Perimeter Security: Going Beyond the Fence

Issue link: https://resources.genetec.com/i/1427258

Contents of this Issue


Page 0 of 2

Security Technology, October 2021 Perimeter Security: Going Beyond the Fence By John Marco and Cheryl Stewart 1 October 2021 Photo by iStock Traditional security systems trigger when someone touches the fence line. Yet why wait until the perimeter is about to be breached to respond? And what about monitoring what's going on within restricted zones? Recent innovations in security software allow security teams to redefine perimeter security by giving them the ability to look beyond the fence line, being more specific about what to monitor and how, and even linking perimeter security to identity management, so that boundaries change along with job titles. Consider your Critical Perimeter Areas You may have gates and fences, but how do you protect roof areas, sides of buildings, or high-end assets? The latest security technology uses laser sensors to create a kind of cage around a secure zone that can trigger an alarm if unauthorized people approach. The protected area could be as small as a painting on the wall or as large as a big-box store. Early identification of potential threats gives security teams time to prepare a response and take necessary action. For example, by proactively defining a buffer zone around sensitive areas, your security team can monitor the movement of people and vehicles and watch for potential intrusions before they ever reach the fence line.

Articles in this issue

view archives of EN-Article - Perimeter Security: Going Beyond the Fence