{"id":11959,"date":"2022-08-30T09:23:16","date_gmt":"2022-08-30T13:23:16","guid":{"rendered":"https:\/\/senstar.com\/?p=11959"},"modified":"2022-09-20T16:14:39","modified_gmt":"2022-09-20T20:14:39","slug":"5-steps-to-eliminate-nuisance-alarms","status":"publish","type":"post","link":"https:\/\/senstar.com\/es\/security-digest\/5-steps-to-eliminate-nuisance-alarms\/","title":{"rendered":"5 Steps to Eliminate Nuisance Alarms"},"content":{"rendered":"<p>In this article, we look for the common causes of nuisance alarms generated by outdoor perimeter intrusion detection sensors, with a particular focus on those generated by fence sensors and intrusion-detecting video analytics. After analyzing the problem, we provide general recommendations aimed at reducing or even defeating them once and for all.<\/p>\n<h2>Step 1. Maintain Your Perimeter<\/h2>\n<ul>\n<li>A well-maintained perimeter is the first step in eliminating nuisance alarms. Perform a perimeter survey and identify potential security issues and risks:<\/li>\n<li>What is the condition of your fence? Loose, cut, or unsecured fabric will reduce the ability of fence sensors to detect intrusions as well as increase the number of nuisance alarms. Loose signs or vegetation striking the fence can also generate nuisance alarms, especially during high-wind conditions.<\/li>\n<li>Are there any objects (trees, structures etc.) that an intruder could use to climb over the fence?<\/li>\n<li>Is an intruder able to crawl under the fence because of gaps between the ground and the fabric?<\/li>\n<li>If cameras are used, for intrusion assessment or for additional detection capabilities, do they provide complete coverage? Are there any obstacles that block line of sight?<\/li>\n<li>Does the perimeter have suitable security lighting? Uniform, targeted illumination functions as both a deterrent and improves video surveillance-based assessment.<\/li>\n<li>If your site has outdoor equipment, network cables, or power cables along the perimeter, are they protected against vandalism or tampering?<\/li>\n<\/ul>\n<div id=\"attachment_11964\" style=\"width: 690px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11964\" class=\"wp-image-11964 size-medium\" src=\"https:\/\/senstar.com\/wp-content\/uploads\/perimeter-inspection-tinified-680x383.jpg\" alt=\"A-well-maintained-perimeter-is-the-first-step-to-securing-your-site\" width=\"680\" height=\"383\" srcset=\"https:\/\/senstar.com\/wp-content\/uploads\/perimeter-inspection-tinified-680x383.jpg 680w, https:\/\/senstar.com\/wp-content\/uploads\/perimeter-inspection-tinified-950x534.jpg 950w, https:\/\/senstar.com\/wp-content\/uploads\/perimeter-inspection-tinified-360x203.jpg 360w, https:\/\/senstar.com\/wp-content\/uploads\/perimeter-inspection-tinified-1500x844.jpg 1500w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><p id=\"caption-attachment-11964\" class=\"wp-caption-text\">A well-maintained perimeter is the first step to securing your site and reducing nuisance alarms.<\/p><\/div>\n<h2>Step 2. Work with Industry Experts<\/h2>\n<p>Before deciding on any specific technology, look for system integrators, consultants and vendors with proven track records. It&#8217;s easy to talk about high probabilities of detection and low nuisance alarm rate under controlled conditions. But when deployed in the real-world, security systems need to contend with a wide variety of potential nuisance alarm sources. Security professionals with experience in your particular domain can help as they should understand your requirements and can recommend idea solutions.<\/p>\n<p>Another aspect to consider is the installers. Are they certified on the systems they are installed? An improperly installed system will almost certainly generate a far higher number of nuisance alarms than the technology itself should, leading to well-justified frustration on the part of facility owners and security personnel. The solution is simple: certified, trained operators, documented acceptance testing, and vendors with a culture of strong customer support.<\/p>\n<div id=\"attachment_11968\" style=\"width: 690px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11968\" class=\"wp-image-11968 size-medium\" src=\"https:\/\/senstar.com\/wp-content\/uploads\/certificatoin-tinified-680x383.jpg\" alt=\"Look-for-certification-programs-to-ensure-security-products-are-installed-correctly-according-to-the-manufacturer\u2019s-specifications\" width=\"680\" height=\"383\" srcset=\"https:\/\/senstar.com\/wp-content\/uploads\/certificatoin-tinified-680x383.jpg 680w, https:\/\/senstar.com\/wp-content\/uploads\/certificatoin-tinified-950x534.jpg 950w, https:\/\/senstar.com\/wp-content\/uploads\/certificatoin-tinified-360x203.jpg 360w, https:\/\/senstar.com\/wp-content\/uploads\/certificatoin-tinified-1500x844.jpg 1500w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><p id=\"caption-attachment-11968\" class=\"wp-caption-text\">Look for certification programs to ensure security products are installed correctly according to the manufacturer\u2019s specifications.<\/p><\/div>\n<h2>Step 3. Select Appropriate Technology<\/h2>\n<ul>\n<li>While there are many types of sensor technologies that protect perimeters, some are niche solutions while others have a general appeal. When looking at different systems, consider these factors:<\/li>\n<li>Probability of detection \u2013 Does the system quickly, reliably and accurately detect attempts to breach the perimeter?<\/li>\n<li>Nuisance alarm rate \u2013 Does the system only generate alarms for real or simulated intrusions? If the system generates too many nuisance alarms, complacency may set in when responding to alarms.<\/li>\n<li>Ease of installation and configuration \u2013 How easy is the system to install and configure? Can the system be configured remotely from an equipment room, so maintenance staff can avoid travelling out to the perimeter whenever an adjustment is required?<\/li>\n<li>Integration with Security and Video Management Systems (SMS\/VMS) \u2013 Does the system generate information for security personnel that improves situational awareness? For example:\n<ul>\n<li>Can the SMS use the sensor data to display the precise location on a map?<\/li>\n<li>Are related alarms grouped together to avoid overloading officers with redundant information?<\/li>\n<li>Can the alarms be integrated with the VMS for automated camera control?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div id=\"attachment_11972\" style=\"width: 690px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11972\" class=\"wp-image-11972 size-medium\" src=\"https:\/\/senstar.com\/wp-content\/uploads\/a20cc557-fd01-4da3-b904-98de44a46af2-680x382.jpg\" alt=\"Senstar-has-the-industry\u2019s-most-comprehensive-portfolio-of-physical-security-sensors\" width=\"680\" height=\"382\" srcset=\"https:\/\/senstar.com\/wp-content\/uploads\/a20cc557-fd01-4da3-b904-98de44a46af2-680x382.jpg 680w, https:\/\/senstar.com\/wp-content\/uploads\/a20cc557-fd01-4da3-b904-98de44a46af2-360x202.jpg 360w, https:\/\/senstar.com\/wp-content\/uploads\/a20cc557-fd01-4da3-b904-98de44a46af2.jpg 950w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><p id=\"caption-attachment-11972\" class=\"wp-caption-text\">Senstar has the industry\u2019s most comprehensive portfolio of physical security sensors, ensuring that we can offer ideal solutions tailored to your site.<\/p><\/div>\n<h2>Step 4. Conduct Periodic Site Audits<\/h2>\n<p>An often-overlooked part of reducing nuisance alarms is periodic site audits. Over time, new site characteristics may be introduced that negatively affect the overall performance of the on-site systems. For example:<\/p>\n<ul>\n<li>New vegetation can grow along a perimeter, with its movement during high winds generating alarms for fence sensor and video analytic solutions<\/li>\n<li>Fences and gates can become damaged, leading to excessive and unpredictable movement.<\/li>\n<li>Snow build-up can affect both microwave and IR sensors. Standing water caused by storms may also cause problems for some types of sensors.<\/li>\n<li>Changes to on-site structures may block camera line-of-sight requirements.<\/li>\n<li>Vehicle traffic patterns can generate activity not initially accounted for, leading to problems with many types of sensors and video analytics.<\/li>\n<\/ul>\n<div id=\"attachment_11976\" style=\"width: 690px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11976\" class=\"wp-image-11976 size-medium\" src=\"https:\/\/senstar.com\/wp-content\/uploads\/site-audit-tinified-680x383.jpg\" alt=\"site-audit\" width=\"680\" height=\"383\" srcset=\"https:\/\/senstar.com\/wp-content\/uploads\/site-audit-tinified-680x383.jpg 680w, https:\/\/senstar.com\/wp-content\/uploads\/site-audit-tinified-950x534.jpg 950w, https:\/\/senstar.com\/wp-content\/uploads\/site-audit-tinified-360x203.jpg 360w, https:\/\/senstar.com\/wp-content\/uploads\/site-audit-tinified-1500x844.jpg 1500w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><p id=\"caption-attachment-11976\" class=\"wp-caption-text\">Site audits can help identify potential risks and ensure systems are operating at their peak performance.<\/p><\/div>\n<h2>Step 5. Eliminate Common Causes<\/h2>\n<p>During the testing or lifespan of any system, problems may arise. For systems to remain operating at maximum performance, they need to include the features and tools necessary for operators and technicians to quickly locate and resolve issues.<\/p>\n<ul>\n<li>For intrusion sensors, several features are critical to addressing the causes of nuisance alarms:<\/li>\n<li>Precision location reporting: If the sensor can locate the cause of a source of nuisance alarms to within a few meters or feet, the cause can be quickly resolved.<\/li>\n<li><a class=\"Hyperlink SCXW192228436 BCX9\" href=\"https:\/\/senstar.com\/security-digest\/what-is-environmental-disaggregation-and-why-should-you-care\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"FieldRange SCXW192228436 BCX9\"><span class=\"TextRun Underlined SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192228436 BCX9\" data-ccp-charstyle=\"Hyperlink\">Environmental disaggregation<\/span><\/span><\/span><\/a><span class=\"TextRun Underlined SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192228436 BCX9\" data-ccp-charstyle=\"Hyperlink\">:<\/span><\/span><span class=\"TextRun SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW192228436 BCX9\">T<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">he u<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">nique ability of a fence-mounted sensor with ranging (<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW192228436 BCX9\">i.e.<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\"> locating) capa<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">bilities <\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">to avoid the generation of nuisance alarms caused by heavy winds<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">.<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\"> Ranging sensors like Senstar&#8217; <\/span><\/span><a class=\"Hyperlink SCXW192228436 BCX9\" href=\"https:\/\/senstar.com\/products\/fence-sensors\/fiberpatrol-fp1150\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192228436 BCX9\" data-ccp-charstyle=\"Hyperlink\">FiberPatrol<\/span><\/span><\/a><span class=\"TextRun SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW192228436 BCX9\">, <\/span><\/span><a class=\"Hyperlink SCXW192228436 BCX9\" href=\"https:\/\/senstar.com\/products\/fence-sensors\/flexzone\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192228436 BCX9\" data-ccp-charstyle=\"Hyperlink\">FlexZone<\/span><\/span><\/a><span class=\"TextRun SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW192228436 BCX9\">,<\/span> <span class=\"NormalTextRun SCXW192228436 BCX9\">and the <\/span><\/span><a class=\"Hyperlink SCXW192228436 BCX9\" href=\"https:\/\/senstar.com\/products\/fence-sensors\/senstar-lm100\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192228436 BCX9\" data-ccp-charstyle=\"Hyperlink\">Senstar LM100<\/span><\/span><\/a><span class=\"TextRun SCXW192228436 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW192228436 BCX9\">can <\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">recognize the<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">se<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\"> disturbances <\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">as non-intrusions <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW192228436 BCX9\">not <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW192228436 BCX9\">trigger<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\"> a<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\">n<\/span><span class=\"NormalTextRun SCXW192228436 BCX9\"> alarm.<\/span><\/span><span class=\"EOP SCXW192228436 BCX9\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li>Sensors should include intelligence signal processing that recognizes disturbances generated by environmental forces, sudden changes in lighting, and high-activity sources (e.g. traffic, trains, etc) and reject them accordingly.<\/li>\n<\/ul>\n<p><span class=\"TextRun SCXW25267478 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW25267478 BCX9\">For sites that suffer from frequent nuisance alarms or require the highest probability of detection possible, Senstar recommends its new <\/span><\/span><a class=\"Hyperlink SCXW25267478 BCX9\" href=\"https:\/\/senstar.com\/products\/security-management\/senstar-symphony-sensor-fusion-engine\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW25267478 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW25267478 BCX9\" data-ccp-charstyle=\"Hyperlink\">Sensor Fusion Engine<\/span><\/span><\/a><span class=\"TextRun SCXW25267478 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW25267478 BCX9\"> (<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW25267478 BCX9\">part<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\"> of the <\/span><\/span><a class=\"Hyperlink SCXW25267478 BCX9\" href=\"https:\/\/senstar.com\/products\/video-management\/senstar-symphony-common-operating-platform\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW25267478 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW25267478 BCX9\" data-ccp-charstyle=\"Hyperlink\">Senstar Symphony Common Operating Platform<\/span><\/span><\/a><span class=\"TextRun SCXW25267478 BCX9\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW25267478 BCX9\">)<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">,<\/span> <span class=\"NormalTextRun SCXW25267478 BCX9\">a<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\"> breakthrough technology that synthesizes data from separate systems to generate actionable information. <\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">More than just a simple Boolean logic integration, the sensor fusion engine accesses low level data from both fence sensors and video analytic<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">s<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\"> to intelligently characterize potential risks. <\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">Data synthesis enables the system to achieve <\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">a <\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">level of performance that exceed<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">s<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\"> those of the individual sensors<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\"> while <\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">defeat<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\">ing<\/span><span class=\"NormalTextRun SCXW25267478 BCX9\"> nuisance alarms once and for all.<\/span><\/span><span class=\"EOP SCXW25267478 BCX9\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<div id=\"attachment_11980\" style=\"width: 690px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11980\" class=\"size-medium wp-image-11980\" src=\"https:\/\/senstar.com\/wp-content\/uploads\/sensor-fusion-video-stream-tinified-680x383.png\" alt=\"sensor-fusion-video-stream\" width=\"680\" height=\"383\" srcset=\"https:\/\/senstar.com\/wp-content\/uploads\/sensor-fusion-video-stream-tinified-680x383.png 680w, https:\/\/senstar.com\/wp-content\/uploads\/sensor-fusion-video-stream-tinified-950x534.png 950w, https:\/\/senstar.com\/wp-content\/uploads\/sensor-fusion-video-stream-tinified-360x203.png 360w, https:\/\/senstar.com\/wp-content\/uploads\/sensor-fusion-video-stream-tinified-1500x844.png 1500w, https:\/\/senstar.com\/wp-content\/uploads\/sensor-fusion-video-stream-tinified.png 1920w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><p id=\"caption-attachment-11980\" class=\"wp-caption-text\">An industry game-changer, the Senstar Symphony Common Operating Platform with Sensor Fusion Engine offers the ability to finally defeat perimeter nuisance alarms once and for all.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this article, we look for the common causes of nuisance alarms generated by outdoor perimeter intrusion detection sensors, with a particular focus on those generated by fence sensors and intrusion-detecting&#8230;<\/p>\n","protected":false},"author":15,"featured_media":11960,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[22,314,317,320],"tags":[],"class_list":["post-11959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-digest","category-video-management","category-fence-sensors","category-security-management"],"_links":{"self":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/posts\/11959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/comments?post=11959"}],"version-history":[{"count":0,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/posts\/11959\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/media\/11960"}],"wp:attachment":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/media?parent=11959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/categories?post=11959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/tags?post=11959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}