Special Feature: Intelligent security systems Editor: Lennart Alexandrie Technologies, such as Lidar enable very precise detection areas, both vertically and horizontally. Critical infrastructure demands combined security technologies With growing concerns over security threats to critical infrastructure, the need for multi-layered protection has increased, according to Mark Cosgrave, Divisional Manager for Western Europe at Optex. “A combination of different technologies that can help protect the perimeter, approach, boundary of buildings and internal areas, will help better to detect and deter any intrusion or malicious attack,” he says. Mark Cosgrave is a warm advocate for the benefits of using a combination of technologies and solutions to effectively secure critical infrastructure. “It is important to understand the limitation and the strengths of each technology and how they can complement each other in combination to provide a more efficient and effective security system.” Early detection is crucial “The importance of detecting an intrusion attempt as early as possible can’t be underestimated and this is the primary benefit of using detectors: they enable a proactive security system with intelligence to detect threats accurately and activate a suitable security response,” he says and gives an example. “If the operator can identify unusual activity at the fence line or even beyond the perimeter line, it Among other things, intrusion detectors improve the quality of the security system and avoid the risk of nuisance alarms in outdoor environments. can provide reliable information and a safe transmission of the data directly into the system. Combining technologies making sense The level of data provided by intrusion detectors helps the security team take an appropriate and faster response, it can activate cameras to recognize and track intruders, it can lock security gates, trigger security lighting, voice alerts or dispatch security guards. Multiple levels of protection The initial step in securing the perimeter of any critical infrastructure starts with an in-depth risk assessment to assess any vulnerabilities and identify the most suitable security technologies to mitigate them. “By combining different technologies that complement each other and implementing multiple levels of protection at the perimeter line, the overall security system benefits and becomes more effective, so facilities and assets are more secure today and it the future. This is one of the key benefits of working with Optex as we can provide multiple security technologies to achieve highlyreliable intrusion detection across the entire site.” he concludes. Lidar – detection with precision Mark Cosgrave also emphasizes the ability to identify the exact location of the intrusion, which can be critical to deal faster with a situation. Technologies, such as Lidar enable very precise detecis a powerful pre-warning to the setion areas, both vertically and curity system that can stop threats horizontally. Through the creation before they happen. Technologies of virtual walls and virtual ceilings such as Distributed Acoustic Senthese sensors can identify the sor (DAS) can be mounted on the exact X,Y coordinates of intrufence to detect any breach by sion, as well as categorizing intruders climbing over events depending on it or cutting through target size or direction it, but it can also be of movement. Sensors buried to alert , of such as Redscan can a vehicle approachoperate extremely ing or someone reliably in outdoor walking towards the environments, in fence line.” complete darkness and Cameras and surveillance equipment Mark Cosgrave, Divisional challenging weather conditions, from allow classification of Manager for Western Europe at Optex. -40 degrees to +60 targets and recording degrees. of events, bringing A further aspect to consider in an additional layer of security, when designing a high-risk sebut should always rely on the curity system is the need to use stable detection of sensors, which dedicated security devices, which are at the frontline of the security have been specifically designed to system, not affected by changes of focus on intrusion detection and weather, lighting or temperature. 16 • de tek to r internat io nal