Implementing a physical security system for your critical infrastructure site or facility can be a daunting task with several different technology options, legacy systems you might already have implemented, and requirements your system must meet.

Because of the complexity of physical security systems and each site having different needs and requirements, as well as the challenge that no single technology addresses all of today’s security needs, every organization relies on security systems comprised of multiple subsystems such as physical barriers, access control, surveillance, deterrence, alarming, lighting, etc. to achieve its security goals.

In today’s security environment, organizations need a layered, well-integrated security architecture comprised of a set of systems – beginning with wide area surveillance and concluding with localized response. Each layer fills a gap poorly met by the others, while integrating as seamlessly as possible with other layers of security to reduce operator requirements and workload.  An example of the types of systems you might integrate to create a security solutions that provides you full situational awareness include:

Wide-area coverage: The first line of defense in your security solution should be a wide-area coverage technology that can detect intruders or security threats at distances that give you enough time to respond prior to the threat approaching your perimeter. An option for wide-area coverage is long-range surveillance radar solutions. These solutions enable you to detect and track security threats up to 15 km from your site or facility and can quickly identify the type of threat approaching, such as humans, animals, vehicles, aircrafts, or drones. Wide-area coverage can help you be prepared inside your perimeter for potential threats outside your perimeter.

Physical Barriers: Perimeter physical barriers that are integrated as fully into the overall security picture of the site as possible are the next key element in a layered architecture. These barriers act as a deterrent to potential threats and could be fences, gates, or other physical barriers.

Close Perimeter Detection/Access Control: The next layer of the security architecture is sensors that can inform the overall security system about the state of vehicle and pedestrian gates and whether they have been opened in an authorized manner or not. These sensors can be integrated with access control and the complete security system to disable interior alarming when an authorized entry has occurred, among other purposes. Further, fence vibration monitors, unattended ground sensors, and infrared beam sensors can be used to increase the situational awareness of the perimeter barrier in view of potential threats.

Video Surveillance: Interior to the site, pan-tilt-zoom and fixed high-definition cameras with both day and night video capability are fully integrated and controlled by the wide-area surveillance asset until manual control is taken by the security operator. These systems should be fully integrated with the video management systems and all video information integrated with the other security sensors (e.g., time-integrated with radar and alarm data).

Automated Deterrence: Deterrence technologies such as area lighting, strobe lights, targeted spot lights, audible warnings, and even-two way audible systems are coordinated by wide-area surveillance systems to delay or stop intrusions at point of egress into critical sites. Intruders witnessing active responses to intrusion attempt are more likely to stop and flee; or, at minimum, deterrent actions will likely delay intrusions while intruders attempt to determine what to do after they have been detected. This may result in unsuccessful intrusion attempts, or at the least provide security personnel longer to coordinate and execute a response.

This type of a layered-architecture can detect, track, classify, and drive deterrence and response to potential threats immediately outside and within the site.

For more information about our long-range surveillance radar solutions to serve as your wide-area coverage technology, contact us.

Published On: April 24th, 2020|Categories: Insights|