EN-Article

Perimeter Security: Going Beyond the Fence

Issue link: https://resources.genetec.com/i/1427258

Contents of this Issue

Navigation

Page 1 of 2

Create Perimeters within the Perimeter Within a secured area, some areas merit closer monitoring, whether for security or operational reasons. For example, in the event of an evacuation due to a gas leak or another safety concern, it would be helpful to quickly check the zones of greatest concern to ensure everyone gets out safely. Or, if you are a manufacturer, you might have a high-risk area within your factory that workers should avoid. Creating a perimeter around this zone can be helpful to ensure a warning is triggered if workers accidentally cross into the dangerous area. Identity is the Ultimate Perimeter Knowing that something has breached or is about to breach a secure perimeter doesn't tell you whether there is a real threat — or how serious it is if so. Are sensors detecting a cat, a person, or a car? By classifying threats visually, identifying the exact location of the threat, and pulling in relevant data from your systems, your team can identify if the intrusion is worth worrying about. For example, automatic license plate readers can scan unauthorized vehicles to help identify the threat level of an intruder. If the plate matches to the plate of a car involved in a previous theft, security teams would know to alert police and respond more cautiously. Early identification of potential threats gives security teams time to prepare a response and take necessary action. Physical Identity and Access Management Systems (PIAMS) add another layer of sophistication by connecting access control to other business systems, such as human resources directories. This interconnectivity allows companies to automatically assign or remove the ability for personnel to access restricted areas based on corporate policies. As employees change roles within the organization or leave it, their access to sensitive areas is simultaneously adjusted to reflect the changes entered in the HR directory or other linked business systems. Unification is the Key When security needs are complex, many different systems are needed. A unified physical security platform helps connect the dots between the data you get from heatmaps, sensors, cameras, access control, and other systems, giving you the situational awareness to keep your critical infrastructure and people safe. With a unified approach, you get a seamless view of what's happening near your perimeter, at your perimeter boundaries, and within your restricted areas. John Marco is director of marketing for Optex Americas. Marco is part of the marketing and development of Optex's integrated solutions, working closely with global technology partners and other industry leaders for 12 years. Aligning

Articles in this issue

view archives of EN-Article - Perimeter Security: Going Beyond the Fence