Integrated perimeter security system
Perimeter security system is the first line of facility protection, which allows you to detect the trespasser and block its direct penetration to the facility.

This solution is for You if it is necessary:

  • To automate the work of operators, to increase the response speed to incidents and to reduce the number of false alarms.

  • To provide expansion of hardware and software parts of the system without violation of the ready-mounted complex.

  • To meet the requirements of the legal system in the field of transport and fuel and energy security.

The advantages of the solution
  • Setting up various signal processing algorithms in order to improve the certainty of alarm signals.
  • Adjustment of detection capacity and the list of controlled areas to the threat level of the facility (security level control).
  • Automation of the remote control procedure of detection tools’ correct functioning.
  • Verification process control of alarming events and incident response.
  • Information storage with sufficient quality for objective investigation of incidents and accuracy estimation of alarming events verification by operators.
  • The composition of the solution

    The characteristics of the solution
    • Technological tools’ selection depending on:
      • Perimeter length.
      • Constructional design and technical condition of the existing fence, the presence of a buffer zone, the closeness of interference units, the features of the fence’s route, the presence of vulnerabilities.
      • Characteristics of the facility’s location, climate conditions, terrain, type of soil.
      • Specific threats.
      • Operating experience.
      • Protection equipment’s opportunities.
    • Situational awareness increase
      • Multivendor ACS integration of physical security (ACS, security alarm, perimeter protection, videosurveillance and video analytics, audio and video analysis, etc.).
      • Integration of radar stations.
      • Integration of computer and network equipment monitoring system to detect faults of equipment.
    • Planning and work control of security forces
      • Creation of available resources (workforce and means) database.
      • Stationary points’ arrangement on the map and plans, definition of borders and routes of mobile posts, work schedules appointment for posts.
      • Integration of digital radio communication system.
      • The use of a multi-functional secure mobile device designed for voice communication, receiving assignments, alarm signals, sharing photographs and video images from the scene of the incident, monitoring the movements of security staff.
    • Assistance to operators in verification of alarming events
      • Output an incident’s comprehensive information in order to assess correctly the situation.
      • Combination of events related to one situation treating them as a single incident.
      • Ability to switch quickly between incidents with easy visualization of completed and non-completed tasks.
      • Integrated analysis of the event in order to increase recognition of the operator to rare (unusual) events.
      • Automatic and automated assignment of hazard level (controlled, dangerous, critical) to incidents with priority handling of the most dangerous incidents.
      • Registration of verification results and reasons for reaction choice.
    • Incident response coordination and control of operators and guard forces
      • Display an interactive step-by-step instruction to the operator on how to respond to each type of incident.
      • Monitoring the security staff’s movement.
      • Automatic and automated use of communicators.
      • The management of physical protection forces automation, assigning tasks to them and immediate transfer of the information needed to look for and arrest trespassers without delay.
      • Operators’ work control, identifying deviations from incidents’ reaction rules, saving evidence of violations committed by operators.
      • Detection of violations in the guard force’s work.
    • Investigation of incident:
      • Incident’s complete information saving: recorded by all integrated systems, including phone and radio recordings, and the guard force’s movement.
      • Speed copy of incident’s complete information (without having to export it from different systems) to an external storage medium for giving it to the police or for expert analysis.