Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityVideo SurveillanceInfrastructure:Electric,Gas & Water

Protecting critical infrastructure with radar

By Yaron Zussman
power lines and clouds

Image via Unsplash

May 26, 2023

Utility organizations, like other critical infrastructure sites, are faced with ever-present challenges to protect their facilities, people and assets. Whether the locations are power generation plants, substations, water treatment facilities or solar farms, utilities must be prepared to protect against a multitude of dangers, including vandalism, equipment theft and the growing threat of domestic terrorism.

A recent spate of attacks in the United States on electrical substations is calling renewed attention to vulnerabilities in critical infrastructure security. In particular, questions are being raised about the protection of these smaller, ancillary facilities, which can be cost-prohibitive and challenging for organizations to fully protect. Depending on the size of the utility organization, these sites can number in the hundreds and are often located in remote areas, far from the main communications infrastructure. This can leave the site vulnerable to copper thieves or vandals who destroy a circuit breaker or transformer, which can require repair and replacement of parts and result in the costly disruption of services to utility customers. 

Utilities find traditional security technology cost prohibitive

Fencing and traditional CCTV coverage have long been mainstays for perimeter protection but can quickly become expensive when providing coverage for large installations or significant deployments, such as for substations or cellular tower clusters. These costs are reflected not only in the hardware and related infrastructure but also in installation costs such as trenching, poles, electrical and network wiring. 

While cameras outfitted with video analytics can also provide automated detection of a potential intruder or other breaches, it comes at a higher cost. With a limited field of view, many pole-mounted cameras are needed in order to obtain 360-degree perimeter protection. While using analytics can help automate detection and streamline monitoring operations, installation costs for camera-based systems are still high and require regular lens cleaning and maintenance to make sure the analytics are correctly calibrated and optimized for detection.

Radar technology provides cost savings for utilities

The combination of existing technologies such as ground-based radar detection with tech breakthroughs such as Artificial Intelligence has created new solutions. Radar with AI can detect threats in all weather conditions and can also classify the detected threat as local wildlife or a potential intruder. 

Because a security breach has both financial and safety consequences, utilities need to protect their facilities to ensure the integrity and availability of essential services. As utilities review their security options, radar is proving time and time again to be a cost-effective and reliable solution that can provide greater perimeter coverage than surveillance cameras alone.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: critical infrastructure surveillance cameras theft prevention utility security video analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Yaron Zussman is the General Manager of Magos America Inc. where he is responsible for executing the company vision of bringing advanced radar technology, to the civilian markets. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cyber freepik

    Protecting critical infrastructure intrusions with device-level protection

    See More
  • Chetrice Mosley Romero Podcast header

    Protecting Critical Infrastructure With Limited Funding

    See More
  • Domestic critical infrastructure is arguably now more at risk than at any point in living memory, and certainly in a peacetime context.

    Protecting critical infrastructure and distributed organizations in an era of chronic cybersecurity risk

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • January 29, 2026

    Protecting Data Centers as National-Level Critical Infrastructure

    ON DEMAND: Data centers have quietly become some of the most critical infrastructure around the globe. Learn how the modern security mission is no longer just about protecting assets — it’s about protecting outcomes such as resilience, uptime and global trust.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing