Our Solutions

Indoor and Outdoor Security Solutions

Whenever an area needs to be secured, the most common solution is surrounding the area's perimeter with a fence. Many cases require for the secure area to be extended beyond the confines of the fence; that means to create an external perimeter so that the approach of an intruder will be detected well before he reaches the inner area. Proper Perimeter Security means tailoring a solution based on Virtual Fencing and Physical Fencing.

Virtual Fencing
Perimeter Security can be improved substantially by implementing a "Virtual Fence". In principle it is a combination of detecting elements based on Laser Radar and other optical means that provide for intruder detection in a zone around the secured perimeter. Virtual Fencing allows for easy and fast deployment around critical targets like airplanes, where Physical Fencing is not an option.

Virtual Fencing includes part of all of the following elements:

  • Area Laser Sensor (ALS)
  • Laser Fence Sensor (LFS)
  • Cross Line Detector (CLD)
  • Dense Laser Curtain (DLC)
  • Integrated Security System Control (SSIS)

Physical Fencing
Physical Fencing means a physical obstacle enhanced by the use of sensing elements that detect intrusion. Those elements detect the presence of an intruder by sensing his physical effect on them, which means his touch, the impact of his weight while walking, etc.

Physical security describes measures that are designed to deny access to unauthorized personnel (including attackers or even accidental intruders) from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts. Physical security can be as simple as a locked door or as elaborate as multiple layers of barriers, armed security guards and guardhouse placement. Good physical security uses the concept of layered defence, in appropriate combinations to deter and delay intrusions (passive defence), and detect and respond to intrusions (active defence). Ultimately it should be too difficult, risky or costly to an attacker to even attempt an intrusion. However, strong security measures also come at a cost, and there can be no perfect security. It is up to a security designer to balance security features and a tolerable amount of personnel access against available resources, risks to assets to be protected and even aesthetics. There are also life-cycle sustaining costs to consider.

Physical security is not a modern phenomenon. Physical security exists in order to deter or prevent persons from entering a physical facility. Historical examples of physical security include city walls, moats, etc.

The technology used for physical security has changed over time. While in past eras, there was no passive infrared (PIR) based technology, electronic access control systems, or video surveillance system (VSS) cameras, the essential methodology of physical security has not altered over time. Fundamentally, good physical security is a combination of defensive principles designed to:

  • Deter
  • Delay
  • Detect, and
  • respond (and ultimately, deny access)

... to intrusions into critical physical spaces. The first two actions of deter and delay are considered passive defence, while the remaining are active in nature

Perimeter Security

  • Physical Airport Perimeter Security (Infrared, Chain Link, Taut Wire, Sensors)
  • Closed Circuit Television and Intelligent CCTV Systems
  • Interoperable Solutions (Command, Control and Communications Centres)
  • Fencing Systems: Includes Taut Wire, Infrared/Thermo graphic Sensing. Fencing systems determine boundaries, deter casual intruders, control access and create delays in the event of intrusion.
  • Taut Wire: Wire that is tightly wound around a fence line that signals movement or tampering.
  • Fibre Optic: Glass fibre optic cable is used in video signals that communicate between short or long run locations. It is also used in remote sensing, buried under the secure side of a barrier and can sense light movements.
  • Intelligent CCTV: Intelligent CCTC analyses specific behaviour patterns and algorithms and assesses the scene for security breaches. It possesses capabilities to alert the specific authorities’ through network systems.
  • False Alarms: No alarm stimulation.
  • Nuisance Alarms: Detection of stimuli that was not an attempt to enter the perimeter.
  • Intrusion Detection System (IDS): Set detection systems and technologies that define, observe, control, and sense entry into a secure area.
  • Access Control System (ACS): This manages various combinations of entry, exit and movement within sterile and non-protected areas. ACS is a subsystem that supports intrusion detection systems.
  • Perimeter and Access Control: This refers to simple barriers, fences, identity badges and other means of intrusion control, as well as devices that help in access control at airports.
  • Closed-circuit Television (CCTV): This refers to the video system of a collection of CCTV cameras and surveillance that act as virtual barriers and assess the situation. The use of television cameras for close scrutiny and observation allows for quick response time.
  • Volumetric Sensing: Volumetric sending monitors the physical space adjacent to fence lines for system penetration.
  • Digital Systems: Digital signal processing are used to evaluate alarms; characterized by very open architecture systems, large camera installations and a wide variety of technologies.

Bollards
Remotely activated or used in conjunction with intelligent authorization systems, automatic bollards allow the responsive, effective control of access. The rising bollard is built to withstand even the most severe attacks while being clearly visible toon coming traffic, yet visually unobtrusive. A new addition to our access control catalogue, the Rising Kerb or step barrier offers excellent protection where there could be a risk of vehicle theft or vandalism to a barrier arm. The Rising Kerb can be raised or lowered in just 2-3 seconds and is of high resistance to impact from cars or vans and provides secure and effective vehicle control.