Perimeter Security


Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

Revolutionizing Perimeter Security

In an ever-evolving world, the need for robust and cost-efficient perimeter security measures has become paramount. Traditional methods often fall short of effectively safeguarding sensitive or large areas.

The Advantage of Video Monitoring

The last few years have been unique, and we, as a society, continue to face new challenges. Organizations and businesses of all types are walking a fine line between facility accessibility and supporting facility security.

Secured Entrances Deliver a Warehouse Full of Protection

Secured Entrances Deliver a Warehouse Full of Protection

Ask any industry analyst to identify the biggest potential risks and liabilities facing distribution, logistics and warehouse management teams today, and the costs related to inventory shrinkage and theft are surely to be near the top of every list.

Planning for Your Perimeter

Planning for Your Perimeter

The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable.

A Comprehensive Nationwide Solution

A Comprehensive Nationwide Solution

Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed.

Survey: 28% of Businesses Experienced Rising Security Incidents in 2022

Survey: 28% of Businesses Experienced Rising Security Incidents in 2022

Pro-Vigil, a provider of remote video monitoring, management and crime deterrence solutions, today published its third annual "The State of Physical Security" research report. It revealed that amid ongoing supply chain issues and emerging economic uncertainty, businesses experienced a rise in physical security incidents in 2022.



Landmark Security

How do you secure the largest cathedral in the world when it sits on 11.3 acres, is considered a New York City landmark, and is a busy destination for worship, cultural arts, social services and tourism?

Unified Solutions and Emerging Technologies

Unified Solutions and Emerging Technologies

Large scale infrastructure environments, like airports and critical infrastructure sites, present a physical security challenge.

Reducing Nuisance Alarms

Critical infrastructure sites need reliable, cost-effective physical security solutions.

A Sound Strategy

A Sound Strategy

No matter the security criticality of your facility or the sophistication of your security system, simple key control is a foundational process of physical key management that helps control access to crucial assets, people, information and spaces.

A Permanent Solutions

The trend that has catapulted to the top of the list for vehicle perimeter security is securing temporary events with certified crash equipment that can be installed in only 15 minutes

Enhancing the Perimeter

Enhancing the Perimeter

Driven by high-profile intrusion incidents, perimeter security has become a top priority for airports in recent years.

All About the Data

All About the Data

When you consider today’s smartphones, the phone part is almost ancillary. It’s really the apps and the advanced optics that drive the purchase.

skateboarder on street

Security Guard Suffers Permanent Brain Damage After Fight With Skater

Skateboarders are re-examining a culture of conflict with security guards in the wake of a tragic incident between a professional skater and a guard in San Francisco.

Complete Perimeter Solution

Complete Perimeter Solution

A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples.

The New Age

The New Age

Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.

Multiply and Conquer

Technology is increasingly being used as a force multiplier to help law enforcement agencies protect and serve. One way agencies are turning technology into a crime-fighting tool is by creating what’s called a “virtual fence” around a perimeter, such as city limits or a parking lot, by installing a network of license plate reader (LPR) cameras to monitor an area.

All the Hype

All the Hype

Alongside the hype in the media about the border wall, this might be a good time for commercial and industrial companies to take a closer look at their own borders. Threat levels are increasing due to rising crime, civil activism and even cyber threats and it is more important than ever to push the line of defense all the way to the borders.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3