Skip Navigation

[Guest Blog] Five Key Principles of Perimeter Security with Spotter Global

By Gregory Cross, Director of Marketing, Spotter Global, Oct 25, 2022

The North American perimeter security market was valued at $14 Billion in 2021 and has a projected growth rate of 8.4% CAGR into 2030. The reason for this growth is largely due to an increase in illegal activities, terrorism, attempted crimes and security breaches.

As a security manager or integrator, it is imperative that the resources made available are spent wisely and are conducive to an effective security solution. Perimeter Intrusion Detection Systems (PIDS) are an essential component of an effective security solution, but just as with any technology, PIDS have their use cases, and understanding where PIDS can fit into a security solution is critical.

Five key principles of perimeter security

When implementing or reviewing a security solution, a set of principles to follow can mean the difference between success and failure. Below are the five principles of perimeter security to consider.

Deterrence
Security solutions start at the conception of a crime. It is preferable to discourage intruders from carrying out an attack than to thwart an attempted attack. Barriers, perimeter fences, cameras, lights, and PA systems can help accomplish this. If a target seems too formidable to attack, many would-be intruders will give up or choose a softer target.

Detection
Detection devices such as radar, fence sensors, microwave sensors, and video analytics will detect intruders. Coupling these technologies with cameras and Video Management Systems (VMS) can identify intruders and be used for analytic purposes or proof for legal recourse.

Delay
An ideal security solution will use fences, barriers, and access control to extend the amount of time it takes for an intruder to access a critical asset. If the time it takes for an intruder to reach a critical asset is longer than the amount of time required for security or law enforcement to intercept the intruder, your asset(s) will remain safe.

Assessment
False alarms can be costly and repeated false alarms can lead to slower response times by security teams. It is critical that once a potential threat has been detected that it is assessed and determined to be a threat or not.

Response
Plans need to be formulated and practiced by employees for the response to an intruder so that response time is shortened. All employees need to be aware of the protocol to follow in case of a security event both for their safety and the security of critical assets.

Where PIDS fits into the Five Key Principles of Perimeter Security

The ability to detect a threat before it reaches critical assets is essential in all aspects of a successful security solution. PIDS can provide that detection and also complement all other aspects of perimeter security.

Deterrence
Detecting an intruder and the ability to track its movement can trigger lighting, alarms and PA systems, potentially dissuading them long before they reach the fence line. Additionally, a potential intruder seeing detection devices during reconnaissance will potentially be dissuaded from entering the site.

Detection
PIDS will detect potential intruders. Depending on the system in use, it can also provide classification of the target (animal, vehicle or person) and can queue a camera to the target for visual verification.

Delay
PIDS will not help to delay an intruder from reaching critical assets, but it will make security personnel aware of a threat long before they reach the fenceline, thus giving security more time to intercept the intruder.

Assessment
PIDS have the ability to queue PTZ cameras to a target location, allowing visual assessment of the threat. Is it a person? Are they armed? How many targets are there? The answers to those questions will determine the appropriate response to the threat.

Response
PIDS should be used to pinpoint the intruder’s current location for security personnel to respond accurately and swiftly. PIDS can help with laying out plans of how to deal with intruders by security personnel by splitting your site into unique geographic zones.

About Spotter Global
Spotter Global was founded in 2008 to develop and manufacture Compact Surveillance Radar to protect troops deployed around the world from harm. In 2013 we saw the need for an innovative and user-friendly commercial product to protect critical infrastructure. Since that time, Spotter Global has expanded its offering to include models and form factors that cover areas ranging from one acre to 380 acres and verticals that go far beyond critical infrastructure. This allows us to ensure we fulfill our mission of Preventing Harm.

Spotter Global imagines, designs, manufactures and supports ground and aerial Compact Surveillance Radar in the United States at our HQ in Orem UT. Our software is built from the ground up in Orem with dedicated personnel that ensures the highest quality and concern for customer security. We are proud to operate, manufacture, design and assemble our products here in the USA.

Learn more at www.spotterglobal.com.