AXIS Perimeter Defender uses edge-based video analytics for maximum accuracy, efficiency and scalability
The solution specifically meets the needs of high-security perimeter protection scenarios

Axis Communications, the market leader in network video, is demonstrating the newly launched AXIS Perimeter Defender, a solution for large-scale perimeter protection, at Security and Counter Terror Expo 2016 in Olympia, London. The new system, which recently won the Video Analytics award at ISC West in Las Vegas, is a high-end video analytics application for intrusion detection for the enterprise market.

The launch is enabling Axis’ partners to deliver a scalable and flexible perimeter defence solution using Axis thermal cameras and optical pan, tilt, zoom (PTZ) cameras, AXIS Perimeter Defender and Axis network horn speakers.

Perimeter protection for critical infrastructures

The team will be showcasing the new technology on stand E45 at Security and Counter Terror Expo 2016, which is being held on 19th – 20th April. Axis experts will be on hand to guide delegates through the new technology, as well as highlight Axis’ innovative approach to the Internet of Security Things, which recognises that today’s security solutions have a much higher demand placed upon them in terms of openness and interoperability.

Designed for easy installation, configuration and management, AXIS Perimeter Defender uses edge-based video analytics for maximum accuracy, efficiency and scalability. The application supports multiple detection scenarios including several types of intrusion detection and loitering. It specifically meets the needs of high-security perimeter protection scenarios such as power plants, chemical plants and demanding installations where there is a need to reinforce the physical access control system with reliable intrusion detection.

“Scalability is a key challenge in high-security scenarios as a perimeter may require anywhere from 10 to 100 cameras,” states Peter Friberg, ‎Director Solution Management at Axis Communications. “By performing analytics at the edge, in the cameras themselves, AXIS Perimeter Defender does not depend on a central server to process the video footage. This makes the solution highly scalable, as there is no need for system redesign or expensive hardware replacements each time a new camera is added to the network.”

i-LIDS certified intrusion detection analytics

“This year at Security and Counter Terror Expo, we’re thrilled to demonstrate our leading perimeter protection solution which brings i-LIDS certified intrusion detection analytics to the edge,” states Daren Lang, Business Development Manager at Axis Communications. “Axis has a proven track record in helping secure many critical infrastructure sites across a variety of market segments. Security and Counter Terror Expo presents the perfect platform to showcase innovation, including Axis’ Perimeter Defender and other new products such as those addressing the need for explosion-proof specifications, to the market.”

AXIS Perimeter Defender has been certified for sterile zone monitoring applications by i-LIDS®, the UK government's benchmark for Video Analytics (VA) systems developed in partnership with the Centre for the Protection of National Infrastructure.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?