SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Extending perimeter protection beyond the fence line with SpotterRF

Extending perimeter protection beyond the fence line with SpotterRF
Extending perimeter protection beyond the fence line with SpotterRF
Extending perimeter protection beyond the fence line with SpotterRF
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version

In a layered approach to security, the outermost layer increasingly might refer to an area outside a fence line. The sooner a facility is alerted to a possible threat, the better, and when a threat reaches inside a facility’s fence, it may be too late to mitigate it. Security directors need situational awareness that extends outside the facility and provides the ability to intercept intruders before they become a threat.

Zones of interest, or buffer zones, outside a facility’s fence line are particularly important for security professionals at facilities such as refineries, electrical stations, chemical plants and other elements of critical infrastructure. Ground-based radar systems are expanding the capabilities of buffer zone surveillance at economical prices and with low false alarm rates. Use of multiple radar streams and “behaviour filters” to analyse moving targets has demonstrated its capability in such applications to provide an early warning of intruders and/or to guide pan-tilt-zoom cameras (based on GPS coordinates) to provide real-time images of intruders before they get inside a facility.

“What we’re seeing is an upswell in interest and implementation,” says Logan Harris, CEO of radar system supplier SpotterRF. “Security managers are saying it isn’t enough to have sensors on the fence line. Now we need situational awareness of what’s going on around a facility, and to intercept it before it becomes a threat.” The flexibility of behaviour filters allows adjustments to define specific behaviours and ignore irrelevant data.

The technology has particularly gained attention in the utility industry, which is looking for a means to mitigate risks such as an attack last year on PG&E Corp.'s Metcalf electric power transmission station near San Diego, Calif., involving a sniper who fired a high-powered rifle for 19 minutes and knocked out 17 giant transformers that supply electricity to Silicon Valley. This August, the same electrical substation was breached for a second time, despite the utility’s efforts to bulk up security after the initial attack.

“A lot of security risks, especially internationally, may be a matter of life and death, and two minutes’ advance warning can make all the difference,” says Harris. “That’s where we come in, giving them that extra early warning.” The simplified system could be installed by anyone with experience setting up an IP camera, Harris says.

"Security managers are saying it
isn’t enough to have sensors on
the fence line. Now we need
situational awareness of what’s
going on around a facility, and to
intercept it before it becomes
a threat"

SpotterRF has teamed with Sensei Solutions to provide a perimeter security approach for electric utilities. Combining SpotterRF radar with Sensei’s sensor fusion software enabled false alarms to be reduced to zero after processing 77,000 events during an eight-week trial period, according to Harris.

Displaying its technology at ASIS, SpotterRF saw a lot of interest among utilities and oil and gas companies, and there were some other applications mentioned, too. For example, Harris says SpotterRF can help prevent remotely controlled quadcopters (or drones) from delivering contraband over a fence and into a prison. “They need something that can detect small objects in the air, and our radar is suited for that,” he says.

SpotterRF is also a component of the perimeter protection of Mount Rushmore National Memorial in South Dakota, where it helps to protect wide open spaces and rough terrain. Mount Rushmore covers more than 1,200 acres that require constant monitoring, and SpotterRF radar amplifies the effectiveness of existing systems, which include infrared (IR) cameras, video analytics and other intrusion detection technologies.

The company’s newest, widest-coverage radar system – the SpotterRF C950 – is a trim five pounds and provides 300-acre coverage (twice the previous area). There are no moving parts to maintain as with rotating radar that provides similar coverage potential.

Weather conditions such as rain and snow can negatively impact the effectiveness of video analytics systems, and low temperature differentials (such as when a human walks across hot pavement) can undermine the effectiveness of thermal cameras for early detection. “Radar uses a completely different method, transmitting RF waves, bouncing off targets and then being evaluated. It’s all solid-state, we scan an entire area seven times a second. We collect more data and use efficient algorithms to identify and rule out objects that are not of interest (such as the wind blowing trees). This reduces false alarm rates.”

A SpotterRF mobile kit can be used to protect a smaller substation in less than an hour, and weighs less than 50 lbs. Magnetic clamps make installation quick; the system plugs into the wall, uses a cellphone modem and can be operating in less than an hour. Security system manufacturers are integrating their systems with SpotterRF; for example, Honeywell highlighted its Vindicator system’s integration with SpotterRF at the ASIS 2014 trade show.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Industrial security
  • Perimeter security
  • PTZ cameras
  • Video analytics
  • Intrusion detection
  • Perimeter protection
  • Related links
  • ADPRO Intruder detectors
  • Honeywell Security CCTV cameras
  • Honeywell Security Intruder detectors
  • Xtralis Intruder detectors
  • Related categories
  • CCTV cameras
  • Intruder detectors
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
2026 Trends in retail security: Interface Systems insights

2026 Trends in retail security: Interface Systems insights

Why open matters in the age of AI

Why open matters in the age of AI

Verkada: AI-driven security revolution & $5.8B valuation

Verkada: AI-driven security revolution & $5.8B valuation

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Security beat
About this page

Explore top video analytics trends reshaping security, including AI-driven insights, GDPR compliance, and facial recognition advances.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec