Sign Up for FREE Daily Energy News
canada flag CDN NEWS  |  us flag US NEWS  | TIMELY. FOCUSED. RELEVANT. FREE
  • Stay Connected
  • linkedin
  • twitter
  • facebook
  • instagram
  • youtube2
BREAKING NEWS:
Hazloc Heaters
Copper Tip Energy


Intrusion technology for a changing world today, and tomorrow


These translations are done via Google Translate

web_ci_prevent_unauthorized_access_558x300_ca_2108

Security plans for critical infrastructure facilities differ from site to site depending on the complexity of the location. At a time where resources are limited, when it comes to personnel what are some solutions you can implement to ensure you know what’s happening in and around your perimeters?

Let’s take for example a safety issue arises with one of your employees on site that is critical, and your security manager(s) tend to that specific area where the employee was hurt on the job. While your personnel are tending to the important matter and securing the location, another area of your site is invaded by intruders looking to escape with high value assets. How can you ensure you always have visibility to all locations on (or around) the site even while you’re mobile or your team resources are stretched?

Proactive technology such as AXIS Perimeter Defender gives you an edge where right where security starts—at the perimeter of your facilities or, in and around critical areas you want to protect. The video analytics application, together with Axis network cameras, provides a highly effective system that automatically detects and responds to people and vehicles intruding into your protected areas. A comprehensive perimeter defence helps to reinforce physical access control while also well suited for high-security sites such as refineries, chemical plants, construction sites and power plants to name a few.

Getting prepared

One of the first considerations for those managing critical infrastructure sites would be to establish a perimeter protection plan of your own. Looking for recommendations? Access our complimentary eGuide here for areas of interest for considerations.

Innovative in a solution

Video motion detection technologies have evolved from pixel-based analysis to smarter, object-based detection that can alert based on object size and speed. IP devices are becoming more powerful at the edge and can run advance analytics for detection and reducing false alarms. Not only does working with IP surveillance make things easier with a click of a button but moving to the edge also means the central server’s processing power can be utilized for other activities, optimizing operational costs and efficiencies for the organization.

AXIS Perimeter Defender can detect and trigger an alarm using four different types of scenarios:

  1. Intrusion: When a person or vehicle enters a predefined zone.
  2. Zone crossing: When a person or vehicle passes through two predefined zones in a predetermined order and direction.
  3. Loitering: When a person or vehicle remains in a predefined zone for longer than a predefined time.
  4. Conditional zone crossing: When a person or vehicle enters a predefined zone without first entering from or passing through one or more predefined zones.

Looking to create a more secure site, uninterrupted operations and a safer workforce – in every step of your operations? Get tips, insight and understand technology applications by downloading your free eGuide here.   

For more information please reach out to Obaid Hafiz through email or phone.

Obaid Hafiz
Area Sales Manager, Axis Communications
T: (587) 226 1664
E: Obaid.Hafiz@axis.com



Share This:



More News Articles


GET ENERGYNOW’S DAILY EMAIL FOR FREE