In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.
- By Mark Borto
- Mar 22, 2024
Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.
- By Jon Carstensen
- Mar 21, 2024
In an ever-evolving world, the need for robust and cost-efficient perimeter security measures has become paramount. Traditional methods often fall short of effectively safeguarding sensitive or large areas.
- By Danny Youngerman
- Aug 01, 2023
The last few years have been unique, and we, as a society, continue to face new challenges. Organizations and businesses of all types are walking a fine line between facility accessibility and supporting facility security.
- By Daniel Forrest
- May 30, 2023
Ask any industry analyst to identify the biggest potential risks and liabilities facing distribution, logistics and warehouse management teams today, and the costs related to inventory shrinkage and theft are surely to be near the top of every list.
- By Mark R. Perkins
- May 03, 2023
The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable.
- By Aaron Saks
- Mar 23, 2023
Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed.
- By Patrick Kelly
- Mar 13, 2023
Pro-Vigil, a provider of remote video monitoring, management and crime deterrence solutions, today published its third annual "The State of Physical Security" research report. It revealed that amid ongoing supply chain issues and emerging economic uncertainty, businesses experienced a rise in physical security incidents in 2022.
How do you secure the largest cathedral in the world when it sits on 11.3 acres, is considered a New York City landmark, and is a busy destination for worship, cultural arts, social services and tourism?
- By Bret McGowan
- Aug 01, 2022
Large scale infrastructure environments, like airports and critical infrastructure sites, present a physical security challenge.
- By Cheryl Stewart
- Mar 01, 2022
Critical infrastructure sites need reliable, cost-effective physical security solutions.
No matter the security criticality of your facility or the sophistication of your security system, simple key control is a foundational process of physical key management that helps control access to crucial assets, people, information and spaces.
- By Tim Purpura
- Apr 01, 2021
The trend that has catapulted to the top of the list for vehicle perimeter security is securing temporary events with certified crash equipment that can be installed in only 15 minutes
Driven by high-profile intrusion incidents, perimeter security has become a top priority for airports in recent years.
- By Daniel Gundlach
- Apr 08, 2020
When you consider today’s smartphones, the phone part is almost ancillary. It’s really the apps and the advanced optics that drive the purchase.
- By Joe Morgan
- Mar 01, 2020
Skateboarders are re-examining a culture of conflict with security guards in the wake of a tragic incident between a professional skater and a guard in San Francisco.
- By Haley Samsel
- Jul 29, 2019
A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples.
- By Yaron Zussman
- Oct 01, 2018
Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.
- By Joe Morgan
- Mar 01, 2018
Technology is increasingly being used as a force multiplier to help law enforcement agencies protect and serve. One way agencies are turning technology into a crime-fighting tool is by creating what’s called a “virtual fence” around a perimeter, such as city limits or a parking lot, by installing a network of license plate reader (LPR) cameras to monitor an area.
Alongside the hype in the media about the border wall, this might be a good time for commercial and industrial companies to take a closer look at their own borders. Threat levels are increasing due to rising crime, civil activism and even cyber threats and it is more important than ever to push the line of defense all the way to the borders.
- By Paul Shkedy
- Oct 01, 2017