Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Physical Security

How to Increase Service and Safety with Perimeter Security

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence.

October 1, 2013
Trans

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence. This is not science fiction, but it is a product in progress: after receiving a nearly £600,000 ($935,340) investment, MicroSence Solutions in the Northern Ireland Science Park is working on an invisible microwave barrier to boost perimeter fence security, especially at power plants, airports and borders.

But while this technology is still a ways away from the average installation, there are still numerous options for security technology to help maintain perimeter security.

Guard-booths are one technology that offer both protection to the perimeter and to the enterprise’s security officers, especially for bullet-resistant booths.

For the San Ysidro Landed Port of Entry, the busiest land port in the world located between San Diego and Tijuana, Mexico, 50 custom-design, bullet-resistant guard booths are being installed to double the pace of inspection without sacrificing security. The port processes an average of 50,000 northbound vehicles every day, and the new stops feature two stacked bullet-resistant inspection booths to double the capacity of the 24 existing booths.

The installation also includes photovoltaic and Ethylene Tetrafluoroethylene (ETFE) roof structures to shade cars and security officers, and its translucent nature allows for natural light. This reduces or eliminates the need for artificial lighting during the day, reducing energy costs. 

The $5 million project also added (K4-rated) barricade swing gates where vertical lifts are impractical to install, plus additional barriers and bollards.

At Loyola University in Chicago, Ill., security extends even beyond the official perimeter of the campus to protect students who live in the surrounding areas. According to Tim Cunningham, Student Community Liaison Officer for Loyola’s campus police department, two off-campus satellite offices serve as a safe space for students in trouble.

With emergency phones both inside and outside of the storefronts, students can immediately contact the campus dispatch center. In order to get inside the booth, students must use their school-issued swipe card, which also adds a level of security to the safe-houses. The emergency phones are under surveillance, so dispatchers have an additional resource to help them determine the exact nature of the emergency.

Students at Loyola are introduced to security through the summer orientation programs, as well as through multiple outreach programs throughout the school year and on social media, reminding them of safety tips and what resources are available.

What resources and technology is available to you, as an enterprise security executive? Check out this product gallery for newly released perimeter security tools.

 


Specifications for a High-Tech, Bullet-Resistant Booth

 

Level 1:Impact

Level 2:Handgun – 9mm or .357

Level 3:Handgun – .44 Magnum,

   5.5 ammunition or 12-guage shotgun

Level 4:High-power rifle such as a 30.06, 7.62 ammunition, hand grenade, high explosive

Data courtesy of Delta Scientific

 


Perimeter Product Gallery

Helps Perform Maintenance at the Door

This fully integrated technical diagnostics and configuration device helps enterprise security professionals manage access control preferences directly on a security revolving door. The LCD touchscreen, built directly into the end-post on the secure side of the door, enables authorized users to access the software through a username and password. You can set different security modes to operate during different times of the day or week – for example, card-in/free out during business hours, card-only in evenings and locked on weekends. Technicians can also quickly check the door’s status to keep everything working smoothly or schedule maintenance alerts after a predetermined number of uses.

Find out more at www.BoonEdam.us
 

Blends in with Artful Architecture

Inspired by the charm of Southern plantation architecture, this booth’s tough steel exterior includes painted window muntins and mullions, architectural tube steel and base trim and crown molding, combining an aesthetically pleasing appearance with durable and functional construction. This security booth also includes tinted class, air conditioning and built-in preps for cameras and data.

Find out more at www.ParKut.com

 

Enables Perimeter Intruder Detection in Irregular Locations

In order to manage perimeter security in storage yards, substations, car lots or blind spots in unusual topography, this smart thermal camera detects intruders at distances of up to 60 meters at a 63-degree field of view. Versatile camera placements can eliminate the need for additional infrastructure such as poles and trenching, plus it leverages on-board video processing for high Probability of Detect and low Nuisance Alarm Rates. The camera consists of a thermal imager with lens optics, electronic stabilization, image contrast enhancement, video analytics software, camera control and geospatial target tracking for more accurate detection.

 Find out more at www.SightLogix.com

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Claire Meyer

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.