Video analytics can’t go it alone at the perimeter

Boundary around a location - perimeter protection

Share this content

Facebook
Twitter
LinkedIn

CCTV is a vital piece of any security system, but expecting cameras to protect an entire site without support from illuminators, detectors and speech enunciators is like expecting your Quarterback to play a game without his offensive line, says Austin Caldwell, Sales Representative, SourceIT.

Perimeter security

Recently published studies have shown that approximately 839,563 burglaries occurred in the US in a year.

This figure could be significantly lower in the future if companies are willing to invest a little extra in a more complete security system.

CCTV and video analytics: the modern security marvel

CCTV and video analytics have revolutionized the perimeter security industry, offering capabilities we could only dream of a decade ago.

With video analytics, security systems can analyze live footage in real-time, detecting anomalies and potential threats.

This technology is especially valuable for visual verification at the perimeter, a feature that’s become indispensable in modern security systems.

Despite their impressive tech, video analytics have their limits.

Environmental factors like lighting conditions, weather and physical obstructions can significantly impact performance.

Car headlights, flickering lights, shadows and even bugs can interfere with a camera’s ability to analyze its surroundings accurately.

Wet conditions can cause reflections and water on the lens, degrading footage quality.

While infrared (IR) cameras help, they often fall short of providing sufficient illumination, leading to subpar video quality.

These issues scream for a more reliable solution at the perimeter.

The question remains: are video analytics alone enough for comprehensive security? Experience time and time again suggests otherwise.

A more effective approach to site and perimeter security involves combining video analytics with external detectors and illuminators, creating a layered security strategy.

Precise, accurate and flexible detection

One major challenge with video analytics is their limited performance over long distances.

Weather conditions, light intensity, dust and insects can compromise accuracy at extended ranges.

In contrast, physical detectors offer programmable detection ranges – like motion detectors manufactured by GJD and supplied by SourceIT, which can detect from 8m to 60m and have adjustable fields of view – creating unique alarm zones tailored to specific layouts.

This flexibility allows security personnel to set up pre-warning and critical alerts, ensuring precise and reliable intruder detection across various distances.

Minimize unwanted alarms

Using video analytics for perimeter security as a standalone solution often leads to unwanted alarms triggered by outdoor conditions.

This is counterproductive for both the end-user and the security installer, leading to responses to false positives and the potential for genuine events to be missed.

We have even seen situations where the security provider turns off the problematic CCTV camera, compromising security and potentially invalidating insurance.

An alternative, more robust approach to perimeter security is supplementing a CCTV system with physical motion detectors or laser sensors, like GJD’s D TECT PIRs, Dual Techs and Curtain Lasers.

This strategy reduces unwanted alarms and ensures the system remains active and reliable. We want a system that’s on, working and detecting real threats.

Without monitored CCTV, your security measures at the perimeter won’t prevent anything.

CCTV is only a preventative measure if an on-site or off-site security agency monitors it.

If it isn’t, your CCTV is only useful for catching perpetrators after they have committed the act.

Some security agencies will attach their security system to a speaker so that a security agent can let the intruder know they have been detected and then scare them away before they can cause too much damage.

If a paid monitoring service is beyond your budget, cheaper alternatives are an option.

Some solutions on the market can play a particular message, letting the intruder know they have been detected and can encourage them to leave before they do any damage.

What about remote locations?

Remote locations are notoriously difficult to secure; for many farms, mines, construction sites and factories, the local law enforcement is some distance away and has a long reaction time.

By its very nature, CCTV needs power and is, therefore, likely to be close to the site you are protecting.

This means there is little time between you detecting your intruder at the perimeter and them starting to cause damage through theft or vandalism.

However, suppose you support your cameras with wireless detectors on the perimeter of your property or land.

In that case, this gives advanced warning and will provide you with the time to notify the authorities and protect yourself from any threat long before a camera on its own could manage.

The superiority of physical detectors in all conditions

Physical motion detectors and laser sensors are unsung heroes of perimeter protection, offering reliability and performance in all lighting conditions.

Unlike CCTV cameras that need dedicated lighting, physical detectors are built for external use.

They excel in varying outdoor lighting and environmental conditions, ensuring consistent performance no matter what.

You can drastically reduce nuisance alarms by integrating physical detectors with CCTV systems.

This integration prioritizes genuine intruder alerts, allowing organizations to rely on a system that detects intrusions accurately while minimizing false positives.

This means the security team (if one is on the premises) can focus on real threats, not false alarms.

Integrating detection with VMS platforms

Modern detectors’ integration capabilities with video management systems (VMS) further enhance their utility in comprehensive security systems.

Installers can quickly integrate detection devices with existing security infrastructure by leveraging pre-loaded VMS drivers and customizable URL commands.

This integration ensures efficient communication between detectors, cameras and monitoring systems, creating a cohesive and responsive security solution.

A layered approach to security

Ultimately, the most effective security systems use a layered approach, combining the strengths of video analytics and incorporating physical motion detectors, illumination and laser sensors to offer superior performance, reliability and accuracy.

While video analytics offer robust visual verification, physical detectors provide reliability and accuracy in diverse environmental conditions.

Integrating these technologies ensures higher protection, minimizing false alarms and promptly detecting genuine threats.

The naivety of relying solely on CCTV and video analytics as standalone tools in intruder detection is apparent.

Organizations create a more effective and resilient perimeter and intruder protection strategy by placing physical detection at the heart of security systems.

And that’s a win for everyone.

About the company

SourceIT specializes in designing, distributing and supporting physical security solutions.

SourceIT is the security industry’s primary location to buy Aetek, Altronix, GJD, Hanwha, Open Eye, Uniview and other premier security component products.

About the author

Austin Caldwell has been in the security industry since 2018, bringing extensive experience in both technical support and project management.

Before transitioning into sales, he led the support team at SourceIT, assisting with enterprise-level deployments consisting of thousands of cameras and access control doors.

His background includes hands-on technical troubleshooting, overseeing large-scale security installations and project managing complex camera and access control implementations.

Now in sales, Austin leverages his technical expertise to help integrators design and deploy effective security solutions tailored to their needs.

He stays at the forefront of industry advancements, including AI-driven video analytics and cloud-based security solutions, and has extensive experience working with leading security manufacturers and VMS platforms.

This article was originally published in the special ISC West 2025 March edition of Security Journal Americas. To read your FREE digital edition, click here.