You are on page 1of 2

Insights to Perrimeter Intrusion Detection Technologies

The physical security of any enterprise is an essential entity that is the most prone to external assaults. So, it is highly
inevitable to plan all the sub-elements strategically to prevent exposure from threats. Each enterprise has its unique
challenges while defining the security policies. Perimeter Fence or wall is the first line from where any intruders can get
entry authoritatively or un-authoritatively. There are very high chances of threats like theft, asset assault, terrorism, and
many more. Securing the perimeter is the first step for any organization to preclude any of the external intrusion events let
it be a small organization, big enterprise, or federal facility. Perimeter or Fence Intrusion Detection System (PIDS or FIDS) is
a hardware or software or combination of both which deals with the prevention, detection, and response to unauthorized
persons and/or goods from crossing a perimeter. It allows the organization to monitor a vast amount of area, accurately
identify potential threats and react in any complicated scenario attentively. The main agenda of this system is to efficiently
manage this vast amount of data and leverage its capabilities for perimeter protection. This includes making it easy for
operator interaction, making it intelligent, leveraging real-time and recorded data, and enabling it to work with other
sensors.

While designing PIDS for any facility, there are innumerable variables that need to be taken into considerations starting
domestic locality, environmental conditions, land type, industry type, the criticality of industry, the convenience of
monitoring, and a lot more. There are mainly four types of PIDS:

Barrier Mounted To be deployed in combination with Fence, gates, physical barrier, etc.
Ground-Based To be deployed below ground which doesn’t require any other mounting tendency
Free-Standing To be deployed above ground without any conjunction to existing perimeter
Rapidly Deployable Quick deployable for temporary detections can contain of any of the above application areas

There are a lot many technologies available in the market which can be nominated based on the application requirements
and other variables involved at specific enterprises. The PIDS market is performance-driven and open that simply a system
can offer to interface with third-party legacy systems at affordable rates to gain effective ROI to the organization.

The typical PIDS system consists of the below-mentioned sub-components –

The sensing element is the hardware or sensor which measures the deflection/deviation parameter in an ideal condition.
Group of sensors is connected via TCP/IP or Wireless or RS485 or any specific types of communication medium in order form
sensor network. These sensor networks uplink to the detection element usually termed as Intrusion Controller which can be
one or more into the entire system based on the application status quo. It is called the heart of the system which takes care
of the entire sensor network which is lied across the perimeter. This element is usually installed on the field itself and
commonly gets connected to the same medium with which the sensors are connected. It is the components that have all
the foundations of the system to consider an event into alarm. It holds the configurations like threshold values, sensitivity,
schedules, and saturation or may more capricious parameter drives the parameters of the system. The intrusion controller
then redirects to the Processing engine which usually is the web interface or administrating database where all the central
data gets stored. It takes care of alarm generation, user configurations, user authentications, entity mapping, and logical
plotting of individual elements on the GUI. It withholds the functionalities like notifying users, metadata of alarms, alarm
management, and many more functionalities. It is the interface of the system which integrates with 3rd party systems to
achieve Physical Security Management of any premises in a very efficient manner. Such integrations can be hardware-based
or API based or through middleware.

Prepared By: Maulik Tanna


Insights to Perrimeter Intrusion Detection Technologies

Prepared By: Maulik Tanna

You might also like