’s, the security executive may use a combination of warning signage along the perimeter (Demarcation and Deterrence) and full building and parking lighting (Detection and Deterrence). The lighting program could include automatic high-light illumination during a security event (Deter and Detect). The company might also employ an exterior drone for perimeter and area patrols (Detect), an AI video system programmed to identify a variety of unusual behaviors such as aggressive or unnatural movements (Detect), and a PA system to broadcast security messages when needed (Deter). The employees may have a security application installed on their phones to report concerns or ask for a virtual escort in real time (Defend). All these systems can be integrated into the company’s enterprise security platform for seamless management. The building itself may not appear unusual, but upgraded building materials with enhanced detection technologies offer a complete protection package for people and assets as well as protect the building perimeter.

What’s the result? An intelligent and semi-autonomous, multi-layer and capable security detection and response program that supports the enterprise’s employee safety culture, protects company assets and remains in alignment with the company’s brand objectives. 

The basics and principles of perimeter security are really unchanged since ancient times, but our ability to automate and improve efficiency through better use of technology helps fulfill the campus operator’s vision while achieving the security planner’s goals. Whether it’s a corporate campus, high-value warehouse or solar electrical generation station, security technology and its thoughtful application achieve what we all want — better, more effective safety and security.

KEYWORDS: enterprise security perimeter security risk management security analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

William Plante has been a professional services business owner and corporate security executive for over 40 years. Before joining ADT Commercial as the Director of Consulting Services and Strategic Development, Plante was the Chief Security Officer for Symantec. He also drove the development and execution of Intuit’s Small Business Division and its Information Technology Business Continuity and Resiliency Program. The program included such value drivers as business resumption planning, incident management and information technology disaster recovery.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Illustrated ladder

Agentic AI Security Is Complicated, and the Hyper-Scalers Know It

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • building perimeter

    Securing the perimeter in manufacturing and distribution

    See More
  • basketball court

    6 emerging threats and trends in venue security

    See More
  • Chain-link fence with city views behind it

    The new standard in facility protection: Enhancing perimeter security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing