Security Technology Executive

SEP-OCT 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/1030460

Contents of this Issue

Navigation

Page 48 of 59

www. SecurityInfoWatch.com • September/October 2018 • SECURIT Y TECHNOLOGY E XECUTIVE 49 Midsize radars have the ability to detect vehicles or boats up to 1000 meters away, and humans over 700 meters away. More advanced radar solutions designed for long-range detection include multiple input multiple output (MIMO) technology, allowing for an angular reso- lution of six to seven degrees. This is cru- cial for detection performance in rural or more cluttered environments – think of a densely wooded area with trees that move in the wind right next to the fence of a sub- station. This feature ensures that foliage will not trigger false alerts within the system. Low weight, low power con- sumption, and low required band- width are other distinguishing fea- tures of radar. Standard radar units weigh less than four pounds, and they can be easily mounted onto existing poles, buildings and other infrastructure. Thanks to wireless communications and solar power options, radars can be deployed both on and off site. Using radar as a deployable system, security forces can place radar at off- site locations, monitoring field, for- ests, or other points of access to the property that may be far removed from the substation itself. Radars that are placed offsite are still able to fully communicate with the rest of the onsite solution, allowing for earlier alerting capabilities and giving security forces ample time to react to situations before they escalate. How Radar Compares to Other Technologies Following the 2013 Metcalf attack, FERC established new security standards for utilities, the most important policy for asset protec- tion being the Critical Infrastruc- ture Protection Standard 014 (CIP-014), which specifically intro- duced new, and more advanced security requirements for substa- tions. CIP-014 specifies that each facility must identify "mission crit- ical" assets, administer a thorough security risk assessment, and deploy the appropriate security technologies to address any vulnerabilities. To comply with these new require- ments many utilities found themselves buying costly fiberoptic fencing systems. While effective for carrying a signal long distances, fiberoptic fencing may not be ideal for perimeter security. Physical Maximum Security Telephone Entry Access Control Traffic Control Gate Operators DKS Heavy Duty Gate Operators can move the heaviest gates at top speeds, delivering the tightest level of protection for the most secure locations. For residential and commercial Telephone Entry Systems, this year delivered an updated 1837, with built-in card readers, roomier interior for all the accessories, and one box that fits all mounting options. With the DKS Virtual Card app your mobile device can be used as a secure Access Card for DKS Card Readers. The next evolution of the 1601 comes in a fully sealed box for a sleeker look and improved weather resistance. When paired with the 1620 Barrier System, breaches can be a thing of the past. From the smallest homes to the biggest gates, DKS offers Swing and Slide Operators that run on AC, DC, or solar, keeping everyone up and running. You'll Build a Total Solution with DKS Whether your location is urban or remote, residential or commercial, maximum security or public access, DKS delivers a complete, full range of safe and secure Access Control, Telephone Entry, Gate Operator, and Traffic Control products to suit your needs. Even better, DKS engineers each product line for seamless integration, providing you with the level of perimeter security, access control and flexibility your property demands. For more information: doorking.com 800-673-3299 info@doorking.com Member: AFA, DASMA, NAA, IDA, NOMMA, NPA, SIA, SSA, CANASA Request information: www.SecurityInfoWatch.com/10213482 fencing calls for complex installations, digging trenches and running miles of cabling, which can still result in a system which outputs a high NAR. Other energy firms have deployed thermal cameras for perimeter surveil- lance. These cameras create images based on the heat emitted from all, objects so they are effective for video capture in

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - SEP-OCT 2018