Home>News>Physical Security of Products

Physical Security of Products

Recommendations on task designing of physical security systems for objects.

The main purpose of security systems is the protection of assets, clients, guests and staff that are inside the secured objects. With “security” word it is not pretended the inviolability of the objects secured from malicious elements. Security means: prevention, obstruction, detection, delay and activation of actions to stop the malicious element if they enter the protected area. For the security system to accomplish its protector functions, at first the protected areas must be defined clearly and then comes the system selection, depending on the security level that these areas require.

 

Based on the best practices of physical safety field, security levels could be as followed:

  • The first security level – The outside territory perimeter area of the protected object.

In this area, usually there is continuous movement of people and vehicles, which is why the devices installed here are used for general monitoring of early malicious detection.

The best devices used for this area can be security cameras that are combined with intelligent apps like video analytics, to provide the best image analysis and to predict malicious actions. Software with artificial intelligence and with deep machine learning are mostly effective to prevent criminal situations.

On situations that include objects with critical importance and are positioned on isolated areas, where there is little or no movement of people and vehicles, the best devices for surveillance would be compact radars. They have the ability to discover and trace movement in very wide areas, in every environmental conditions (snow, rain or fog). Object examples of this nature are: hydropower plants, high power stations, power or industrial parks, prisons, military etc.

  • The second security level – The territory perimeter area of the protected object.

This area consists on the territory perimeter itself. The security level here is responsible to detect and obstruct the unauthorised elements that pass the perimeter limit or its entry gates.

The best devices used for this area are thermic cameras with analytic software on board and mechanical barriers controlled by access control devices installed at the perimeter entry gates.

  • The third security level – The inside territory perimeter area of the protected object.

This area consists on the inside territory of outside perimeter, such as garden, yard, parking or the area where equipment and wares are placed. This type of security level is responsible for a further detection of a malicious element that has managed to pass the second security level.

The best devices used in this case would be PTZ cameras or the combination of compact radars with PTZ cameras. The PTZ cameras require control from the safety operators, meanwhile the combination mentioned above provide the automatic detection and identification of malicious element.

  • The forth security level – The building perimeter area of the protected object.

This security level is responsible for the building entrance protection which might be from the doors or windows.

The best devices suitable for this security level can be: control access on building entrance, metal detectors, alarm systems that detect movements, security cameras. These devices can be programed in the way that activate alarms in different periods of time depending on the company needs.

  • The fifth security level – The controlled access organization inside the building.

This level is responsible for access guarantee inside the building in accordance with the access rights of staff, clients or guests. Limited access areas are divided by physic barriers that are controlled through the access control system.

The best devices suitable for this security level are: armoured doors, access control equipment, electromagnetic gate locks.

  • The sixth security level – This is the high security level which allows only authorised staff that meets the approved protocols for its access.

Examples of this area can be: armoured gates commanded by access control in accordance with approved protocols, such as: the two person rule, which permits the gate opening only when two authorized persons are present. Security cameras can register every movement of these persons inside the high security areas.

 

The above security levels might change from one project to another, depending on the importance and typology of the object that must be protected.

On the majority implemented security projects it is concluded that subjects have their own limitations on the installation of security systems that consist on security cameras and image protection devices. While these systems may help to detect criminal events, they are not effective in preventing or obstructing the malicious elements in pursuit of their purpose.

A good security system must be in the condition to prevent, to obstruct criminal activities and notify in real time the safety teams for interference.

 

For more information you can learn more from our Axis Communication products portfolio.

2018-08-14T10:20:16+00:00