Thief! Intruder! Birdwatcher? Sometimes, perimeter security puts you in contact with a variety of visitors, not all of them welcome, but how does one differentiate between visitors without making a bad first impression or creating a vulnerable situation? And how does that situation change based on a facility’s location and risk profile? Three security executives weigh in on the issue.
When Daniel Casillo swam from his sinking jet ski in New York’s Jamaica Bay last August, he had no idea he was going to be at the center of a huge perimeter security breach.
Scanning all vehicle IDs upon entry to naval bases will reduce security man-hours and increase efficiency, but it does increase wait time in lines for commuters.
For a destination’s parking lot that needs an upgrade both image wise and in the critical area of providing a safe haven for security personnel, a perimeter protection plan can incorporate a high-end colonial style, Par-Kut Presidential Series security building.
Although many different factors can impact the accuracy of perimeter security systems, today’s intelligent video surveillance systems can help you to eliminate false and nuisance alarms and increase trust in your intrusion solution in a number of ways.
It was about 4:30 a.m. in Oak Ridge, Tenn., when sensors on the perimeter intrusion detection and assessment system alarmed. There was an unauthorized entry into a high-security, protected area. A well-trained and heavily armed guard force responded.
An emotionally disturbed man allegedly climbed a six-foot security fence to enter a Newark port and boarded a cargo ship. He was found hours later asleep in the captain's cabin.