Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityArenas / Stadiums / Leagues / Entertainment

Top 3 Considerations for Selecting the Right Perimeter Security Solution

By Scott Espensen
barrier-enews
December 12, 2017

In the United States, as well as internationally, vehicle ramming attacks continue to rise. As of early October 2017, there had been a minimum of seven major attacks worldwide resulting in 24 people dead and another 153 injured. As a result of this recent trend, there is an increased interest in perimeter security for different applications beyond traditional government and military operations. From large cities to small municipalities, grade schools to universities, utility substations to corporate offices, many organizations are contemplating how to provide an increased measure of security within already tight budget constraints.

Given the abundance of products available on the market, and the fact that many security professionals are contemplating anti-ram barrier measures for the first time, it’s important to understand how to evaluate and select a perimeter security solution that best suits each unique application and budget. Beyond these considerations, working with a security professional is highly recommended to determine the appropriate threat type and level, help navigate the process, and provide a holistic approach to the entire project.

 

Understand How Physical Security Products are Rated

When researching anti-ram perimeter security barriers, serious thought should be given to how each system was designed and tested to ensure that it meets the applicable threat conditions. This process can sometimes be challenging with multiple published vehicle crash testing standards and numerous crash ratings within those standards. The U.S. Department of State (DOS) pioneered anti-ram vehicle barrier testing, and developed a rating system and test standard that was published in April 1985 (SD-STD-02.01), and later revised in 2003 (SD-STD-02.01 Rev A).

In 2009, the DOS retired SD-STD-02.01 Rev A and stated that all new barriers should be tested to ASTM International standards in order to be considered for embassy projects. ASTM F2656-15 is the most recent standard to which anti-ram vehicle barriers are tested.

ASTM ratings are assigned based on three variables – test vehicle type, vehicle speed and vehicle penetration distance. Test vehicles span six style and weight categories, from a small passenger car (2,430 pounds) to a heavy goods vehicle (65,000 pounds). Vehicles are impacted into the barrier at speeds ranging from 30 to 60 mph. Finally, the penetration distance of the vehicle into the barrier falls into one of three categories – from less than 1 meter (P1) up to 30 meters (P3).

While new barriers are typically crash tested to ASTM standards, the DOS SD-STD-02.01 Rev A ratings are still frequently used in project specifications. These ratings are assigned based on impact speed, similar to ASTM ratings, and are compared below. SD-STD-02.01 Rev A does not assign various penetration ratings, as every vehicle tested to Rev A must have a penetration of one meter or less to receive a “K” rating.

 

ASTM Impact Conditions

Test Vehicle Weight  Condition Designation Nominal Impact Velocity
6,800 kg (15,000 lbs.) M30 50 kph (30 mph)
  M40 65 kph (40 mph)
  M50 80 kph (50 mph)

 

ASTM Penetration Ratings

Designation Penetration
P1 ≤ 1m (3.3 ft)
P2 1.01m to 7m (3.31 ft to 23.0 ft)
P3 7.01m to 30m (23.1ft to 98.4 ft)

 

DOS Impact Conditions*

Test Vehicle Weight Condition Designation Nominal Impact Velocity
6,800 kg (15,000 lbs.) K4 50 kph (30 mph)
  K8 65 kph (40 mph)
  K12 80 kph (50 mph)

*This table shows data for one vehicle type only, a medium-duty truck, which is the most commonly used vehicle standard for government and military applications.

 

Assess Existing Site Conditions and How They Impact Solutions

Because each barrier design inherently has its own unique advantages and limitations, understanding and defining site conditions will help provide context when it comes to selecting the proper system.

Important Site Assessment Questions:

  • Are there any specific ground conditions involving the soil type, excessive elevations or high water tables?
  • Are there any underground utilities or structures that must be considered?
  • Does pedestrian access need to be stopped or allowed?
  • What aesthetic requirements must be considered?
  • If there is a vehicle entrance, how many vehicles are being processed at peak vs. non-peak times?
  • How will the site environment (temperature, sand, gravel, debris, salt water, snow, rain) affect operations and maintenance?

 

Consider Installation and Maintenance Costs

Purchasing perimeter security solutions is only half the financial battle to securing a property’s border – the installation and maintenance costs still loom. For products like perimeter fencing, installation prices of one system can cost twice as much as a similarly rated system. Contractors, architects and owners can realize significant savings by looking beyond the initial purchase price of the barrier system and exploring the steps, materials and equipment necessary to complete the project. Getting detailed installation estimates is key, as some barrier designs have significantly different requirements for foundation size, rebar, post spacing and more.

Furthermore, the required maintenance varies across products, even among similar types. This is a cost that should be considered during the purchasing process.

Important Maintenance Questions:

  • Who will maintain the perimeter security system? Will this be performed by employees or will it be contracted?
  • What grade of operating components are used to power the barrier?
  • Are the operating components below grade and how will that impact maintenance?
  • What type of finish is required to provide long-term protection?

Security leaders face a myriad of challenges and options when it comes to selecting an appropriate perimeter security solution. While working with an outside security consultant or design professional is valuable, and should considered, there’s no substitute for conducting your own research. By understanding vehicle crash ratings, identifying critical site requirements, and obtaining detailed installation costs, CSOs can more effectively choose the product that best suits their application – functionally, financially, as well as aesthetically.

KEYWORDS: attacks counterterrorism perimeter security security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As Perimeter Security Product Manager, Scott Espensen oversees new product development, product testing, sales, project management and fulfillment. With a strong background in controls technology for the United States Air Force, Scott has been very active in creating and sourcing advanced control systems for Ross Technology Perimeter Security products. He has worked at Ross Technology for over 20 years, and during that time Scott has overseen numerous security projects in the Middle East.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Mansfield ISD Police Department in Texas; school surveillance, school security

    Selecting the Right Surveillance for Your School

    See More
  • Perimeter protection FLIR

    Determining the right combination of visible and thermal imaging for perimeter security

    See More
  • first responder firefighter

    Top 3 considerations of public sector crisis management communication tools

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing