Perimeter Security - Protus3 (2024)

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circ*mstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Whereas the engineering and design of an electronic security management system requires particular sophistication and expertise, the implementation of an effective physical security program is the result of conventional wisdom and a lot of legwork expended during a security assessment.

A basic security concept is to design a series of layers so that highly protected assets are within a configuration of multiple barriers. Barriers are commonly utilized to discourage three types of penetration – accidental, by force, and by stealth. A properly installed barrier should clearly warn a potential penetrator to “Keep Out”. There should be no accidental or inadvertent penetration.

Barriers may be divided into two general categories – natural and structural. Natural barriers include terrain difficult to traverse and other topographical features that assist in impeding or denying access to an area. Structural barriers are manmade and include landscaping, ditches, fences, and walls. A structural barrier physically and psychologically deters or discourages the undetermined, delays the determined, and channels the flow of authorized traffic through proper entrances.

Fencing
Perimeter Security - Protus3 (1)Perimeter Security - Protus3 (2)Perimeter Security - Protus3 (3)Perimeter Security - Protus3 (4)

Perimeter Security - Protus3 (5)

The most common type of structural barrier normally used for protection is a chain link fence. Fencing an area will only delay, not permanently prevent, an entry attempt. Therefore, fencing must be supplemented or enhanced by other countermeasures such as signage and security patrols. Nevertheless, a fence can be a valuable element in an integrated protection scheme.

Signage

Perimeter Security - Protus3 (6)
Perimeter Security - Protus3 (7)

Any barrier utilized must be supplemented or enhanced by other countermeasures such as signage. In keeping with this philosophy to be a “good neighbor” and have an open campus environment for lawful and undisruptive use, a signage program to clearly define the expectations of the administration should be deployed. Twocategories of signs, the command sign and the informational sign, are predominantly used. Command signs tell people what to do or not to do. Examples are “No Trespassing”, “No Admittance”, and “Visitors must register at the front office.” Informational signs may alert the reader to a potential danger or give other information. Examples are “Hazardous Materials” and “No Smoking”.

Vegetation and Crime Prevention Through Environmental Design (CPTED)

Perimeter Security - Protus3 (8)
Perimeter Security - Protus3 (9)

In security applications the concept of Crime Prevention through Environmental Design is one that is prominently used. The concept emphasizes that lighting, vegetation management, traffic flow, pedestrian flow, and other physical attributes can be manipulated to lessen the opportunity of acrime-related event occurring in a particular location.

Security industry standards suggest that foliage be trimmed to allow for casual surveillance. Tree limbs should be trimmed seven feet from the ground and shrubbery trimmed to 24 inches high.

Building Perimeter

Perimeter Security - Protus3 (10)
Perimeter Security - Protus3 (11)

Another layer of security continues with building access control. An excellent tool to control access requires the determination, not less than annually, of the minimum number of exterior doors that should be unlocked at any given time. Whenever possible, it should be the policy to manage access by utilizing only thoseexterior doors that are practical and/or absolutely necessary to the day-to-day operation.

Plan. Protect. Prosper.

Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome.

919-834-8584 or 800-775-8584


Perimeter Security - Protus3 (2024)
Top Articles
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6208

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.