Leading-edge technologies reshaping perimeter protection

Selection of the best electronic perimeter security equipment is formidable and demanding.


Selection of the best electronic perimeter security equipment is formidable and demanding. With the perimeter marking the first line of defence against unwanted intruders, it’s pivotal that the correct equipment is chosen and withstands complex challenges posed by variations in site conditions. In a new report covering the world market for electronic perimeter security equipment, IMS Research (recently acquired by IHS Inc.) provides a greater understanding of the relationship between technology and key industry verticals.

“Two end-user industries with unique circumstances, and thus opportunity, are renewable energy facilities and water utilities,” Report author and Analyst at IMS Research Lily Aung comments. “Renewable energy sites are expected to see increased demand for photovoltaic systems on the back of government subsidies and a number of large solar farm projects. Being in remote locations, the solar farms present ample opportunity for perimeter protection equipment due to the high value equipment found on the premises.”

Improvements in technology are also changing the way in which perimeter security equipment is deployed on site. The increasing commercialization of thermal imaging cameras for general perimeter security, and increased uptake in buried cable are just two examples of this technology transformation. Aung adds: “Historically the largest markets for thermal imaging cameras has been in the government space, but the advent of uncooled thermal imaging cameras, at a lower price point, is increasing the adoption rate of thermal imaging cameras used for perimeter security. Growth in the buried cable market stems largely from its appeal as a hidden sensor that will either detect using seismic or volumetric technology.” 

The transition to incorporate and integrate mature and leading edge technology is reshaping the future of the perimeter security market. New product combinations are being used to improve capture rates, promote real-time detection and enhance prompt identification and response. With many verticals looking to coordinate security at the perimeter, the market is well-positioned for strong growth over the medium-term.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
Variable speed drives: Smooth, efficient, electrically quite motion control; Process control upgrades; Mobile intelligence; Product finalists: Vote now; Product Exclusives
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
This article collection contains the 5 most referenced articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security