• Home
  • |
  • Blog
  • |
  • Crafting The Best Perimeter Intrusion Detection System

December 27, 2017

Crafting The Best Perimeter Intrusion Detection System

Sadly, not everyone trying to break into your property will yell “Leeroooooy Jeeeenkiins!” on their way in.

To detect more subtle types, you will want to invest in a perimeter intrusion detection system.

PIDS combine several elements to restrict access to areas. Restricting access prevents information and resources from exfiltrating your control.

When deciding to install a PIDS system for your enterprise, know what each element does and the necessary roles they play.

Elements of a Perimeter Intrusion Detection System

Effective security measures need to be dynamic with overlapping components. Each of these broad categoric elements provides a key piece of the overall security plan.

Remember that a solid security plan also includes staff and monitoring services.

Threat Assessment

Often overlooked, knowing who and what wants into your facility forms the bedrock of a perimeter intrusion detection system. A system designed to stop one type of intruder will do a poor job to stop another kind.

Accounting for the value of assets provides clues about intruders. If the security system’s value outweighs what it protects, you have made a poor choice.

The system itself should reflect the threat. More obtuse intruders will be more easily swayed by obtuse measures. Subtle threats require subtle measures.

Physical Barriers

Fences serve a two-fold purpose. They delineate property so that the public knows where a border exists. They also limit access to an area.

A physical barrier works best when it creates an easy line-of-sight out while limiting the same in.

Physicals barriers also act as solid anchor points for other security measures.


Sensors from the core of a PIDS. Sensors do the bulk of the work in monitoring a perimeter.

Physical security staff work in conjunction with sensors.

Ground-based sensors attached to barriers monitor areas. Utilizing a combination of video, bistatic microwaves, and electromagnetic fields to provide coverage.

Below ground sensors detect changes in pressure. This provides additional information about types of intrusion.

Distributed acoustic sensor systems (DAS) work best underground. These utilize fiber-optic cables to create highly responsive feedback systems. Sophisticated software determines likely causes of vibrations. The system has garnered a lot of attention in the past 4 years.


The workhorse of a perimeter intrusion detection system sends alerts. Alarms may be obvious, to deter an intrusion in progress, or subtle, to aid in apprehension.

Obvious noises and flashing lights create stress for intruders. Plans tend to go awry when the noise level spikes.

Off-site alarm monitoring provides advantages and disadvantages. Advantages include bypassing power loss or system break-ins onsite from preventing detection. They do limit response time, however.


An unsung hero of the security effort, integration links the other elements together to create a more effective net.

Integration technologies prevent false alarms most commonly. Integration technology confirms intruders over natural elements. They do this through nuanced protocols for sensor types.

Background Check

For more information about security systems and their benefits, check out our blog. We provide valuable information about security and communications systems. These systems assist business in staying profitable and protected.

Related Posts

Touchless Keypads for Times Like Now

Touchless Keypads for Times Like Now

What Type of Contract Length Can I Expect from My Security Providers?

What Type of Contract Length Can I Expect from My Security Providers?

Will My Security System Still Work When There Is Power Outage?

Will My Security System Still Work When There Is Power Outage?

What is Structured Cabling?

What is Structured Cabling?

Stephanie Calway

Leave a Reply

Your email address will not be published. Required fields are marked

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}