Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

How to Increase Service and Safety with Perimeter Security

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence.

perimeters slide 1

The storefronts that serve as safe-houses for off-campus students feature Talk-A-Phone emergency telephones both inside and outside, just in case a student doesn’t have his or her access card to gain entry to the building. Image courtesy of Loyola University.

perimeters slide 2

The San Ysidro Landed Port of Entry processes an average of 50,000 northbound vehicles between Mexico and the U.S every day. In order to increase processing speeds while maintaining a high standard of inspection, 50 new guard booths were added, doubling the port’s existing 24-booth capacity. Image courtesy of Delta Scientific.

perimeters slide 3
perimeters slide 4
perimeters slide 5
perimeters slide 1
perimeters slide 2
perimeters slide 3
perimeters slide 4
perimeters slide 5
October 1, 2013

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence. This is not science fiction, but it is a product in progress: after receiving a nearly £600,000 ($935,340) investment, MicroSence Solutions in the Northern Ireland Science Park is working on an invisible microwave barrier to boost perimeter fence security, especially at power plants, airports and borders.

But while this technology is still a ways away from the average installation, there are still numerous options for security technology to help maintain perimeter security.

Guard-booths are one technology that offer both protection to the perimeter and to the enterprise’s security officers, especially for bullet-resistant booths.

For the San Ysidro Landed Port of Entry, the busiest land port in the world located between San Diego and Tijuana, Mexico, 50 custom-design, bullet-resistant guard booths are being installed to double the pace of inspection without sacrificing security. The port processes an average of 50,000 northbound vehicles every day, and the new stops feature two stacked bullet-resistant inspection booths to double the capacity of the 24 existing booths.

The installation also includes photovoltaic and Ethylene Tetrafluoroethylene (ETFE) roof structures to shade cars and security officers, and its translucent nature allows for natural light. This reduces or eliminates the need for artificial lighting during the day, reducing energy costs. 

The $5 million project also added (K4-rated) barricade swing gates where vertical lifts are impractical to install, plus additional barriers and bollards.

At Loyola University in Chicago, Ill., security extends even beyond the official perimeter of the campus to protect students who live in the surrounding areas. According to Tim Cunningham, Student Community Liaison Officer for Loyola’s campus police department, two off-campus satellite offices serve as a safe space for students in trouble.

With emergency phones both inside and outside of the storefronts, students can immediately contact the campus dispatch center. In order to get inside the booth, students must use their school-issued swipe card, which also adds a level of security to the safe-houses. The emergency phones are under surveillance, so dispatchers have an additional resource to help them determine the exact nature of the emergency.

Students at Loyola are introduced to security through the summer orientation programs, as well as through multiple outreach programs throughout the school year and on social media, reminding them of safety tips and what resources are available.

What resources and technology is available to you, as an enterprise security executive? Check out this product gallery for newly released perimeter security tools.

 


Specifications for a High-Tech, Bullet-Resistant Booth

 

• Level 1:Impact

• Level 2:Handgun – 9mm or .357

• Level 3:Handgun – .44 Magnum,

   5.5 ammunition or 12-guage shotgun

• Level 4:High-power rifle such as a 30.06, 7.62 ammunition, hand grenade, high explosive

Data courtesy of Delta Scientific

 


Perimeter Product Gallery

Helps Perform Maintenance at the Door

This fully integrated technical diagnostics and configuration device helps enterprise security professionals manage access control preferences directly on a security revolving door. The LCD touchscreen, built directly into the end-post on the secure side of the door, enables authorized users to access the software through a username and password. You can set different security modes to operate during different times of the day or week – for example, card-in/free out during business hours, card-only in evenings and locked on weekends. Technicians can also quickly check the door’s status to keep everything working smoothly or schedule maintenance alerts after a predetermined number of uses.

Find out more at www.BoonEdam.us
 

Blends in with Artful Architecture

Inspired by the charm of Southern plantation architecture, this booth’s tough steel exterior includes painted window muntins and mullions, architectural tube steel and base trim and crown molding, combining an aesthetically pleasing appearance with durable and functional construction. This security booth also includes tinted class, air conditioning and built-in preps for cameras and data.

Find out more at www.ParKut.com

 

Enables Perimeter Intruder Detection in Irregular Locations

In order to manage perimeter security in storage yards, substations, car lots or blind spots in unusual topography, this smart thermal camera detects intruders at distances of up to 60 meters at a 63-degree field of view. Versatile camera placements can eliminate the need for additional infrastructure such as poles and trenching, plus it leverages on-board video processing for high Probability of Detect and low Nuisance Alarm Rates. The camera consists of a thermal imager with lens optics, electronic stabilization, image contrast enhancement, video analytics software, camera control and geospatial target tracking for more accurate detection.

 Find out more at www.SightLogix.com

KEYWORDS: international security perimeter security port security security stakeholders security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thermal imaging

    How thermal-based AI enhances perimeter security

    See More
  • 5 minutes w Miller

    5 minutes with Todd Miller - How to build community trust for better public safety

    See More
  • c-suite

    How to Increase Collaboration Between IT and Executive Leadership Teams

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×
The storefronts that serve as safe-houses for off-campus students feature Talk-A-Phone emergency telephones both inside and outside, just in case a student doesn’t have his or her access card to gain entry to the building. Image courtesy of Loyola University.
The San Ysidro Landed Port of Entry processes an average of 50,000 northbound vehicles between Mexico and the U.S every day. In order to increase processing speeds while maintaining a high standard of inspection, 50 new guard booths were added, doubling the port’s existing 24-booth capacity. Image courtesy of Delta Scientific.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!