Pages

Wednesday, December 12, 2012

10 Tips for Planning Perimeter Security



With inexpensive options and the improvements in technology against false alarms, more and more dealers and systems integrators are expanding their security to the perimeter. While interior protection will always be a part of a complete intrusion detection system, perimeter security allows end users, on-site guards and remote monitoring centers to know the moment an intruder steps onto the property. Below are ten tips to remember when planning a successful perimeter security system:
Stay current with technology. Your manufacturers should provide in house training at your office for your sales and installation teams at no cost while updating you on trends, technology, and the latest equipment. Successful dealers work directly with the manufacturer's sales personnel to help design, propose, train, and even close your projects for you. Including your manufacturer in the sales process, including sales calls, will lend you instant credibility and close more sales all at no cost to you.
Assess how your client intends to use the site. Make sure that your client understands how the products you are recommending work. This will help to avoid any future problems such as the client moving things around the site and accidentally blocking AIR paths or creating dead spots in front of PIR detectors.
Become certified. Many times a manufacturer will provide certification training on higher-end perimeter detectors at no cost. This not only allows you to become familiar with the product and its applications, it gives you the opportunity to offer more options to the client.
Use the tools available to you. If the manufacturer has tools/appliances recommended to use during set-up, use them. Not only will they make sure the products are set-up/calibrated correctly, they are often a huge time saver during the installation process.
Confirm your design/site plan with the manufacturer. It's important to do this before quoting your customer. Oftentimes the manufacturer will find something you missed or ways to save you money with a different design.
Use recommended manufacturing mounting hardware and accessories. When bundled with photobeam towers, premier manufacturers will mount and assemble your perimeter detectors at no additional cost. This allows for a tremendous amount of savings on labor and opportunity cost. The cost of driving to your local hardware store and standing in line to buy simple items can be saved many times over by having the manufacturer assemble and ship your equipment directly to your job site. This also provides a professional look to your installation.
Go wireless! Eliminate the additional expense of costly labor and wiring to gain more jobs and provide a better-designed system. There are many options for reliable wireless detection for outdoor/perimeter applications.
Utilize video monitoring/verification where possible. When you're dealing with outdoor systems, legitimate activations by an animal or person can often be considered "false alarms" when there is no evidence as the police or client responds 30 minutes later. The majority of photobeam and PIR detectors can easily be set up to trigger a camera.
Strategize and plan your detection coverage. Use redundant measures for true security such as double stacking your photoelectric beams to keep intruders from “jumping over” or crawling under. Along with protecting the perimeter, use rugged outdoor high mount PIR detectors with false alarm prevention technology for spot protection – they are low cost, reliable, and provide a interior trap.
Verify your perimeter's limitations. For example, when using Photobeams as a perimeter, make sure you have enough space between the wall or fence and the detector so that an intruder cannot jump over the beam and bypass the perimeter. If using PIR devices as your perimeter, allow yourself ample room to make sure there will be no bleed-thru beyond the fence line. 
Following these simple tips can mean the difference between a problem free perimeter security system and one that will cause headaches for you and your client. With the assistance of a quality manufacturer and advancement of new technologies, there is no reason to not have a successful install.

8 comments:

  1. DEFENSOFT's flagship product, LIGHTHOUSE, is a geo-spatial software system for integrated analysis of threat, infrastructure, equipment and terrain to produce mission plans and optimized security arrays to cover large terrain areas. Customers use LIGHTHOUSE as their primary tool for planning deployment of detection and surveillance sensors, communication devices, fences, patrol roads, response units, barriers, and other security-related infrastructure. The advanced algorithms developed by the Company over the last 8 years, enable LIGHTHOUSE users to very quickly plan optimal security arrays that answer the operational requirement within budget and other constraints. LIGHTHOUSE is also used by military and paramilitary organizations for planning missions and positioning mobile sensors and communication devices for mission support.



    Amongst DEFENSOFT's customers are governments and 1st tier international defense contractors and integrators. The company is supporting border security for thousands of kilometers of borders located in Israel, the US and Asia, two large international airports, and dozens of oil and gas assets worldwide. DEFENSOFT has been selling its products and services to the IDF since 2004 and was involved in projects such as the Israel Security Fence, the Israel Gaza Border, Israel's North Border and now the border with Egypt.



    Automatic Planning of a Multiple-Sensor Array
    Optimize Camera & Radar Installation Params
    Identify Penetration Paths & Vulnerabilities
    Radar Probability of Detection
    RF Propagation for Wireless Communications
    Microwave Communications Analysis
    Advanced Line-of-Sight Analysis
    High-end Terrain Analysis
    Threat & Response Analysis
    Interoperable with Leading GIS/CAD Systems

    ReplyDelete
  2. Wonderful goods from you, man. I have understand your stuff previous to and
    you're just extremely magnificent. I really like what you have acquired here, certainly like what you are stating and the way in which you say it. You make it enjoyable and you still care for to keep it smart. I cant wait to read far more from you. This is actually a wonderful website.

    Stop by my web page :: polarized sunglasses

    ReplyDelete
  3. It is a very informative and useful post thanks it is good material to read this post increases my knowledge IT System Integrator Dubai | IT System Integrator Saudi | IT Service Provider

    ReplyDelete
  4. THANKS FOR SHARING SUCH A GREAT WORK
    GOOD CONTENT!!
    Dubai Ip Camera

    ReplyDelete
  5. These Lock Systems Replacement Parts the traditional keys with better and more secure automation features like remote locking and unlocking. In these locks, a latch or bolt is made to cross the opening between the side of the door and the doorframe, thereby preventing access.

    ReplyDelete
  6. Our professional security officers are available 24/7. Use onsite security guard as a stand-alone service on a long-term or temporary basis, or create a customized security program by combining it with Remote Guarding and Mobile Guarding for our unique Integrated Guarding Solutions.

    ReplyDelete