Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Video Marches Around the Perimeter

By Bill Zalud
November 1, 2008


At the edge” camera decision-making, less expensive cameras, video motion detection, IP and wireless applications all come together to let security leaders implement security video as a perimeter protection solution.

   
Although security video is used for many purposes, its most common application is for surveillance and alarm assessment. Systems make it possible for fewer individuals to maintain a constant watch, record and archive activities under surveillance, and provide a visual record that can be used to document activities for investigative use.




THE CHALLENGE

Video cameras comprise only one component of a perimeter protection system that includes smart fences, buried cable, lighting and other technologies. Following trends in other markets, the cost of cameras continues to fall while functionality increases due to the availability of more powerful and less expensive electronic components. As a result, low-cost, high performance cameras are widely available creating the opportunity for large scale exterior surveillance applications.

   
Security video systems configured with hundreds of cameras have become commonplace. IT network technology and low-cost hardwired and wireless IP networked video cameras, with embedded video compression technology, have taken hold to mitigate the escalating communications and electrical infrastructure and network administration costs.

   
Traditional CCD and CMOS video cameras require illumination, either from visible or from very near infrared light sources in order to produce a usable display picture. Reproducing a usable image becomes exceedingly difficult as illumination decreases, which creates the need for an exterior lighting source. Yet the cost of these systems is considerable and for many applications completely impractical such as borders, waterway areas, city-wide surveillance, power generation, refinery perimeters and airport applications. In other situations, lighting can either offend local residents or draw unwanted attention.

   
Likewise, administration and infrastructure costs for video and network equipment are considerable. Multiple IP addresses and dynamic network configurations require management. Network security requires constant and vigilant monitoring, and user demand for network speed and performance requires investment in system infrastructure to ensure the bandwidth is there to support the system.

   
One solution for using security video on the perimeter: Integrated electro-optical surveillance such as systems from Axsys Technologies and comprised of passive, long-range thermal imaging video cameras with companion bore-sighted visible spectrum video cameras mounted on precision pan and tilt positioning.



PORT PERIMETER SECURITY

As another example, at the Panama Ports Company (PPC), a member of the Hutchison Port Holdings, which operates 255 berths in 44 ports across the world., security leaders sought an overall high resolution image quality, low maintenance system able to withstand the weather conditions of an ocean environment and the ability to survey wider areas in greater detail with each individual camera.

   
During an initial phase, more than 50 Mobotix IP cameras were installed, typically at 300 feet, with two cameras on each crane. The cameras are aimed at entrances and remote perimeter areas where manual surveillance would have been very labor intensive. The multiple configurations with the network camera, including single or dual lens, wide-angle or telephoto, day or low-light provide the flexibility to deploy the same basic camera type into a wide range of specific viewing requirements with varying lighting conditions. The video footage from the IP cameras is recorded on a server. Live video as well as recorded clips can be viewed on any authorized computer in the port facility.

   
Port officials had particular concerns related to the weather conditions of a tropical coastal environment: salty air, frequent wind-driven rain, intense heat and humidity. The cameras chosen are built to withstand extreme environmental conditions: from -30 to +60 °C (-22 to +140 °F). The fiberglass-reinforced and shock-resistant cameras protect the network cable and connections against vandalism as well as severe weather conditions.

   
With the cameras boasting both audio and video features, it’s a big advantage for PPC. “We don’t just need to see what’s going on, we need to hear it as well,” said Michael Hernandez, PPC CIO. “Our overall security and safety is dependent on having both those features.”



SIDEBAR: What Goes Up Must Come Down, Sometimes

With the growing use of security video to protect perimeters, the cameras – often megapixels, wide angles or infrareds – go high up on poles or other infrastructure.  Such installations are more costly but boast a strong return on investment. On the flip side, maintenance of the cameras way up there is more complex.

   
Security Magazine editors touring the exhibit floor at the recent ASIS International discovered a unique solution. From Videolarm, a lowering arm eliminates the need for lift trucks and reduces safety concerns. With its self encased motorized system, the Lowering Arm is capable of lowering and raising most camera system enclosures with a simple yet secured operation. The system is factory-wired, and incorporates an augmented cabling system which prevents long cable runs and wire entanglements.


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • perimeter-security-freepik1170x658v9067.jpg

    Around the clock protection: How steel fencing secures perimeters

    See More
  • DHS Works with Partners Across the Country and Around the World to Assess the Nation's Cyber Incident Response Capabilities

    See More
  • social-snaptrends

    The Social Media Security Problem for Corporations around the World

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing