Articles that Enrich and Expand on Physical Security Technologies

Critical Infrastructure Protection (CIP)

According to the US government, critical infrastructure can be divided into 16 sectors.

These sectors are considered essential in such that their incapacitation or destruction would affect national security, economic security, health, and safety.

Although critical infrastructure sectors may vary from country to country, the main objectives of their perimeter security protection include:


Detect activity along the perimeter, inside and out. Receive early warning of approaching people or vehicles and detect unauthorized perimeter and border breaches. Receive warning of unauthorized entry at the perimeter and other sensitive outdoor areas.


Deter would-be intruders through the systematic deployment of security fences, security lighting (both internal and along the perimeter), signage, two-way intercoms, and other security mechanisms. Avoiding incidents in the first place is always the best outcome.


Delay intrusions by keeping the perimeter fence and any outrigging well-maintained. For buildings, ensure all doors are properly reinforced with high-quality anti-tamper hardware. The greater the delay, the greater the chance security forces can respond before damage, theft, or personal injury can occur.


Deploy security CCTV cameras with high quality video to ensure security staff can easily observe an incident (and ideally identify the individual involved). As thermal and low-light cameras are ill-suited for identification purposes, proper security lighting is essential for proper assessment.

Ensure that the video management software is suitable for managing large camera deployments and able to direct staff attention to key events. Respond effectively to security and operations events using critical information obtained from sensors and surveillance systems. Centralize management of security and surveillance systems.


Communicate with security forces and provide information critical for a coordinated response. Critical information may include live video or still images communicated over mobile networks, location information, and frequent updates. Communication also includes ensuring staff have a documented process to follow, ideally closely linked to specific security events.


Follow documented procedures to assess, interrupt and/or apprehend an intruder. The most typical response is to dispatch security personnel and notify law enforcement, but a response may also include transforming information into business intelligence by collecting data on processes to identify trends and issues, gathering intelligence about operations, crowds, left items, vehicles, suspicious behavior, and persons of interest.

Key to the success of any security technology is how well it integrates with the day-to-day operations of the organization:

  • Integrate – Streamline operations by integrating intrusion detection, video surveillance, and access control.
  • Protect – Keep staff safe by equipping them with personal duress devices.
  • Maintain – Ensure system confidence with field-proven equipment that is simple to operate and maintain.

Posted in: Perimeter Security Info