Physical Security

Physical security systems for protected facilities are generally intended to:

  • deter potential intruders (i.e. warning signs and perimeter markings).
  • detect intrusions and monitor / record intruders (i.e. intruder alarms and CCTV systems).
  • trigger appropriate incident responses (i.e. by security guards and police).

It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as aesthetics, human rights, health and safety, and societal norms or conventions.

Physical access security measures that are appropriate for a high security prison or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar.

The problem

Physical security faces a lot of issues and challenges, as elements can be absent or present weak links or weak spots:

  • access control (access points, entry and exit verification, keyboard, touch pad, hard keys, card keys)
  • password management
  • alarm systems & intrusion detection
  • asset and GPS tracking
  • biometrics and devices
  • central station alarm monitoring
  • integrated security management systems and PSIM
  • intercom solutions
  • loss prevention solutions
  • network equipment and cabling
  • perimeter security and physical hardening
  • blast-resistant coverings glazings and windows
  • gates and gate control equipment
  • parking and traffic control
  • perimeter security sensors
  • personnel and vehicle barriers
  • security fencing
  • turnstiles
  • defense in-depth
  • power systems and supplies
  • protective operations guard routines
  • safes, seals and security containers
  • security lighting
  • threat detection imaging and inspection
  • video surveillance

The solution

We issue a physical assessment of the client’s target physical infrastructure and perimeter, run a checklist and collect data. Then we produce a complete analysis, and provide a report with recommendations for opportunities of improvement, also tunning / hardening / mitigation of weak spots.

The extent of perimeter controls will be determined based upon a comprehensive physical security survey. Also, we can offer if needed options of installation tools and equipment, dealers, integrators and installing companies, emergency safety equipment, and fire and life safety. As elements and design, we consider:

  • Deterrence methods
    • Physical barriers
    • Natural surveillance
    • Security lighting
  • Intrusion detection and electronic surveillance
    • Alarm systems and sensors
    • Video surveillance
  • Access control
    • Mechanical access control systems
    • Electronic access control systems
    • Identification systems and access policies
  • Security personnel

Our assessment checklist can also include the elements below:

  • Alarm management
  • Artificial intelligence for video surveillance
  • Biometric device
  • Biometrics
  • Boundaries of Security Report
  • Computer security
  • Door security
  • Executive protection
  • Guard tour patrol system
  • Information security
  • Logical security
  • Physical Security Professional
  • Security alarm
  • Security engineering
  • Surveillance

For tips on physical security of a corporate office, click here.
For general tips on physical security of a perimeter, click here.

Advertisements