Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

A Gated Welcome, Plus

By Bill Zalud
October 4, 2006
A diversity of security technologies can protect the entrance to facilities as well as collect data on people and vehicles entering a facility.


Gates are a solid and typical security protection at the entrance to facilities, parking lots and garages. The equipment can easily integrate with other security and financial systems. Photos courtesy of Automatic Systems
Facility perimeters, and especially entrances, now get more and better security protection thanks to traditional gates as well as myriad technologies.

The most typical security solution is a gate.

Outdoor perimeter security installations can be some of the most challenging. Real-world experience frequently is the most valuable when dealing with the necessity of weather-tight, reliable installations that have to withstand everything from landslides to hurricanes. Perimeter security encompasses a number of different technologies. Some installations use active infrared, photoelectric or other types of beam detectors, sometimes in combination with passive infrared (PIR) motion detectors.

Others use microwave detectors, often in combination with PIR. Many use pan-tilt-zoom (PTZ) cameras that automatically track alarms and digital video recorders that are triggered by sensors. Others use video analytic software or intelligent video to supplement a perimeter or function as a “virtual fence.”

Installed in tens of thousands of locations worldwide, the most typical gate operators are extremely reliable, and designed for continuous operation. Most are compatible with access control devices. Most gate arms can span openings of up to 30 feet, according to technicians at gate makers.

Numerous security and safety features are standard: durable crank and shaft operating mechanism, security locking in upper and lower positions, safety clutch, electronic controllers, all in corrosion protected cabinets. Gate arms are aluminum tube.

Some chief security officers need specialty gates. For example, what if you need to open a gate in half a second or span a road 45 foot wide?

In environments requiring extremely fast operation, such as toll roads, many security gates can withstand 15,000 high-speed operations a day. Variable speed controllers, snap-out gate arm, and automatic opening on power failure are just a sample of the available features. Wide access points requiring access or security barriers can be controlled with gate operators with very long arms. Gate and gate operator accessories can include electromagnetic tip support, boom lights and fencing, among other gear.

COMPLEMENTING GATE CONTROLS

Some facilities – often critical infrastructures – bolster gates and fences with higher-level security technology.

For example, after a terrorist threat on a propane gas facility in California was discovered before its implementation, a sophisticated microwave detection system was installed along with a fence detection system as part of a complete security upgrade at a California propane storage facility.

“We are the largest above-ground refrigerated propane storage facility west of the Mississippi,” asserted Pat Hicks, facilities manager at Suburban Propane, Elk Grove, Calif., which is approximately 16 miles south of Sacramento. “This facility stores approximately 24 million gallons of propane, and all we are is a storage facility. The product comes in the summer and goes out in the winter.”

When the facility originally opened, the area around it was pasture, but now Elk Grove is the fastest growing city in the United States, Hicks maintains. “Development is on our fence line, and we need to be on the cutting edge of security and fire protection,” he insists. The goal is to achieve the security standards of a federal prison.

Geno Bartley, owner and field technician for GB Technical, Newport, Ore., was called in. The solution was to isolate the electronic circuit boards of the existing fence system from the noise with nylon washers and screws and install a new interconnect cable. Next in the electronic line of defense were infrared beam detectors, which also were installed by the previous security contractor, but because of occasionally foggy conditions at the site, they were replaced with a microwave detection system installed by Bartley’s company.

Microwave detectors used for this application are point-to-point or bi-static, Bartley notes. Their signals hit flat ground and hover across it until they reach the receiver. A person crawling through the system would cause a disturbance that the system would detect and initiate an alarm.

Because of this, the railroad entrance at one end of the facility posed a challenge. “The railroad tracks stick up kind of tall and that blocks the multipath, so if microwave travels across ground and has something in the way that blocks it, a low-profile person might be able to beat it,” Bartley relates. “Microwaves need a relatively level area between transmitter and receiver.”

Instead, two dual-channel stereo Doppler microwaves overlap each other with a teardrop-shaped detection.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Live and Recorded Video Viewing a Business Plus by Harold German

    See More
  • How to Build a Complete Access Control System

    See More
  • YouTube Video Takes Down Another Employee, Plus the Business

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing