{"id":442,"date":"2020-05-03T16:26:03","date_gmt":"2020-05-03T16:26:03","guid":{"rendered":"http:\/\/lixodex.co.za\/?p=442"},"modified":"2020-05-04T13:14:08","modified_gmt":"2020-05-04T13:14:08","slug":"how-to-beef-up-your-perimeter-security-and-the-five-step-process-to-mitigate-threats","status":"publish","type":"post","link":"https:\/\/lixodex.co.za\/?p=442","title":{"rendered":"HOW TO BEEF UP YOUR PERIMETER SECURITY AND THE FIVE STEP PROCESS TO MITIGATE THREATS"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.3&#8243;][et_pb_row _builder_version=&#8221;4.4.3&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.3&#8243;][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto||||||||&#8221; text_font_size=&#8221;16px&#8221; header_font=&#8221;Roboto|900|||||||&#8221; header_text_color=&#8221;#e09900&#8243; header_font_size=&#8221;40px&#8221; custom_padding=&#8221;||37px|||&#8221;]<h1><span style=\"font-weight: 400;\">PERIMETER SECURITY AND THE FIVE STEP PROCESS TO MITIGATE THREATS <\/span><\/h1>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|900|||||||&#8221; text_text_color=&#8221;#e09900&#8243; text_font_size=&#8221;19px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<h2>In this post we cover the following topics helping you to improve your perimeter security:<\/h2>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Factors for an intrusion to occur<\/strong><strong><\/strong><\/li>\n<li><strong>Intrusion Prevention<\/strong><\/li>\n<li><strong>Layered security<\/strong><\/li>\n<li><strong>Layered Security\u00a0Components<\/strong><\/li>\n<li><strong>Rapidly deployable Perimeter Intrusion Detection System<\/strong><\/li>\n<li><strong>The Five-Step Process to mitigate intrusion threats<\/strong><\/li>\n<\/ul>\n<p><strong><\/strong><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<h2><span style=\"font-weight: 400;\">Factors for an intrusion to occur<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Crime requires three factors in order to occur. These factors are Inclination, Assets and Opportunity. The removal of one or more of the components will prevent the crime from occurring.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To understand these factors better and\u00a0 their role in crime prevention, let\u2019s take a look at them individually<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Inclination\u00a0<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Inclination describes the motivation of an individual to commit a crime. Examples are: financial gain, revenge, jealousy, anger and hatred.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because inclination involves a person and their mental processes, it is the most difficult component to remove. Inclination exists in the realm of psychologists, sociologists and criminologists. There is little that a security or risk managers can do to influence it.\u00a0<\/span><\/p>\n<h3><b>Assets\u00a0<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">This factor describes something to be gained by committing a crime. Assets<\/span> <span style=\"font-weight: 400;\">are usually thought of as tangible objects such as a vehicle, power generator, solar panels, money.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However they may be intangible or abstract objects.\u00a0 People on the property might be an asset that comes under attack due to revenge, anger or hatred.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While it may be theoretically possible in some instances to remove <\/span><i><span style=\"font-weight: 400;\">assets <\/span><\/i><span style=\"font-weight: 400;\">to prevent crime, it is generally impractical or unrealistic.\u00a0<\/span><\/p>\n<h3><b>Opportunity\u00a0<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Opportunity describes the circumstances and conditions that permit a crime to occur. Every crime has its own unique set of opportunities, but two conditions are usually present:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Access to the <\/span><i><span style=\"font-weight: 400;\">asset(s)<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An apparent likelihood that the crime can be committed successfully with minimal risk to the perpetrator.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Opportunity is the crime component that is most readily influenced by security measures. When developing security program, the first priorities should be the recognition of criminal opportunities followed immediately by the initiation of actions to remove those opportunities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/lixodex.co.za\/wp-content\/uploads\/2020\/05\/Lixodex-perimeter-detection.png&#8221; alt=&#8221;Lixodex perimeter intrusion detection&#8221; _builder_version=&#8221;4.4.3&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto||on||||||&#8221; text_font_size=&#8221;30px&#8221; text_line_height=&#8221;2em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;21px||1px||false|false&#8221; border_width_top=&#8221;2px&#8221; border_color_top=&#8221;#000000&#8243; border_width_bottom=&#8221;3px&#8221; global_module=&#8221;502&#8243; saved_tabs=&#8221;all&#8221;]<p>Sensors, dependent on the frequency of communicating have a battery life of 3 to 10 years (such as <a href=\"https:\/\/lixodex.co.za\">Lixodex<\/a>).\u00a0 This is due to advances in battery, processor power consumption and Low Power communication systems technology.\u00a0 These systems include communication error correction and jamming detection.\u00a0 Electronic counter measures such as jammer direction finding are optional.<\/p>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<h2><span style=\"font-weight: 400;\">Improve Perimeter Security through Intrusion Prevention<\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most crimes occur because the criminal found the right opportunity to act. The criminal\u2019s inclination<\/span> <span style=\"font-weight: 400;\">and the victim\u2019s asset<\/span> <span style=\"font-weight: 400;\">came together at a time and place where the criminal felt they could successfully commit the crime with minimal risk of interference or apprehension. That is, the criminal found circumstances and conditions to be within their comfort zone.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your job when developing a security program is to create an environment that lowers the comfort level of potential criminals. Applying the three \u201cD\u2019s\u201d of crime prevention helps do this.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h3><b>Deter\u00a0<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">The goal of deterrence is the creation of an environment that is unattractive to criminals.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anything that increases the likelihood that a criminal\u2019s actions will be observed and reacted upon by security personnel is a deterrent.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In general, open, well lit, well used areas are less susceptible to crime.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The visible presence of security measures and the use of access control devices and barriers are deterrents.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A successful deterrence program makes the criminal hesitant to commit their crime in that environment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Effective deterrents place psychological and\/or physical barriers in the criminal\u2019s path and imply to them that they have no easy <\/span><i><span style=\"font-weight: 400;\">opportunity <\/span><\/i><span style=\"font-weight: 400;\">to successfully commit their crime.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h3><b>Detect\u00a0<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">When a crime does occur, early <\/span><span style=\"font-weight: 400;\">detection <\/span><span style=\"font-weight: 400;\">greatly increases the odds that the criminal will be apprehended.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Early <\/span><span style=\"font-weight: 400;\">detection <\/span><span style=\"font-weight: 400;\">can be accomplished by a variety of means such as perimeter intrusion detection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Various electronic devices can be employed to <\/span><i><span style=\"font-weight: 400;\">detect <\/span><\/i><span style=\"font-weight: 400;\">criminal activity. These devices include sensor based alarm systems and closed circuit television.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The presence of alert security personnel and reaction teams and electronic security devices sends a message to the potential criminal that their actions will be detected.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This increased risk of apprehension reduces their level of comfort. As a result, opportunity<\/span> <span style=\"font-weight: 400;\">is also reduced.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Delay\u00a0<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">In spite your best efforts, some criminals may not be put off by security measures and other deterrent<\/span> <span style=\"font-weight: 400;\">efforts. In these instances, your next line of defence is to delay completion of the attack.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The longer it takes a criminal to complete an attack, the greater the probability that they will be observed and apprehended.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Barriers such as solid doors, good locks, fencing and other physical security measures are all devices that delay a criminal\u2019s activities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The presence of <\/span><span style=\"font-weight: 400;\">delaying <\/span><span style=\"font-weight: 400;\">measures increases both the difficulty and risk associated with a criminal\u2019s activities. Increased <\/span><span style=\"font-weight: 400;\">delay <\/span><span style=\"font-weight: 400;\">usually equates to decreased <\/span><span style=\"font-weight: 400;\">opportunity <\/span><span style=\"font-weight: 400;\">in the criminal mind.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h3><b>Response\u00a0<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Response, which requires human involvement, covers procedures and actions for assessing the situation and responding to an intrusion. Note: Because absolute protection is impossible to achieve, a security program that does not also incorporate detection, delay and response is incomplete. To be effective, all three concepts must be elements of a cycle that work together continuously.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h3><b>Recovery<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">How do you or your organisation recover from a criminal act. Recovery is your plan to continue business and operations as normally as possible following an incident.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h3><b>Re-evaluation<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Re-evaluation is critical. You must constantly keep your security plan under review and keep re-visiting your original assessment and objectives. Has the situation changed, do you now face new threats and what must be done to ensure the security plan continues to meet your goals and objectives?\u00a0<\/span><\/p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/lixodex.co.za\/wp-content\/uploads\/2020\/05\/mesh.png&#8221; alt=&#8221;ClearVU type mesh fencing&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.4.3&#8243; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; height=&#8221;1000px&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto||on||||||&#8221; text_font_size=&#8221;30px&#8221; text_line_height=&#8221;2em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;21px||1px||false|false&#8221; border_width_top=&#8221;2px&#8221; border_color_top=&#8221;#000000&#8243; border_width_bottom=&#8221;3px&#8221; global_module=&#8221;502&#8243; saved_tabs=&#8221;all&#8221;]<p>Sensors, dependent on the frequency of communicating have a battery life of 3 to 10 years (such as <a href=\"https:\/\/lixodex.co.za\">Lixodex<\/a>).\u00a0 This is due to advances in battery, processor power consumption and Low Power communication systems technology.\u00a0 These systems include communication error correction and jamming detection.\u00a0 Electronic counter measures such as jammer direction finding are optional.<\/p>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<h2><b><\/b><\/h2>\n<p>&nbsp;<\/p>\n<h2><b>Perimeter Security as part of Layered security\u00a0<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Most businesses already know that having a fence is not enough of a deterrent to keep intruders out.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In many cases fences are in themselves the target of criminals where the fence material is stolen and used in other applications such as building temporary dwellings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The last ten years or more has seen the addition of electrical fences to add an additional layer to fences as a deterrent.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Common criminals have learned over time how to circumvent electrical fences by using all types of objects to isolate wires and to draw them apart to gain entry without electric shock or sounding a zoned alarm.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This might sound like a hopeless situation, but when we consider security in a layered approach one can combine systems that assist in deterring and detecting criminal intrusions into properties.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Layered Security\u00a0Components<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Let\u2019s consider the different ways in which we can deter, detect and delay intrusions, lets see what is in the toolbox.\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Fences and Walls<\/b><\/h3>\n<p><b><\/b><\/p>\n<p><span style=\"font-size: 20px;\">Fences and walls, are a key component of a site\u2019s external protection. They help protect a site by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Delineating the boundary<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Deterring intruders, the casual ones<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Providing a delay to an intruder (against burrowing, penetrating or scaling) when used in conjunction with a Perimeter Intrusion Detection (PID) system or another means of detecting an incursion can be detected.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Acting as a host for barrier mounted perimeter intrusion detection sensors (PIDS)\u00a0 (the two systems need to be compatible)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Acting as a barrier to vehicles if suitably enhanced with Hostile Vehicle Mitigation (HVM) measures<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Enabling external view though fence line, or when required, provide cover from view.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Walls can also:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Prevent observation of the guard force, guard force patrol movements and assets within the site\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Fences and walls provide only limited delay against a determined or skilled attacker, but can also be vulnerable to attackers, with only limited skills and equipment, if they are not correctly designed and installed.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h3><strong>Electric Fences<\/strong><\/h3>\n<p><strong><\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><span>The primary function of an electrified fence is as a deterrent and detection system. Because of its nature of operation and physical appearance some regard it as a physical barrier. However, as a barrier, it is a good deterrent but offers little delay. As a detection system it can offer low false alarm rate and good detection performance against climbing and penetration attacks.<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span>Electric fences and their circumvention by low skilled intruders have become common place.\u00a0 Electric fences by themselves do not provide a high level of security.<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span><\/span><\/span><\/p>\n<h3>Perimeter Intrusion Detection Systems<\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Fence alarms incorporate sensors that are attached to fence structures to pick up vibrations and generate a response. This response can turn on a warning siren, light up a fence section or surrounding field, activate video surveillance and more.\u00a0 In the case of <a href=\"https:\/\/lixodex.co.za\">Lixodex<\/a> sensors any authorised person can see the status of each sensor across the whole perimeter on Google Maps from a mobile phone or computer, and see exactly where a intrusion alarm has been raised.<\/span><\/p>\n<p>&nbsp;<\/p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/lixodex.co.za\/wp-content\/uploads\/2020\/05\/police-blue-sky-security-surveillance-96612-scaled.jpg&#8221; alt=&#8221;Security video cameras Lixodex&#8221; _builder_version=&#8221;4.4.3&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<h4><\/h4>\n<h3><b>CCTV Security Systems<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><b>CCTV or c<\/b><span>losed circuit television involves the surveillance of the property through exterior video cameras. An Intelligent Video Analysis is performed on the images of the cameras, and in parallel all the images are continuously recorded on a recording device. Additionally they are visualized by the vigilantes both on-site and remotely, so that they can anticipate an intruder.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Ground Radar<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>Ground Radar detects potential perpetrators moving in from land. Units are often placed remotely, may be fixed or mobile; solar, battery or electric powered, and installed to communicate through wired or wireless connections.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Microwave Sensors<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>Microwave sensors, also known as Radar, PF or Doppler sensors, detect walking, running or crawling human targets in an outdoor environment. These sensors generate an electromagnetic (RF) field between the transmitter and receiver, creating an invisible volumetric detection zone. When an intruder enters the detection zone, changes to the field are registered and an alarm occurs.<\/p>\n<p>&nbsp;<\/p>\n<h3><b>Security Gates &amp; Operators<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>ASI Security has more than 21 years of experience installing security gates and operators for commercial and government clients. Whether you have a barrier gate, pedestrian gate, swing gate or vertical pivot gate, it is critical to have the right security gate opener installed and functioning properly to secure your facility.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Thermal Imaging<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>Thermal Imaging is often used in conjunction with radar to provide a detailed visual image of approaching people or objects, even in complete darkness.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Fiber optic detection systems<\/b><\/h3>\n<p>\u00a0<span>It is used to detect presences by a fiber optic cable. It is suitable <\/span><b>to protect fences and walls<\/b><span>, and to cover large perimeter extensions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Video Motion Detection<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>Video Motion Detection (VMD) may be installed as a stand-alone system or integrated into other detection systems to detect motion and capture the events. VMD is especially suitable for low-traffic areas as it detects moving objects (such as people or vehicles) within the predefined area, making it possible to automatically trigger an action.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Volumetric \/ Ground Sensors<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>Volumetric and Ground sensors generate an invisible detection field to detect intruders moving through it. Because the detection field is invisible, it is a fairly impenetrable security system. There are a variety of sensors which may be configured for multiple applications, including above- and below-ground sensors.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Microphone cable fence disturbance sensors<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>It is a perimeter protection system by cable that runs along the entire fence. When you try to climb or cut the wire, it becomes a <\/span><b>real microphone that transmits the sound<\/b><span> to the center.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Seismic sensors<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>These devices detect vibrations within their field of action and activate an alarm. They do not serve to detect an earthquake, but vibrations that can have several origins. A possible alert would be an attempted robbery by means of a hole in the wall to access a vault or against the use of thermal lances to pass through steel or concrete.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Active infrared systems\u00a0<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>These systems have no dead zones near to the transmitter\/receiver units but can be particularly susceptible to the effects of fog causing false alarms. These systems are only to be installed over flat ground as undulations can create dead zones. The alignment of transmitters and receivers over long ranges can be difficult. Features are available for these systems which can reduce false alarms from small or fast-moving wildlife (such as requiring more than one beam to be broken, or beams to be broken for longer than a\u00a0\u00a0<\/span><span>defined period of time). These systems also typically require a hard-wired synchronisation cable between each pair of transmitters and receivers, preferably in underground ducting.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Passive infrared (PIR) systems\u00a0<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p><span>These systems are not recommended for use as the primary detection solution for outdoor environments as their poor immunity to changing temperatures results in either a very poor detection rate or a very high false alarm rate. PIR systems generally use two types of optics to gather the infrared energy from the scene: Fresnel lenses; or more expensive mirror optics which are more accurate for long range (~100 m) applications. A variety of coverage patterns exist, from short and wide detection zones to long and narrow zones. Careful positioning is required due to dead zones and sources of false alarms such as sunlight or other distant, hot objects.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Laser scanner systems\u00a0<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span>As with active infrared systems, laser scanner systems can be susceptible to the effects of rain and fog. These PIDS can often have the ability to define parameters such as minimum target size or beam break time in a software environment.<\/span><\/p>\n<p><span><\/span><\/p>\n<p><span><\/span><\/p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/lixodex.co.za\/wp-content\/uploads\/2020\/05\/red-light-beams-1996035-scaled.jpg&#8221; alt=&#8221;laser scanner system Lixodex&#8221; _builder_version=&#8221;4.4.3&#8243; custom_margin=&#8221;||85px|||&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<h2><b>Rapidly deployable Perimeter Intrusion Detection System\u00a0<\/b><\/h2>\n<p><b><\/b><\/p>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Rapidly deployable Perimeter Intrusion Detection Systems\u00a0 have advanced drastically with the introduction of IOT (internet of things) technologies over the last several years.\u00a0 The same sensors can now be deployed rapidly to do detection over a limited time, while they can also be installed on a permanent basis.\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Battery power, microprocessors used, as well as low power communication allows sensor live from three years to ten years depending on the settings applied and the battery used.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It has become more practical to indicate the number of thousands of interactions a sensor can have over its life, as the number of sensor to base station interactions are more important.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main advantages include portability enabling use at different locations; and no requirement for permanent infrastructure in their use.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/lixodex.co.za\">Lixodex<\/a> sensors can be used as permanent installations and as fast deployable systems that can be easily be redeployed according to situational requirements.<\/p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/lixodex.co.za\/wp-content\/uploads\/2020\/05\/5-soldiers-holding-rifle-running-on-white-sand-during-87772-scaled.jpg&#8221; alt=&#8221;Rapid deployment Lixodex&#8221; _builder_version=&#8221;4.4.3&#8243; custom_margin=&#8221;77px||76px|||&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto||on||||||&#8221; text_font_size=&#8221;30px&#8221; text_line_height=&#8221;2em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;21px||1px||false|false&#8221; border_width_top=&#8221;2px&#8221; border_color_top=&#8221;#000000&#8243; border_width_bottom=&#8221;3px&#8221; global_module=&#8221;502&#8243;]<p>Sensors, dependent on the frequency of communicating have a battery life of 3 to 10 years (such as <a href=\"https:\/\/lixodex.co.za\">Lixodex<\/a>).\u00a0 This is due to advances in battery, processor power consumption and Low Power communication systems technology.\u00a0 These systems include communication error correction and jamming detection.\u00a0 Electronic counter measures such as jammer direction finding are optional.<\/p>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221; custom_padding=&#8221;||1px|||&#8221;]<h2><b><\/b><\/h2>\n<p>&nbsp;<\/p>\n<h2><b>The Five-Step Process to beef up your Perimeter Security<\/b><\/h2>\n<p>&nbsp;<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<p><span style=\"font-weight: 400;\">In order to carry out a comprehensive assessment of what your facility needs, you have to understand the basic elements of security \u2013 what it is you are protecting and how vulnerable it is. You have to know where any threats might come from and what you can do to prevent them or mitigate them. You have to understand the principles of deterrence, detection, delay, response, recovery and re-evaluation. You need to be aware of all the options available to you. Armed with this knowledge you can develop and implement the most appropriate integrated physical security plan for your facility.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When planning, there are two scenarios: if and when. The \u201cif\u201d scenario covers planning and procedures to prevent the likelihood of an incident. The \u201cwhen\u201d scenario covers planning and procedures after an incident and is mainly concerned with mitigation and recovery.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember that the cost to mitigate and recover may be less than the cost to protect, so there always has to be a balance between protection and mitigation. <\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221; custom_padding=&#8221;0px|||||&#8221;]<p><b>Step One<\/b><\/p>\n<p><b>Your Model Secure Facility\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A model secure facility \u2013 the facility that in a perfect world, is able to maximize security without compromising business as usual.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is important that you examine what would constitute a model secure facility for you. This is one which has identified its core functions, identified its critical assets, identified the threats and vulnerabilities and taken the appropriate measures to mitigate them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you come up with your model facility, you have a benchmark for comparison.\u00a0<\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<p><b>Step Two<\/b><\/p>\n<p><b>Gap Analysis: How Do You Compare With the Model Facility?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The goal of physical security is to protect facilities and buildings and the assets they contain. The most important of these assets are, of course, the people who work in and visit the facility. The first things you need to find out are:\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> The assets to be protected\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> The threat to those assets\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> The vulnerability of those assets\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Your priorities\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Develop answers to the following questions.<\/span><\/p>\n<p><b>What Am I Protecting?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The goal of security is to protect facilities and buildings and the assets contained inside. Various layers of security may be necessary in different parts of the campus and buildings depending on the assets located there.\u00a0<\/span><\/p>\n<p><b>Who Are My Adversaries?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is important to identify and characterize the threat to these assets. This threat can come from within or outside.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internal threats include pilfering of office equipment or theft of classified information. Internal threats also include disgruntled employees who may sabotage equipment or attack other employees.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">External threats range from vandalism and break-ins to acts of terrorism.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You need to know your adversaries and the various tactics they might use.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You also need to know their motivations and capabilities.\u00a0<\/span><\/p>\n<p><b>Where Am I Vulnerable?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Until you discover your areas of vulnerability, you cannot develop the strategies needed to protect them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You must identify and characterize vulnerabilities \u2013 weaknesses \u2013 that would allow identified threats to be realized.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A major problem for businesses in urban areas is the lack of a secure perimeter.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, assess how you might be impacted by an incident at a nearby facility, such as a chemical spill, and what steps you would need to take to protect your property and people.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By identifying your weaknesses you are able to develop solutions to eliminate them.\u00a0<\/span><\/p>\n<p><b>What Are My Priorities?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Risk assessment must take into account the effect on your business or operation if assets are destroyed or damaged.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Part of that assessment is to rate the impact of the loss of those assets on a scale of low, medium or high.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This will identify the critical assets that need maximum protection.\u00a0<\/span><\/p>\n<p><b>How Do I Compare?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once you have established the above, you are in a position to do your Gap Analysis to identify what needs to be done to reduce risk, increase safety and provide the necessary physical security for your building and people. How do you compare to the model facility?<\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<p><b>Step Three<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Having identified your shortfalls, you must then consider and evaluate all available options to mitigate the threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is a vast array of external and internal systems and devices available.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You must determine which are the best options and combinations for your particular circumstances. If you have questions, consult an independent security consultant rather than a vendor with a vested interest in selling you its product. <\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<p><b>Step Four<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Having identified assets, adversaries, threats, vulnerabilities and determined priorities and options, you are in a position to plan and strategize the security change process.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This means developing a road map \u2013 you know where you are and have to plot how you are going to get where you need to be. <\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; text_font=&#8221;Roboto|500|||||||&#8221; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Roboto|900|||||||&#8221; header_2_text_color=&#8221;#e09900&#8243; header_2_font_size=&#8221;40px&#8221; header_3_font=&#8221;Roboto|500|||||||&#8221;]<p><b>Step Five<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once your strategic plan has been approved, it must be implemented. This includes project management, bid contracting and vendor selection, quality assurance and quality control, and revising policy procedures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Integrated physical security planning is also an ongoing requirement.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Re-analyze your current situation. Ask yourself what has changed and what new threats have emerged.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By constantly tracking and monitoring your integrated physical security system you can close any gaps and introduce enhancements.\u00a0<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>PERIMETER SECURITY AND THE FIVE STEP PROCESS TO MITIGATE THREATS In this post we cover the following topics helping you to improve your perimeter security: &nbsp; Factors for an intrusion to occur Intrusion Prevention Layered security Layered Security\u00a0Components Rapidly deployable Perimeter Intrusion Detection System The Five-Step Process to mitigate intrusion threats Factors for an intrusion [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":118,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080"},"categories":[9],"tags":[20,23,21,18,19,22],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HOW TO BEEF UP YOUR PERIMETER SECURITY AND THE FIVE STEP PROCESS TO MITIGATE THREATS - Lixodex<\/title>\n<meta name=\"description\" content=\"Do you want to change your fence into a hard target, do quick response and recovery, and greatly improve the savety of people and assest, read on...\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/lixodex.co.za\/?p=442\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HOW TO BEEF UP YOUR PERIMETER SECURITY AND THE FIVE STEP PROCESS TO MITIGATE THREATS - Lixodex\" \/>\n<meta property=\"og:description\" content=\"Do you want to change your fence into a hard target, do quick response and recovery, and greatly improve the savety of people and assest, read on...\" \/>\n<meta property=\"og:url\" content=\"http:\/\/lixodex.co.za\/?p=442\" \/>\n<meta property=\"og:site_name\" content=\"Lixodex\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-03T16:26:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-04T13:14:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lixodex.co.za\/wp-content\/uploads\/2019\/04\/GATEWAY-2-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lixodex.co.za\/#website\",\"url\":\"https:\/\/lixodex.co.za\/\",\"name\":\"Lixodex\",\"description\":\"Always Know\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lixodex.co.za\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/lixodex.co.za\/?p=442#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lixodex.co.za\/wp-content\/uploads\/2019\/04\/GATEWAY-2.png\",\"width\":1920,\"height\":1080,\"caption\":\"Lixodex perimeter security technical advantages\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/lixodex.co.za\/?p=442#webpage\",\"url\":\"http:\/\/lixodex.co.za\/?p=442\",\"name\":\"HOW TO BEEF UP YOUR PERIMETER SECURITY AND THE FIVE STEP PROCESS TO MITIGATE THREATS - Lixodex\",\"isPartOf\":{\"@id\":\"https:\/\/lixodex.co.za\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/lixodex.co.za\/?p=442#primaryimage\"},\"datePublished\":\"2020-05-03T16:26:03+00:00\",\"dateModified\":\"2020-05-04T13:14:08+00:00\",\"author\":{\"@id\":\"https:\/\/lixodex.co.za\/#\/schema\/person\/84fd0a0591fe51b464ab318a6f146550\"},\"description\":\"Do you want to change your fence into a hard target, do quick response and recovery, and greatly improve the savety of people and assest, read on...\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/lixodex.co.za\/?p=442\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lixodex.co.za\/#\/schema\/person\/84fd0a0591fe51b464ab318a6f146550\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lixodex.co.za\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b49444ab3e701121c0e4334b0bcde93?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lixodex.co.za\/index.php?rest_route=\/wp\/v2\/posts\/442"}],"collection":[{"href":"https:\/\/lixodex.co.za\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lixodex.co.za\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lixodex.co.za\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lixodex.co.za\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=442"}],"version-history":[{"count":33,"href":"https:\/\/lixodex.co.za\/index.php?rest_route=\/wp\/v2\/posts\/442\/revisions"}],"predecessor-version":[{"id":563,"href":"https:\/\/lixodex.co.za\/index.php?rest_route=\/wp\/v2\/posts\/442\/revisions\/563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lixodex.co.za\/index.php?rest_route=\/wp\/v2\/media\/118"}],"wp:attachment":[{"href":"https:\/\/lixodex.co.za\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lixodex.co.za\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lixodex.co.za\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}