|Home>||Security||>Access Control||>Axis Communications calls for “reinvigorated emphasis” on perimeter protection as threat vectors mutate|
|Home>||Security||>CCTV||>Axis Communications calls for “reinvigorated emphasis” on perimeter protection as threat vectors mutate|
|Home>||Security||>Cyber Crime||>Axis Communications calls for “reinvigorated emphasis” on perimeter protection as threat vectors mutate|
Axis Communications calls for “reinvigorated emphasis” on perimeter protection as threat vectors mutate
16 October 2020
NETWORK VIDEO specialist Axis Communications has called for a “reinvigorated emphasis” on the outer layer of security (ie the physical perimeter) in its latest White Paper entitled ‘Perimeter Protection with Intelligent Surveillance’.
As the global threat landscape continues to evolve with new and enterprising methods developed by criminals in a bid to breach organisations’ physical and virtual barriers, more advanced perimeter protection methods capable of providing verifiable real-time alerts, location data, target tracking and the ability to package the evidence and data for post-incident investigation are now “urgently needed”.
With the identification of new threat vectors, it’s important to continuously risk assess the types of attack and the resulting protective measures required. In the face of more stringent Government and industry regulations and standards around perimeter protection, a need to reduce manpower costs, and more awareness around increasing terrorist threats of different means and sizes, the security of the perimeter has never been more vital.
The White Paper explains the importance of employing comprehensive protection at the perimeter and offers a breakdown of sensor options and applications, highlighting the key points for consideration across all industries when choosing and implementing such a solution.
In the case of critical infrastructure sites, for example, a breach could be catastrophic, with the possibility of someone tampering with water quality or altering gas pressure bringing huge risks and the potential loss of life. In addition to this, a physical attack can often coincide with a cyber attack, with any such the dual approach serving to confuse staff and leave key assets vulnerable.
Weak link in the chain
While many organisations already implement effective cyber security strategies, an inadequately guarded perimeter can prove to be the weak link in the chain, enabling criminals to access premises and cause damage to key assets by launching a well-orchestrated attack.
Intelligent physical security solutions can play a vital role in securing a site. Barriers and gates will work to slow down an intruder, or delay someone entering a premises, but it’s the installation of automatic intrusion detection technology that will prove a formidable defence against today’s threat actors.
Lucas Young, business development manager for network surveillance at Axis Communications with a keen focus on the transportation and critical infrastructure markets, commented: “As threats and countermeasures evolve, one critical aspect remains constant. That is the integrity and security of the perimeter, which itself is a fundamental consideration when it comes to providing a safe and secure environment for all staff, visitors and members of the public. With regulations placing more and more onus on industry sectors to demonstrate security understanding and compliance, a scalable, future-proof solution that’s backed by the full support of a trusted partner will create a formidable barrier against the next generation of attacks.”
Network cameras offer high quality video surveillance both inside and at the perimeter of a site, with options such as thermal image detection further enhancing this capability. The capture of real-time evidence of a physical attack in progress, rather than the after-the-fact forensic video typically offered by legacy systems, provides management with timely evidence of any attack on the premises as it occurs.
IP audio systems, comprising digital speakers on a network, can be used to sound alarms and issue live or pre-recorded verbal warnings, complementing video for a combined audio-visual deterrent and surveillance solution.
Understanding current technology capabilities as well as an appreciation of future trends is a sound operational security and procurement approach for any security practitioner. To aid in knowledge building and enable customers to make an informed decision around the adoption of such solutions, the Axis Communications White Paper covers the following key areas:
*Perimeter protection solutions: Physical solutions and intrusion detection
*Video-based solutions: Application of cameras, thermographic and visible light options
*Modern enhancements: Processing speeds, deep learning, Artificial Intelligence and analytics
*Cost evaluation: Establishing total cost of ownership and measuring RoI
Through the multi-layering of different measures, commonly referred to as ‘defence in depth’, comprehensive protection is achieved when all of these layers work together. Security is not significantly reduced with the loss of any single layer. Such a converged approach towards security is, according to Axis Communications, the “best line of defence” as the dynamic threat evolves, with strategies employed across physical and cyber security to address vulnerabilities and maximise resistance.
Involvement with partners and vendors to build trusted relationships across the supply chain guarantees the authenticity and integrity of such systems and helps in building a smarter and safer world.
*Download the Axis Communications White Paper Perimeter Protection with Intelligent Surveillance