Perimeter
Security

bar-01

Whether you are protecting critical infrastructure, key resources in your facility, or high-risk locations, IntelliSite AI, IoT and connectivity based solutions are the answer.

Solution

IntelliSite’s solution for Perimeter Security eliminates false alarms through the use of proprietary AI and IoT technology. Our intelligent solution automatically recognizes activity from vehicles and people that can represent potential threats to your physical locations or to your key resources.

Coupled with our end-to-end solution monitoring, you can count on IntelliSite’s Perimeter solution for flawless execution, regardless of the weather.

Advanced technology

Our self-contained solution is composed of an edge compute device, often mounted on a pole, and multiple high-definition cameras that are connected to capture any activity on the monitored area — day or night. IntelliSite’s deep learning based software runs fully at the edge, providing real-time alerts, with high accuracy levels and low false positive rates. Any activity can be detected such as: loitering, trespassing, ingress and egress of vehicles, license plate recognition, or just a person or vehicle detected in a restricted area. Our advanced technology ignores things like wild animals and changes in the weather, significantly reducing false alarms.

PERIMETER SECURITY

Challenges

While there are many ways to detect the intent to breach a perimeter, the most popular is the use of video surveillance. When implementing a camera-based perimeter security solution, the two greatest challenges are managing the number of false alarms and managing unpredictable behavior during inclement weather.

The reliability of activity detection can be hindered by legacy video surveillance systems, which not only produces a high number of false alarms but also causes operators to start ignoring alarms.  

When it comes to city parks, homeowner associations, water treatment plants, electricity utilities, remote sites in refineries and mining sites, solar parks, factories, cell towers, national security, and others, perimeter security is one of the most important aspects to consider in the overall security plan. So it’s important to choose a reliable, trustworthy solution.

PERIMETER SECURITY

FaQ

How reliable is it?

The only difference between a good and an ineffective perimeter intrusion detection system is the number of false alarms. We use high performance AI and then IntelliCare’s 24×7 Event Monitoring Service filters any remaining false alarms, ensuring you only receive true, validated alarms. Our solution leverages deep learning technologies that minimize false positive detections such as wild animals, weather phenomenon and reflections from headlights. We constantly monitor system efficacy and validate accuracy through manual counts to adjust when necessary and optimize performance.

How can I get a regular report on progress without having to log in every week to check?

Scheduled reports are automatically emailed to you and the designated individuals in your organization and will contain all the information you need, from daily statistics to security incidents and how they were resolved.

Can I receive notifications when an incident happens?

Through DeepInsights, you can configure SMS or email alerts to the designated individuals you want to notify. Additionally, those events can be validated through our 24/7 event monitoring service.

How long is video retained?

Video recording is stored at the edge, near the camera, for plus 30 days. Live video is pulled into DeepInsights cloud platform on demand so it does not consume your cellular bandwidth. This means that you will be able to retrieve video evidence from an incident up to that period in the past.

How long does it store metadata?

For the analytics and metadata results, the system can store events for up to 6 months. Access is provided through DeepInsights. The exact number of days can vary slightly based on the amount of activity in the scene. More storage capacity can be requested.

Can I rebrand the system?

Yes, in fact, it is recommended, as your brand is something your community will immediately recognize. Through our Citizen Engagement program, you will be able to apply a large decal to the unit to reinforce the fact that you are taking the initiative to monitor traffic safety.  Citizens will scan a QR code to have access to the full information.

Can I reuse our fiber that already exists at an intersection?

Yes, the system can reuse your fiber infrastructure instead of using a cellular connection.

Can I integrate with an existing VMS we used?

Yes, our system supports integration with the most common Video Management Systems for alerting and video management. New custom integration can be done on demand though MQTT, Kafka, HTTP, or other communication mechanisms.

If it is solar powered how does it work at night?

The on-board battery completely powers the system for up to 30 days. Also, the camera has night vision, which uses an IR illumination to provide a clear image at night.

Solutions

Solution

IntelliSite’s solution for Perimeter Security eliminates false alarms through the use of proprietary AI and IoT technology. Our intelligent solution automatically recognizes activity from vehicles and people that can represent potential threats to your physical locations or to your key resources.

Coupled with our end-to-end solution monitoring, you can count on IntelliSite’s Perimeter solution for flawless execution, regardless of the weather.

Advanced technology

Our self-contained solution is composed of an edge compute device, often mounted on a pole, and multiple high-definition cameras that are connected to capture any activity on the monitored area — day or night. IntelliSite’s deep learning based software runs fully at the edge, providing real-time alerts, with high accuracy levels and low false positive rates. Any activity can be detected such as: loitering, trespassing, ingress and egress of vehicles, license plate recognition, or just a person or vehicle detected in a restricted area. Our advanced technology ignores things like wild animals and changes in the weather, significantly reducing false alarms.

PERIMETER SECURITY
Challenges

Challenges

While there are many ways to detect the intent to breach a perimeter, the most popular is the use of video surveillance. When implementing a camera-based perimeter security solution, the two greatest challenges are managing the number of false alarms and managing unpredictable behavior during inclement weather.

The reliability of activity detection can be hindered by legacy video surveillance systems, which not only produces a high number of false alarms but also causes operators to start ignoring alarms.  

When it comes to city parks, homeowner associations, water treatment plants, electricity utilities, remote sites in refineries and mining sites, solar parks, factories, cell towers, national security, and others, perimeter security is one of the most important aspects to consider in the overall security plan. So it’s important to choose a reliable, trustworthy solution.

PERIMETER SECURITY
Resources
FAQs

FaQ

How reliable is it?

The only difference between a good and an ineffective perimeter intrusion detection system is the number of false alarms. We use high performance AI and then IntelliCare’s 24×7 Event Monitoring Service filters any remaining false alarms, ensuring you only receive true, validated alarms. Our solution leverages deep learning technologies that minimize false positive detections such as wild animals, weather phenomenon and reflections from headlights. We constantly monitor system efficacy and validate accuracy through manual counts to adjust when necessary and optimize performance.

How can I get a regular report on progress without having to log in every week to check?

Scheduled reports are automatically emailed to you and the designated individuals in your organization and will contain all the information you need, from daily statistics to security incidents and how they were resolved.

Can I receive notifications when an incident happens?

Through DeepInsights, you can configure SMS or email alerts to the designated individuals you want to notify. Additionally, those events can be validated through our 24/7 event monitoring service.

How long is video retained?

Video recording is stored at the edge, near the camera, for plus 30 days. Live video is pulled into DeepInsights cloud platform on demand so it does not consume your cellular bandwidth. This means that you will be able to retrieve video evidence from an incident up to that period in the past.

How long does it store metadata?

For the analytics and metadata results, the system can store events for up to 6 months. Access is provided through DeepInsights. The exact number of days can vary slightly based on the amount of activity in the scene. More storage capacity can be requested.

Can I rebrand the system?

Yes, in fact, it is recommended, as your brand is something your community will immediately recognize. Through our Citizen Engagement program, you will be able to apply a large decal to the unit to reinforce the fact that you are taking the initiative to monitor traffic safety.  Citizens will scan a QR code to have access to the full information.

Can I reuse our fiber that already exists at an intersection?

Yes, the system can reuse your fiber infrastructure instead of using a cellular connection.

Can I integrate with an existing VMS we used?

Yes, our system supports integration with the most common Video Management Systems for alerting and video management. New custom integration can be done on demand though MQTT, Kafka, HTTP, or other communication mechanisms.

If it is solar powered how does it work at night?

The on-board battery completely powers the system for up to 30 days. Also, the camera has night vision, which uses an IR illumination to provide a clear image at night.

Smart Perimeter
Security In Action

IntelliSite’s Smart solutions consist of hardware, AI software, and connectivity that work together to detect and deter people and vehicles from loitering or intruding restricted areas.

Line 5

Smart Solution

Benefits

is-theft-icon-lineCreated with Sketch.
Reduce theft
and
loitering
is-police-icon-lineCreated with Sketch.
Augment security
monitoring in areas outside
of a patrol route
is-loud-speaker-lineCreated with Sketch.
Stop perpetrators with
“voice-downs”
is-alarm-icon-line (1)Created with Sketch.
Automatically
trigger alarms
is-camera-icon-lineCreated with Sketch.
Capture footage
as evidence
is-analytics-icon-lineCreated with Sketch.
Track illegal activity
stats over time
is-time-icon-lineCreated with Sketch.
Reduce response
time to scene
GroupCreated with Sketch.
Leverage technology to save and improve lives.
59Created with Sketch. Perimeter Solution 
Components
UIG Copy 3Created with Sketch.
Ruggedized edge
compute gateway (UIG)
with AI hardware
acceleration
is-camera-icon-lineCreated with Sketch.
High resolution
cameras pointing to
the 
restricted areas
54Created with Sketch.
IntelliSite AI Software for
loitering, trespassing,
license plate recognition
is-analytics-icon-lineCreated with Sketch.
Deep Insights for
Visualization, Search and
Video Management
32Created with Sketch.
Cellular 4G/LTE
connectivity
(5G where available)
is-loud-speaker-lineCreated with Sketch.
“Voice down”
loudspeaker and
microphone
11Created with Sketch.
Solar power source
(optional add-on)
10Created with Sketch.
24x7 remote support
and event
monitoring service
Making smart 
communities and 
business affordable

IntelliSite enables cities and business to benefit from our technology with an affordable
monthly fee. Our affordable plan eliminates the initial capital expenditure and combines the
cost of all the solution components:

Edge compute UIG hardware
Our innovative IntelliSite software
IntelliCare
Eyes On
HD cameras
IoT sensors

All-in-one simple price that’s only a few hundred dollars per month provides a very low barrier to access cutting-edge security technology powered by AI and IoT

Perimeter
Security 
In Use

See how clients have utilized our Smart Perimeter solution to solve their unique security issues.