Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

How to Increase Service and Safety with Perimeter Security

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence.

perimeters slide 1

The storefronts that serve as safe-houses for off-campus students feature Talk-A-Phone emergency telephones both inside and outside, just in case a student doesn’t have his or her access card to gain entry to the building. Image courtesy of Loyola University.

perimeters slide 2

The San Ysidro Landed Port of Entry processes an average of 50,000 northbound vehicles between Mexico and the U.S every day. In order to increase processing speeds while maintaining a high standard of inspection, 50 new guard booths were added, doubling the port’s existing 24-booth capacity. Image courtesy of Delta Scientific.

perimeters slide 3
perimeters slide 4
perimeters slide 5
perimeters slide 1
perimeters slide 2
perimeters slide 3
perimeters slide 4
perimeters slide 5
October 1, 2013

Imagine invisible perimeter security – a microwave detection system so sensitive it can distinguish between people and animals alongside a fence. This is not science fiction, but it is a product in progress: after receiving a nearly £600,000 ($935,340) investment, MicroSence Solutions in the Northern Ireland Science Park is working on an invisible microwave barrier to boost perimeter fence security, especially at power plants, airports and borders.

But while this technology is still a ways away from the average installation, there are still numerous options for security technology to help maintain perimeter security.

Guard-booths are one technology that offer both protection to the perimeter and to the enterprise’s security officers, especially for bullet-resistant booths.

For the San Ysidro Landed Port of Entry, the busiest land port in the world located between San Diego and Tijuana, Mexico, 50 custom-design, bullet-resistant guard booths are being installed to double the pace of inspection without sacrificing security. The port processes an average of 50,000 northbound vehicles every day, and the new stops feature two stacked bullet-resistant inspection booths to double the capacity of the 24 existing booths.

The installation also includes photovoltaic and Ethylene Tetrafluoroethylene (ETFE) roof structures to shade cars and security officers, and its translucent nature allows for natural light. This reduces or eliminates the need for artificial lighting during the day, reducing energy costs. 

The $5 million project also added (K4-rated) barricade swing gates where vertical lifts are impractical to install, plus additional barriers and bollards.

At Loyola University in Chicago, Ill., security extends even beyond the official perimeter of the campus to protect students who live in the surrounding areas. According to Tim Cunningham, Student Community Liaison Officer for Loyola’s campus police department, two off-campus satellite offices serve as a safe space for students in trouble.

With emergency phones both inside and outside of the storefronts, students can immediately contact the campus dispatch center. In order to get inside the booth, students must use their school-issued swipe card, which also adds a level of security to the safe-houses. The emergency phones are under surveillance, so dispatchers have an additional resource to help them determine the exact nature of the emergency.

Students at Loyola are introduced to security through the summer orientation programs, as well as through multiple outreach programs throughout the school year and on social media, reminding them of safety tips and what resources are available.

What resources and technology is available to you, as an enterprise security executive? Check out this product gallery for newly released perimeter security tools.

 


Specifications for a High-Tech, Bullet-Resistant Booth

 

• Level 1:Impact

• Level 2:Handgun – 9mm or .357

• Level 3:Handgun – .44 Magnum,

   5.5 ammunition or 12-guage shotgun

• Level 4:High-power rifle such as a 30.06, 7.62 ammunition, hand grenade, high explosive

Data courtesy of Delta Scientific

 


Perimeter Product Gallery

Helps Perform Maintenance at the Door

This fully integrated technical diagnostics and configuration device helps enterprise security professionals manage access control preferences directly on a security revolving door. The LCD touchscreen, built directly into the end-post on the secure side of the door, enables authorized users to access the software through a username and password. You can set different security modes to operate during different times of the day or week – for example, card-in/free out during business hours, card-only in evenings and locked on weekends. Technicians can also quickly check the door’s status to keep everything working smoothly or schedule maintenance alerts after a predetermined number of uses.

Find out more at www.BoonEdam.us
 

Blends in with Artful Architecture

Inspired by the charm of Southern plantation architecture, this booth’s tough steel exterior includes painted window muntins and mullions, architectural tube steel and base trim and crown molding, combining an aesthetically pleasing appearance with durable and functional construction. This security booth also includes tinted class, air conditioning and built-in preps for cameras and data.

Find out more at www.ParKut.com

 

Enables Perimeter Intruder Detection in Irregular Locations

In order to manage perimeter security in storage yards, substations, car lots or blind spots in unusual topography, this smart thermal camera detects intruders at distances of up to 60 meters at a 63-degree field of view. Versatile camera placements can eliminate the need for additional infrastructure such as poles and trenching, plus it leverages on-board video processing for high Probability of Detect and low Nuisance Alarm Rates. The camera consists of a thermal imager with lens optics, electronic stabilization, image contrast enhancement, video analytics software, camera control and geospatial target tracking for more accurate detection.

 Find out more at www.SightLogix.com

KEYWORDS: international security perimeter security port security security stakeholders security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thermal imaging

    How thermal-based AI enhances perimeter security

    See More
  • 5 minutes w Miller

    5 minutes with Todd Miller - How to build community trust for better public safety

    See More
  • Security Worker

    Strategic Decision Support Centers Increase Public Safety and Responsiveness to Community Needs

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×
The storefronts that serve as safe-houses for off-campus students feature Talk-A-Phone emergency telephones both inside and outside, just in case a student doesn’t have his or her access card to gain entry to the building. Image courtesy of Loyola University.
The San Ysidro Landed Port of Entry processes an average of 50,000 northbound vehicles between Mexico and the U.S every day. In order to increase processing speeds while maintaining a high standard of inspection, 50 new guard booths were added, doubling the port’s existing 24-booth capacity. Image courtesy of Delta Scientific.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!