Integration with perimeter security systems: the obvious and the probable.

#perimeter alarm

Integration with perimeter security systems: the obvious and the probable.

Integration with perimeter security systems: the obvious and the probable.

Participating in the discussion of the topic:
Vladimir BERSENEV, ZAO Firma YUMIRS
Alexander LAVRINENKO, General Director of ZAO YUMIRS-montazh
Leonid STASENKO, Relvest Group of Companies

Question for discussion

Why are integrated security systems based on ACS so rarely integrated with perimeter security systems?

Vladimir BERSENEV:
Firstly, not every consumer needs it. Secondly, many people imagine a comprehensive security system only as a combination of ACS (access control and management system), television and fire-fighting equipment. At the same time, the supplier of the system does not always draw the customer's attention to the need to protect the perimeter of the facility. Not everyone can competently combine a specific information collection and processing system (ICPS) of the system with the perimeter security means available on the market. Such projects require many years of experience and a good knowledge of the features of perimeter security means. In recent years, there has been a constant update and modernization of technical means of perimeter security, and it is difficult for designers to thoroughly understand the features of numerous new products. Therefore, designers prefer to work with well-known and not always modern means of perimeter security. Thirdly, according to many consumers, it is possible to significantly reduce the cost of the system by limiting it to only an engineering fence of the perimeter, without much expense on the «perimeter». In this case, purely formally, the task of perimeter protection is completed.

Alexander LAVRINENKO:
From a technical point of view, there is no problem – a perimeter security system (PSS) can be integrated into a single security system along with an OPS, ACS, CCTV, etc. The problem here is deeper, it is that not every customer understands what a perimeter security system is and what its advantages are. And there are quite a few advantages. First of all, it is the first line of defense of an object. It is this line that allows detecting an intrusion at an early stage, when the intruder is as far away from his target as possible. Secondly, having received a signal from the PSS, the security service has enough time to make a decision on how to respond to the intrusion signal. Thirdly, a perimeter security system at large enterprises allows effectively combating burglars. Our company equipped a large cable plant with a perimeter security system. After the SOP was put into operation, the number of prevented attempts to take out material assets at the checkpoint increased tenfold, since the perimeter became practically inaccessible for taking out material assets, and this entire flow rushed to the checkpoint, and there they were already waiting for it …
Many customers have the opinion that all perimeter security problems can be solved with the help of CCTV. This is a mistaken opinion, and I think most professionals will agree with me. CCTV without a perimeter security system is defective, and this is where integration should be. Only the integrated use of perimeter detection equipment and CCTV allows you to create a reliable line of defense for an object from criminal attacks.

Leonid STASENKO:
The question is complicated. On the one hand, perimeter security systems (PSS) are equated to conventional security systems: it seems, what difference does it make what type of sensors guard the territory? That is probably why many do not focus on this, considering PSS to be equivalent to conventional security. Especially if perimeter sensors are connected to conventional security panels (which, given the sensor output as a “dry contact,” is generally plausible).
If we take more complex PSS with their own controllers and exchange protocols (and PSS often requires setting up many parameters, both for such a controller and for some types of sensors), then integration with them may seem economically unjustified to many — how many integrated systems can be sold with a specific unique type of perimeter security?

A question for discussion

The perimeter security system is not just a set of perimeter sensors. What does it include, what does integration with it imply?

Vladimir BERSENEV:
That's right, a modern perimeter security system is not just a set of sensors connected to the SSSI. A modern perimeter security device not only records the fact of a violation and transmits an alarm signal, but also has functions for controlling external devices. This can be turning on perimeter illumination floodlights in a local area, turning on a TV camera or another device. This significantly reduces energy costs, since only when an alarm signal occurs will the TV camera and floodlight be turned on. In the event that a person needs to be warned about accidentally entering a protected area, the perimeter security device includes a speech processor with a voice warning. In this case, the alarm signal will be transmitted to the central console only if the person does not leave the protected area in time.
The security system may include a backup power source based on a battery and a solar panel, while the power source status is monitored by the security system, and in the event of a power failure, a signal will be transmitted to the information collection system that a «power failure» has occurred, and not some kind of incomprehensible «alarm». Integration of the SSSI complex with modern perimeter security systems that have «intelligence» allows to somewhat unload the central computer of the complex and eliminate the human factor. In this case, the decision on local actions in the perimeter area is transferred to the perimeter security system, and not to the SSSI operator.

Alexander LAVRINENKO:
Indeed, if we consider the engineering and technical component of the perimeter security system, it includes fences, security detectors, power supply system elements, data collection, processing and display, and notification systems. The reliability of the system being created depends on the correct choice of the listed elements. And if the choice of a fence is not a very difficult task and its result largely depends on the taste and financial capabilities of the customer, then the correct choice of security detectors depends on many factors: first of all, these are probable threats to the security of the facility and the corresponding type of intruder, the type of fence, the presence of an exclusion zone, the presence of interference factors (transport, powerful energy of the facility, vegetation, animals, climatic conditions). There are currently quite a lot of detectors for perimeter protection, and only a competent designer with significant practical experience will be able to correctly solve the problem of selection.
The problem of integrating the SOP with other systems of the facility's security complex is solved by the data collection, processing and display system. It allows you to collect, summarize, conveniently convey information to the operator and save it for analysis by responsible persons.

Leonid STASENKO:
It happens both ways. There are simply sensors with an increased range and a reduced detection angle (for example, outdoor IR sensors), which in many cases are quite sufficient for solving perimeter security problems. In this case, there really is no fundamental difference between a standard fire alarm system and perimeter security.
However, for complex extended perimeters, there are specialized solutions based on different technologies or their combinations: these are vibration and seismic cables, two-position radio frequency sensors, etc. Moreover, the length of the boundary protected by a single sensor can reach not only tens, but also hundreds of meters. Some sensors allow localizing a violation on one «span» with some accuracy, and here, for obvious reasons, integration at the level of «dry contacts» is not enough.

Question for discussion

What are the differences between integration with perimeter security systems compared to integration with classic security alarm systems?

Vladimir BERSENEV:
The main difference is the distance from the SSSI to the protected areas. Long distances greatly affect the composition of the equipment that must be included in the structure of the complex. Basically, this is equipment for ensuring stable signal transmission from perimeter devices to the SSSI (and sometimes vice versa, for control or performance monitoring). Within the premises, it is sufficient to use the RS-485 interface, a low-power radio channel, or simply a wired security loop. At perimeters longer than 1–2 km, it is necessary to use so-called signal repeaters, video signal amplifiers, and other intermediate devices. Within the premises, there are practically no problems with the supply of uninterruptible power to the equipment. At long perimeters, it is sometimes impossible to use a 220 V network voltage. It is necessary to provide low DC voltage, take into account the voltage drop along the perimeter, etc. When transmitting a video signal in real time over distances longer than 1–2 km, technical problems with ensuring the quality of the video image also arise. The use of a fiber optic line for this purpose will require additional expensive equipment. That is, in each specific case of a long perimeter, specific technical problems always arise.

Alexander LAVRINENKO:
In my opinion, there is no significant difference. The only difference is in scale — the boundary protected by the perimeter security system can reach several tens of kilometers, while classic security alarm systems are located more compactly. Due to the significant distance of the linear equipment of the perimeter security system from the station equipment, it is necessary to solve problems that are not typical for classic systems — power supply of equipment, transmission of information over long distances.

Leonid STASENKO:
The differences are precisely in the specifics of the subject of protection itself and the technologies used. For example, displaying on a graphic plan a boundary protected by a vibration cable with a broken fence line requires introducing new components into the software to display on active graphic plans exactly such a perimeter line, arbitrary in length and configuration.
Perimeters are often additionally equipped with a video surveillance system, false alarms are not uncommon at such complex facilities, and with a perimeter length measured in kilometers, you can’t run around checking what’s there: an intruder or a large branch falling from a tree. And in this case, the perimeter security and video surveillance subsystems must work together, in a coordinated manner. Another example: the perimeter is periodically patrolled by a surveillance group, and it can be problematic not to get into the zone of a particular sensor, and it is unacceptable to remove the entire perimeter from security — in the dark, this is exactly when someone will overcome the protection. To solve this, you can use radio frequency identification technologies, when “long-range” readers are installed together with the sensor. The guards have the appropriate tags, and the sensor will not work for a guard, but it will work for an intruder. And everything is automatic, without human error.

Question for discussion

What new functionality can the customer get from such integration?

Vladimir BERSENEV:
First of all, it is a timely warning that a potential intruder has entered the territory where the protected objects are located. This gives time to prevent theft, a terrorist act, and finally, to prevent the death of a person who accidentally entered the territory that is dangerous to life or health. In addition, as was said above, it becomes possible to control various devices and equipment when an intruder appears in a specific section of the perimeter.

Alexander LAVRINENKO:
Firstly, it is security reliability. If the facility has a territory and does not have a perimeter security system, then it is pointless to talk about reliable security of the facility.
Secondly, the presence of a perimeter security system enables the security service to receive timely information about the violation of the protected boundary and additional time to respond to the fact of intrusion.
Thirdly, the television surveillance system automatically displays the image from the camera monitoring the perimeter section where the violation occurred on the alarm monitor upon the «Alarm» signal from the perimeter security system.
Fourthly, it is possible to talk about an access control and management system at a facility only if there is a reliable perimeter security system.
Fifthly, the perimeter security system is the basis for the security of a facility, regardless of its size, purpose and form of ownership. Unlike an internal security alarm, a perimeter security system requires significant financial costs, but having created it with the help of professionals, you can sleep peacefully.

Leonid STASENKO:
Actually, these capabilities were listed when answering the previous questions. Let's put them together again:
correct display of specific security zones of extended perimeter sections on graphic plans;
joint operation of the SOP and video surveillance — automatic display of the required camera on the monitor, if required — with the required presets (if the camera supports these functions);
the ability to fully control complex professional perimeter security systems with the ability to obtain complete information about the penetration point, as well as access to operational adjustments of the SOP characteristics.
Well, and the exoticism mentioned in the previous point — the ability to some additional automation due to the «friend or foe» system with virtually no deterioration in the quality of security.
I think that users will be able to come up with other tasks, the solution of which will be impossible without full integration.

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять