With respect to perimeter security protection, there are many factors that can impact the response to threats or intrusion. These include:
- Size of area
- Perimeter security system capabilities
- Security infrastructure (Fences, Barriers, Gates, and Locks)
- Access controls
- Alerts and notifications
- Documentation and training
- Response framework
A security response framework is necessary to achieve successful end-to-end perimeter protection. Key concepts within the response framework can include processes and policies to:
Facilitating an appropriate response to a security threat relies on reliable threat recognition with fewer false positives. Many external factors such as weather and available light can impact the efficacy of a perimeter security surveillance system. Layering or combining multiple surveillance technologies like buried sensors, seismic sensors, thermal imaging, radar, PTZ cameras, and video analytics will increase the probability of reliable detection during threat assessment.
Once a threat has been reliably recognized, an automated response can be initiated through video and security management systems that have been programmed to react based on a predefined sequence of events and triggers. For example, the movement of PTZ cameras, lighting, and thermal imaging could be activated as a response to a potential threat. Varying responses can be triggered based on the intelligence gathered about the perceived target, whether human, animal, or vehicle.
Once active perimeter security measures have been deployed, security staff and management can respond to intruders or threats. Suspicious activity can be deterred by intercom or two-way audio. Depending on the response, security action may need to be escalated.
Time is a key factor in perimeter security defense, as security responders, whether external law enforcement or internal security staff response may be delayed. This is especially evident in the protection of remote locations. In these scenarios, access control systems are important critical security infrastructure assets to slow intrusion attempts.
Security business intelligence provides valuable insight into current and future threats. An evaluation and feedback process to identify trends and issues is necessary to improve appropriate system responses and notifications. Improvement of perimeter security measures requires a continuous loop of machine learning and human intervention. Advancements in video management and security management software and systems will only serve to improve the efficacy of perimeter security protection.