{"id":6000,"date":"2024-03-13T14:11:34","date_gmt":"2024-03-13T12:11:34","guid":{"rendered":"https:\/\/security-robotics.de\/?p=6000"},"modified":"2024-04-23T12:58:39","modified_gmt":"2024-04-23T10:58:39","slug":"perimeter","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/glossary\/perimeter","title":{"rendered":"Perimeter"},"content":{"rendered":"\n<p>In <a rel=\"popover\" data-title=\"security technology\" data-post-id=\"5907\" class=\"sr-glossary-link\" aria-label=\"Security technology\" href=\"https:\/\/security-robotics.de\/en\/glossary\/security-technology\">security technology<\/a>, a perimeter refers to the outer boundary area of a facility, plant or property. This can be realised by physical barriers such as fences, walls or gates. Protecting the perimeter is crucial to prevent unauthorised access and ensure the security of the underlying property. In <a rel=\"popover\" data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/a> and <span data-title=\"security technology\" data-post-id=\"5907\" class=\"sr-glossary-link\" aria-label=\"Security technology\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/security-technology\">security technology<\/span>, robots are playing an increasing role in monitoring and protecting <a rel=\"popover\" data-title=\"perimeters\" data-post-id=\"6000\" class=\"sr-glossary-link\" aria-label=\"Perimeter\" href=\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\">perimeters<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>In security technology, a perimeter refers to the outer boundary area of a facility, plant or property. This can be realised by physical barriers such as fences, walls or gates. Protecting the perimeter is crucial to prevent unauthorised access and ensure the security of the underlying property. In robotics and security technology, robots are playing [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[388],"tags":[459],"class_list":["post-6000","post","type-post","status-publish","format-standard","hentry","category-glossary","tag-perimeter-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Perimeter - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Perimeter\" \/>\n<meta property=\"og:description\" content=\"In security technology, a perimeter refers to the outer boundary area of a facility, plant or property. This can be realised by physical barriers such as fences, walls or gates. Protecting the perimeter is crucial to prevent unauthorised access and ensure the security of the underlying property. In robotics and security technology, robots are playing [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-13T12:11:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-23T10:58:39+00:00\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\",\"url\":\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\",\"name\":\"Perimeter - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"datePublished\":\"2024-03-13T12:11:34+00:00\",\"dateModified\":\"2024-04-23T10:58:39+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/perimeter#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/perimeter#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Perimeter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Perimeter - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/glossary\/perimeter","og_locale":"en_US","og_type":"article","og_title":"Perimeter","og_description":"In security technology, a perimeter refers to the outer boundary area of a facility, plant or property. This can be realised by physical barriers such as fences, walls or gates. Protecting the perimeter is crucial to prevent unauthorised access and ensure the security of the underlying property. In robotics and security technology, robots are playing [&hellip;]","og_url":"https:\/\/security-robotics.de\/en\/glossary\/perimeter","og_site_name":"Security Robotics","article_published_time":"2024-03-13T12:11:34+00:00","article_modified_time":"2024-04-23T10:58:39+00:00","author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/glossary\/perimeter","url":"https:\/\/security-robotics.de\/en\/glossary\/perimeter","name":"Perimeter - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"datePublished":"2024-03-13T12:11:34+00:00","dateModified":"2024-04-23T10:58:39+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/glossary\/perimeter#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/glossary\/perimeter"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/glossary\/perimeter#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Perimeter"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=6000"}],"version-history":[{"count":1,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6000\/revisions"}],"predecessor-version":[{"id":6009,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6000\/revisions\/6009"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=6000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=6000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=6000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}