19 minute read

Integrating perimeter security

PERIMETER

Security from the outside in

Advertisement

As a security installer how can you use perimeter security to limit security loopholes? Here we discuss how securing the perimeter is key to improving the performance of any secuity installation

As a reader of Professional Security Installer, you’ll already be fully aware of the value of electronic security systems when looking to improve the protection of a site or space. Specifying physical electronic deterrents, such as CCTV, will also be firmly on the radar when planning a new security strategy. But how does perimeter fencing fit in with the technology? According to Peter Jackson, MD, Jacksons Fencing, physical barriers can help achieve a better integrated security solution, and add an additional and very valuable layer to better protect people and property.

“Using an integrated strategy essentially means combining all aspects of security in a layered approach that leaves no vulnerable points,” says Peter. “This can be applied to any type of site that needs protecting. The majority of buildings, from high profile Government facilities, to less conspicuous premises such as warehouses, or even residential properties will benefit from integrated security such as fencing, CCTV, alarms, and security lights.”

Bespoke solutions

The type of site being specified for should give an initial idea of the type of perimeter solution required, and this can be investigated further via thorough risk assessments and surveys of the surrounding area. From this, it’s possible to establish the strength of fencing required and any aesthetic concerns.

“The fencing should match the risks raised by the assessment, including crime rates of the local area, how the area is lit at night, and the site's location,” explains Peter. “Residential developments would likely require security fencing that deters trespassing and vandalism, whilst also blending into the surroundings for an attractive finish. A data centre or utilities site, conversely, will take less consideration of aesthetics and focus on access and exit points, as well as the security rating of the fencing to ensure maximum security.”

Assessing the area

The perimeter of a site will generally require security fencing. For a commercial project, this may mean installing either welded mesh or vertical bar fencing. However, for residential properties, more aesthetically pleasing timber fence panels are a popular choice. Double sided panels without rails are ideal for creating a boundary that’s difficult to climb.

Before you take the leap and begin installing fencing, it is important to identify which other areas of the site need to be secured, taking additional requirements such as access or “Physical barriers can help achieve a better integrated security solution, and add an additional and very valuable layer to better protect people and property”

PERIMETER

“Perimeter fencing will only ever enhance a security strategy, and when specified correctly, alongside electronic security systems, it will create a robust level of physical protection”

(continued from previous page)

vulnerability into consideration. For example, a commercial site such as a business park would usually need to be easily accessible during the day but secured at night. Areas such as storage compounds, waste units, machinery or other sensitive areas will require stronger security, while for other locations lower-risk security fencing such as timber fencing, demarcation fencing, or non-security rated opinions could be suitable. Specifying fencing suited to the risk level of each area will enable proportionate budget allocation.

Access control and gates, where required, must be specified alongside security fencing to ensure they don’t compromise site security.

Privacy vs visibility

“The level of visibility desired will determine which security fencing styles and panels will be appropriate for the site,” advises Peter Jackson. “Security fencing also needs to work in conjunction with other security measures, such as CCTV; while solid panels may offer greater privacy, they may also create blind spots.

“Vertical bar and welded mesh panels offer both high visibility and work well with CCTV, as well as offering various levels of security and privacy.”

Acoustic barriers, whilst providing noise reduction, also offer the greatest privacy and strong security performance; their flat profile makes them intrinsically anti-climb due to the lack of potential hand or footholds. An additional layer of mesh is included with LPS 1175 rated options, to increase strength and resistance to attacks for high-risk properties.

The icing on the cake

Security toppings can enhance the specified fencing to provide additional security. This is necessary for areas of higher risk, for example in built up areas, but also sites adjacent to natural climbing aids, such as trees, lampposts, bollards, or other buildings close to the perimeter fence line. Even warning signs notifying passers-by of security toppings can themselves act as a deterrent.

Fence toppings act both as a physical and visual deterrent to increase security levels against intrusion, vandalism, and other damage, and can include barbed wire and tape, steel spikes, and rotary systems, for fences, walls and drainpipes.

Be aware that installing security fence spikes may require additional adherence to regulations and usually need to be above two metres and out of reach of the general public. Again, use them according to the risk level of the site. Using schools as an example, if it is located in a high-risk area, it may require security toppings, but there is also a need to create a welcoming environment, so we would recommend only adding them where absolutely necessary, or instead opting for an anti-climb fence.

Wear and tear

For any site, investing in the longevity of the chosen security fencing will save money on costly repairs and deterioration in the long term. Look for polyester powder coating rather than traditional paint, which ensures the coating won’t chip or crack and will retain a glossy finish, or select a galvanised or zinc alloy-coated steel to protect fencing from corrosion or rust, and guarantee durability.

For projects on a strict budget, cost savings can be made by avoiding specifying higher security fencing than is needed for the site. Remember that opting for fencing without a guarantee may save some money initially, but will incur costs and require replacing far sooner than fencing with a comprehensive guarantee.

Aftercare

When adopting an integrated approach, maintenance of security measures needs to be factored in. After all, there's not much point in spending substantial amounts of money on security if you’re not checking regularly that it’s working.

“Perimeter fencing will only ever enhance a security strategy, and when specified correctly, alongside electronic security systems, it will create a robust level of physical protection, making the site far less appealing to intruders,” concludes Peter Jackson.

TEXECOM

Connection without complexities

Does connectivity always have to be complicated? The Texecom Connect SmartCom is an Ethernet and Wi-Fi communicator that facilitates the Texecom Connect app experience by connecting any Premier Elite control panel to a local area network

In today’s connected world your customers will be used to 24/7 remote access to a host of technologies and the ability to monitor and manage systems using personal devices such as smartphones and tablets. Security systems are also expected to be fully remotely accessible and many DIY systems are fully operated by mobile technology, but can professional systems also be managed by an app? And what about the complexities of always-on connectivity?

Texecom has two solutions that deal with these issues and both enhance the service you can offer your customers when specifying modern, professional alarm systems boasting simple set-up and user experience.

Texecom Connect V2

The Texecom Connect V2 app integrates with Texecom’s flagship security systems, the Premier Elite Series, to allow users to take direct control of their home and security. Using the app to control the operation of the security system, users receive notifications of system events and are able to monitor cameras or activity from anywhere in the world.

The app provides an environment where end users actively want to interact with their home, enjoy the new possibilities that are open to them and receive the peace of mind that comes with knowledge and control. It has been designed to allow end users access to an array of custom features, to tailor their app experience for their own personal and particular needs, without resorting to complicated programming.

Available on Android or iOS, Texecom Connect V2 also allows professional installers to manage their portfolio of app users directly from their Texecom Cloud account. You can add new users, migrate existing Texecom Connect users and manage your portfolio from the convenience of a single app and what’s more, with a free Texecom Cloud membership tier and free Texecom Connect app management contract, Texecom Connect V2 remains completely free of charge.

SmartCom and SmartCom 4G

Communicating exclusively using outbound connections, the Texecom Connect SmartCom removes the need to open any router ports, ensuring simplicity of installation and maximum security. As such, any installation that has a reliable internet connection can benefit from Texecom Connect with the addition of the Texecom Connect SmartCom.

Texecom’s new SmartCom 4G system adds new connectivity options for Premier Elite systems improving connection reliability. Providing access to Texecom Cloud and Texecom Connect services via single path (4G) or dual path (4G plus Ethernet or Wi-Fi), the SmartCom 4G is always on, always ready, and always available.

Key application benefits include: • Single path 4G can be used without any additional network infrastructure which is perfect for new commercial installations where IT networks are not yet operational • Completely wire-free installations are perfect for remote sites or outbuildings, or where there are no local internet options available • Dual path 4G plus Ethernet or Wi-Fi provides best of both worlds • 4G backup provides continuity in the event of power failure, local network availability or

ISP issues. Texecom’s new SmartCom 4G system adds new connectivity options for Premier Elite systems improving connection reliability

How to get connected

The Texecom Connect app V2 will require installers to have an active Texecom Cloud account. If you haven’t already, sign up your company for a Texecom Cloud account via the website where you can pick up all of the information you’ll need to get started.

PAXTON

The evolution continues...

Recent events around the world have changed the requirements of access control technology. Here we find out how the Paxton10 platform has evolved to meet those demands

Over the past 18 months, there has been an undeniable global change in the way people access work buildings and public spaces. Governments in many countries had social distancing measures in place which were crucial to fight against the spread of the pandemic. This meant that access control and site video management were areas of technology that really made a difference to public health and the stabilisation of businesses. To put it simply, the pandemic has changed access control and how we choose to identify ourselves, probably for the long term as contactless ID with apps and NFC devices become the favoured choice.

Paxton was able to recognise this change and adapt its technology to suit the demands of the user whilst maintaining the ease of installation for engineers. Just a few years since the introduction of Paxton10, the technology platform has evolved to suit the market and the changes that we have seen come to the fore in recent times, but always with the key ingredient of simplicity in mind as explained by Gareth O’Hara, Paxton’s Chief Sales Officer: “As users of technology our requirements continue to evolve. System users prefer a single point of management, rather than disparate systems, and they want to view and manage things on a hand-held device. New technology allows us to achieve these things but, as a manufacturer, we have a responsibility to make our technology as accessible and as simple as possible.”

A unified solution

Paxton10 combines access control and video management in one user-friendly platform boasting software and quality hardware that is built to last. The aim of the system is to create a unified security solution with a simple out-thebox installation and configuration process. Updates including the Paxton Key app and the launch of Paxton10 Multi-site take the awardwinning security solution to the next level, providing the latest step in smart security management. Here we take a closer look at the latest development in the growth of the access control panacea.

Paxton10 Multi-site

One of the recent updates to Paxton10 is the ability to allow global multi-site management and contactless access via virtual tokens which maximises the potential for expanding "The benefits and convenience of contactless access control have been well documented prior to, and even more so during the pandemic”

PAXTON

Smart credentials can be issued ahead of time via email and for a fully contactless experience the app enables readers to detect devices at varying distances, according to preference

(continued from previous page)

businesses in multiple locations. It is now possible to manage up to 1000 doors and 1000 cameras, across 100 sites anywhere in the world, via a single server with all data to and from sites encrypted using the 128-bit SSL internet standard using Paxton10 Cloud Services. Administrators can add up to 50,000 users, with no additional fees, making the system cost-effective and continuously scalable. The sites connect via simple software with an activation code to identify a Paxton10 Controller at the new site, and the system does the rest.

“It is very common for all types of end customers to require a security system that covers many premises, often in completely different locations,” says Adam Stroud, Group Chief Executive at Paxton. “A chain of shops, for example, with a head office and 80 retail outlets would benefit from having a single system so that staff information only needs to be entered once, and appropriate access permissions can be set across all premises. Also, the whole estate can be managed and monitored centrally allowing greater efficiency.

“For many years, businesses with multiple sites have had to choose between administering their sites independently or requiring a permanent Wide Area Network (WAN) to allow a single system to span all of their sites. Quite often, neither of these options are good enough, as they require either a significant administrative burden, or a complex and costly IT infrastructure,” says Adam. “With the Multisite functionality, we have addressed all of the time consuming and costly issues associated with other systems.”

The Paxton Key App

Set up in minutes with minimal technical knowledge, no VPN, or any additional infrastructure, the Paxton Key app utilises license-free Bluetooth smart credentials available with Paxton10, and a user’s smart device to enable access to Paxton10 controlled buildings. Smart credentials can be issued ahead of time via email and for a fully contactless experience the app enables readers to detect devices at varying distances, according to preference. This means access can be granted without ever removing smartphones from pockets. The app also works with a device’s existing biometric capabilities, adding extra security via personal identification. The touchless feature has always been a significant point in Paxton10’s development, but the pandemic means this is an immediate requirement for customers as the requirement for non-contact access has come to the fore. "The benefits and convenience of contactless access control have been well documented prior to, and even more so during the pandemic,” says Gareth O’Hara. “Being able to provide access credentials without having touch points not only offer users convenience, but also ensures they are reducing the risk of infection to themselves and others”.

Using smart credentials is convenient, secure, and useful for unmanned sites as they can be emailed ahead of time. When combined with Multi-site, this remote technology is powerful for managing many buildings in different locations without expensive, complicated infrastructure.

Gareth O’Hara continues: “The new update to Paxton Key is exciting. It utilises the latest smart device technology and provides users with seamless access by using background capabilities of a personal device. This process enhances security by allowing an individual biometric verification, without storing a user’s personal data.”

Like all Paxton products the emphasis on Paxton Key is simplicity and ease of use. The app has been designed to function in a logical way with a flawless experience. It will continue to run in the background, ready for when the user needs instant access. The update has also been optimised not to reduce a devices battery life.

“We should be able to breeze seamlessly through a door with security and convenience. This is paramount in all our decisions when developing Paxton10,” concludes Adam Stroud. “Installer and customer needs will both continue to drive the direction of Paxton10 as we develop the platform to meet those demands and go beyond what else is available in access control and security management.”

How the Cloud is transforming security

Cloud security applications are transformative for businesses, enabling smart buildings with remote access control and sophisticated 24/7 monitoring. The granting and revoking of access can now be done instantly from anywhere; each individual does not need to be escorted personally. Cloud also allows for complex video analytics, which can detect, track and classify the behaviors of people and vehicles on the premises. Push notifications can alert you to suspicious behaviors so that security management can intervene before situations become dangerous. Additionally, cloud-based systems can provide greater insight into day-to-day activity, such as when and where employees or vendors have accessed certain spaces, or even if a door was left open.

For security dealers, the power of the cloud is all about account insights. Data from internet-connected security systems can now be accessed remotely, allowing for quick identification of customer issues on individual accounts. Some issues can even be handled remotely, which can help security dealers avoid service calls.

Additionally, cloud is enabling business growth and customer loyalty by allowing dealers to identify customers that aren’t subscribed to but might benefit from certain services, or who don’t have certain peripherals installed but are capable of adding them. For more visit: www.security.honeywell.com

Latest IDIS VMS improves visual awareness, incident response and investigation

IDIS has released IDIS Solution Suite (ISS) version 3.5, its most powerful enterprise-class VMS yet. New features and service modules are designed around increased situational awareness, efficient response coordination, and speeding up investigations. Improving real-time monitoring, text-to-speech allows operators to configure verbal multilingual notifications to pre-determined events.also benefit from real-time pop-ups based on the GPS location of a triggered alarm, providing enhanced widearea awareness from cameras ranging from a 10 to 100 kilometre radius. A new centralised audio feature enables control of multiple devices, giving security teams the capability to automate audio alerts for day-to-day operations, and issue warnings in the event of a security or safety breach or emergency situation. A new Real-Time Transport Protocol (RTP) service also enables seamless and stable video and voice relay to third-party devices and software without an SDK or API, increasing system flexibility and helping security teams coordinate responses to threats and incidents.

To speed up investigations, IDIS Person Match extracts a person’s characteristics based on deep- learning video analytics from multiple streams to present a clear timeline of events and last known locations. Synchronised Playback also presents operators with precisely time-synched screen views of video streams across single or multiple sites, removing the need for manual configuration, and reducing stress and complexity particularly during time-critical events. For more information on IDIS Solution Suite go to www.idisglobal.com/index/iss

Open Door is an online service from PSI that provides in-depth information from a selection of market leading companies. Here are some of the highlights from the pages of Open Door.....

Not all detectors are the same...

An intruder alarm system is only as good as the sum of all of its parts, which is why the choice you make when specifying PIRs and sensors for an installation makes all the difference The performance of detectors, the reliability of wireless functionality and the development of smartphone apps have helped improve the performance of intruder systems and also made installing the technology even easier. For example, commissioning the original panel, PIRs, sounders etc is much easier with a wireless system but when the panel needs a few extra detectors or peripherals added at a later date is when wireless wins hands down in terms of speed of install and simplicity. In terms of detectors it is vital for the efficiency of the whole system that the best products are used.

Recently reviewed in PSI magazine with an impressive 9/10 rating, the Capture range from Texecom comes with EN Grade 2 wired or wireless connectivity, wall or ceiling mounting, and a choice of detection technologies including dual element, quad element or dual technology sensing for a variety of security environments. Use the QR code for more information

Unmanned train depots secured by Video Analytics

Southeastern Rail Network operates train services between London, Kent and parts of East Sussex. It is one of the busiest networks in the country, transporting 640,000 passengers each weekday on its 392 trains, which are temporarily housed in 12 depots situated around South-East England. Some of these depots are unmanned, and therefore require intelligent security solutions. Bosch Security System’s Integration Partner, Taylor Technology Systems, were tasked with upgrading the entire video surveillance system across the 12 depots. The camera portfolio installed across the 12 depots included FLEXIDOME IP starlight 7000 VR, DINION IP starlight 7000 HD and AUTODOME IP starlight 7000 HD cameras. These cameras are all equipped with Bosch’s Intelligent Video Analytics solutions ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Visit: www.boschsecurity.com/gb/en/

Integriti update includes biometrics and real time location tracking

Access control and security system designer and manufacturer Inner Range has released the Version 21 update for its Enterprise-level system Integriti, which includes integrations with Suprema biometrics and Quuppa real time location tracking. The new integration with Suprema allows users to add thumb and face scans as access credentials, which can be used in addition to smartcards and PIN for high security with trouble-free access.

The integration with Quuppa means tagged information from the Quuppa system can be associated with Integriti entities, allowing direct control of the asset from either system. The asset could be an object, or a user associated with it.

The location of tagged assets can be made visible on Integriti’s schematic of the site, alongside all other access and security devices. Operators can access all cameras with the asset in their field of view, if fields of view are configured. Alert protocols can be set up with bespoke criteria and operators can track and view the asset instantly if an alert is triggered. Visit: www.innerrange.co.uk

This article is from: