Perimeter surveillance – Part 2 of 6

Smarter technology solutions increase perimeter security

Today, security cameras, access control units and digital speakers are connected to IT networks and can receive, analyse, and distribute data, says Jimmy Ek, Nordic Sales Manager for Axis.

Today, security cameras, access control units and digital speakers are connected to IT networks and can receive, analyse, and distribute data, says Jimmy Ek, Nordic Sales Manager for Axis.

Airports, energy facilities and logistics centres are examples of applications where the boundary for where unauthorised persons do not have access should be very clear. Jimmy Ek, Nordic Sales Manager for Axis, believes that the ongoing digitalisation has created completely new conditions for creating strong perimeter protection with IP-based solutions.

Jimmy Ek emphasises that ongoing IoT development has paved the way for achieving effective perimeter monitoring with high precision. Today, security cameras, access control units and digital speakers are connected to IT networks and can receive, analyse and distribute data.

“Smart technologies offer powerful solutions to meet the safety requirements in the perimeters, which provides fast incident management and response,” he says.

Intelligent technology provides better precision

Jimmy Ek believes that the combination of security cameras and software for motion detection has expanded the range and capacity of solutions for perimeter protection, from simple detection to complex intrusion analysis.

“By utilising the power of AI, modern camera technology, which can already distinguish between a vehicle and a person approaching a place, is moving fast,” Jimmy Ek emphasises.

“Based on new and improved algorithms, which are based on a lot of monitoring data, it is possible to determine a vehicle category or type, or a person’s gender, age profile and hair colour, all of which serve to improve correct identification.”

Thermal cameras and speakers

By combining visual data from cameras with other sources – such as images from thermal cameras – the detection capacity can be further improved.

“Thanks to the power of the optics they use, Axis thermal cameras offer the possibility of locating activity over considerable distances, which may be needed at, for example, an airport with a fence at the extremes that are several hundred metres long,” states Jimmy Ek.

A thermal imager can detect someone trying to access the location and automatically trigger Axis PTZ cameras to target the exact location based on geo coordinates. The addition of integrated IP horn speakers allows pre-recorded alerts to be issued to deter potential intruders, or real-time voice alerts that can be communicated from a central location. Edge-based analysis, advances in image quality, the use of AI and in-depth learning opportunities require increased processing power. This is where on-board analysis and edge-based processing comes in. Today’s smart camera technology can analyse and process video data in the cameras themselves without having to upload or download over a network to a central server.

“In addition to the fact that it means significant energy savings over time, you avoid the risk that it would entail with putting the intelligence in a centralised server that in the event of a malfunction puts the intelligence of the cameras out of play. Instead, the edge units make local decisions from unit to unit,” says Jimmy Ek.

“Axis’ own Axis Perimeter Defender solution includes edge-based analysis of intrusion detection and optional PTZ auto-tracking, along with a design tool to enable smooth and careful planning of camera installations in an area, maximizing their efficiency.”

Benefit – smarter security

Jimmy Ek emphasises that there are really no limits to the number of actions that can be automated. A security camera that triggers an alarm, a pre-recorded audible warning, or a live video that is sent to a team when they go out to investigate an incident, are all examples of automated actions.

Perimeter monitoring in an outdoor environment involves many challenges. It places high demands on installation, product, and technology choices. The occurrence of repeated false alarms otherwise results in problems for the operators who have to handle incoming alarms. This can lead to actions in case of sharp alarms being delayed. But with the right technology, alarm events can be verified with precision.

“With today’s significantly improved images and video analysis, operators now have the opportunity to carefully assess a situation before deciding on action measures,“ comments Jimmy Ek.

Access control with network video

Jimmy Ek also believes in access control systems with video surveillance as a complementary factor for authentication in the entry and exit points of perimeter protection. Frictionfree access control technologies offer a streamlined and secure access process where a QR code presented with a mobile phone is backed up by a network camera that confirms the identity before access is granted.

Improved service via access control

Jimmy also believes that automatic access control can also improve both service and customer experience, for example by activating a welcome message and any instructions to the visitor via network speakers while an automatically triggered email or call is sent to the person who will receive the visitor.

Jimmy Ek sees that scalable and future-proof security and surveillance technology has become available to an ever-widening spectrum of industries and companies.

“To embrace these solutions and take full advantage of the many opportunities offered to reduce threats and also improve the visitors’ experience, leads to the creation of a smarter and safer world,” Jimmy Ek concludes.

Note: This editorial article has primarily been produced for the security trade magazine Detektor in collaboration with

Product Suppliers
Back to top