Thief! Intruder! Sometimes, perimeter security puts you in contact with a variety of visitors, not all of them welcome, but how does one differentiate between visitors without making a bad first impression or creating a vulnerable situation? And how does that situation change based on a facility’s location and risk profile?
According to Jeff Finan, Vice President of Business Development for Echodyne, perimeter security defenses today need to be reassessed to require detection, tracking and identification of objects of interest, as well as offering precise location data to cover all potential threats.