Physical Security

How to Increase Service and Safety with Perimeter Security

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence.

October 1, 2013

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence. This is not science fiction, but it is a product in progress: after receiving a nearly £600,000 ($935,340) investment, MicroSence Solutions in the Northern Ireland Science Park is working on an invisible microwave barrier to boost perimeter fence security, especially at power plants, airports and borders.

But while this technology is still a ways away from the average installation, there are still numerous options for security technology to help maintain perimeter security.

Guard-booths are one technology that offer both protection to the perimeter and to the enterprise’s security officers, especially for bullet-resistant booths.

For the San Ysidro Landed Port of Entry, the busiest land port in the world located between San Diego and Tijuana, Mexico, 50 custom-design, bullet-resistant guard booths are being installed to double the pace of inspection without sacrificing security. The port processes an average of 50,000 northbound vehicles every day, and the new stops feature two stacked bullet-resistant inspection booths to double the capacity of the 24 existing booths.

The installation also includes photovoltaic and Ethylene Tetrafluoroethylene (ETFE) roof structures to shade cars and security officers, and its translucent nature allows for natural light. This reduces or eliminates the need for artificial lighting during the day, reducing energy costs. 

The $5 million project also added (K4-rated) barricade swing gates where vertical lifts are impractical to install, plus additional barriers and bollards.

At Loyola University in Chicago, Ill., security extends even beyond the official perimeter of the campus to protect students who live in the surrounding areas. According to Tim Cunningham, Student Community Liaison Officer for Loyola’s campus police department, two off-campus satellite offices serve as a safe space for students in trouble.

With emergency phones both inside and outside of the storefronts, students can immediately contact the campus dispatch center. In order to get inside the booth, students must use their school-issued swipe card, which also adds a level of security to the safe-houses. The emergency phones are under surveillance, so dispatchers have an additional resource to help them determine the exact nature of the emergency.

Students at Loyola are introduced to security through the summer orientation programs, as well as through multiple outreach programs throughout the school year and on social media, reminding them of safety tips and what resources are available.

What resources and technology is available to you, as an enterprise security executive? Check out this product gallery for newly released perimeter security tools.


Specifications for a High-Tech, Bullet-Resistant Booth


Level 1:Impact

Level 2:Handgun – 9mm or .357

Level 3:Handgun – .44 Magnum,

   5.5 ammunition or 12-guage shotgun

Level 4:High-power rifle such as a 30.06, 7.62 ammunition, hand grenade, high explosive

Data courtesy of Delta Scientific


Perimeter Product Gallery

Helps Perform Maintenance at the Door

This fully integrated technical diagnostics and configuration device helps enterprise security professionals manage access control preferences directly on a security revolving door. The LCD touchscreen, built directly into the end-post on the secure side of the door, enables authorized users to access the software through a username and password. You can set different security modes to operate during different times of the day or week – for example, card-in/free out during business hours, card-only in evenings and locked on weekends. Technicians can also quickly check the door’s status to keep everything working smoothly or schedule maintenance alerts after a predetermined number of uses.

Find out more at

Blends in with Artful Architecture

Inspired by the charm of Southern plantation architecture, this booth’s tough steel exterior includes painted window muntins and mullions, architectural tube steel and base trim and crown molding, combining an aesthetically pleasing appearance with durable and functional construction. This security booth also includes tinted class, air conditioning and built-in preps for cameras and data.

Find out more at


Enables Perimeter Intruder Detection in Irregular Locations

In order to manage perimeter security in storage yards, substations, car lots or blind spots in unusual topography, this smart thermal camera detects intruders at distances of up to 60 meters at a 63-degree field of view. Versatile camera placements can eliminate the need for additional infrastructure such as poles and trenching, plus it leverages on-board video processing for high Probability of Detect and low Nuisance Alarm Rates. The camera consists of a thermal imager with lens optics, electronic stabilization, image contrast enhancement, video analytics software, camera control and geospatial target tracking for more accurate detection.

 Find out more at

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.