• Tag-Archive for » physical security «

    White Paper-The 4 Most Critical Considerations for Physical Security Systems: #3

    Consideration #3: Overt and Covert Systems When installing a security system, there are interesting psychological ramifications that KTC takes into consideration to create the ultimate system for our clients. We want visitors, wanted and unwanted, to know that our sites are fully secured. We use visible cameras, guns and other systems that make all parties aware of the security measures taken. This fact, to the trained eye, is a sign of a well-formed covert security system as well as overt. Ideally, the overt and covert systems should work together to reinforce one another. We use covert designed sensors that workContinue Reading

    White Paper-The 4 Most Critical Considerations for Physical Security Systems: #2

    Consideration #2: Scalability, Flexibility, Installation and Disruption of Flow When considering security for any asset many people look only into the foreseeable future. One of the most valuable features that KTC offers is an ability to scale any project for size, cost and other variables. In many cases the project is so large it must be done in phases. In these situations we know the scalability of the project and we add the element of flexibility with the installation. With our plans we are able to close sections of a factory or port to install security measures while other locationsContinue Reading

    White Paper-The 4 Most Critical Considerations for Physical Security Systems: #1

    Consideration #1: Requirements Definition and Cost The first step in any security and protection assignment is to determine to what extent a subject will be protected. This will take into account several factors. Threat What is the direct threat to the asset? Is the threat coming from a physical attack or a technology system attack? From an unknown source? Vulnerabilities Where is the asset vulnerable? The size and type of the asset will determine what types of vulnerabilities could open it for an attack. Larger assets like a tanker will have very different vulnerabilities than a piece of software. Value of Asset We must establishContinue Reading

    White Paper-Jamming at the Gate, Part Three

    We have now looked at offensive planning (Part One) and at defensive planning (Part Two), and we have discussed vehicle inspection, blast resistant modules (often Ballistically uparmored) or use as control rooms, and at data acquisition in large complex systems. How can it all be tied together not just in an Integrated Security Plan document but also how the architect of the entire system might leverage one aspect and/or another to create a cost effective and quickly integrated system for a client/command. We also discussed securing SCADA nodes and everything discussed in that posting applies as well. Basic architecture considerations include: HardenedContinue Reading

    White Paper-VTI: Data Acquisition and Functional Test

    When KTC has to secure a large perimeter or build and deliver systems which incorporate large complex units or units with subsystems which – if handled improperly or allowed to operate off spec – can injure or kill people (such as very high power x-ray systems), we must instrument the perimeter, the complex unit or the subsystems so that we can monitor, continuously, all aspects of the perimeter or unit. To do that we must employ proven data acquisition (DAQ) systems. Systems which track movement, temperatures and pressures, state-of-health of the instrumentation itself and so on. KTC searched variousContinue Reading

    White Paper-Perceptics: The Case Against Automated Anomaly Detection in Vehicle Inspections Process

    KTC again reaches out to Perceptics to continue this series of point papers on subjects we are frequently asked about. We asked our partner Perceptics (www.perceptics.com) to address the case against automated anomaly detection in vehicle inspections process. So, Phil, Jennie, Don – over to you… Thousands of facilities worldwide have vehicle identification and inspection processes as part of perimeter security protocols. Gate officers at these facilities may inspect hundreds of vehicles on a daily basis before granting vehicles and occupants access to the facility. But how do security managers maintain the highest standard of watchfulness, while avoiding monotony andContinue Reading

    White Paper-Perceptics: Why State Identification is Vital in License Plate Readers

    KTC is pleased to continue this series of point papers on subjects we are frequently asked about. For this we asked our partner Perceptics (www.perceptics.com) to address the issue of identifying the state of issue for license plates. Perceptics manages the highest accuracy rate of any vendor, even for vehicles traveling at road speeds (guaranteed at >95%) and still manages to identify the plate number and the state – quickly! So, Phil, Jennie, Don – over to you… Why State Identification is Vital in License Plate Readers for Access Control Vehicle identifications and inspections constitute key components of many perimeter and accessContinue Reading

    White Paper- A Box 4 U SAFETYsuite: Productivity Inside Blast Resistant Outside

    We are pleased to introduce Mr. Ross Draney, who heads up A Box 4 U’s Safety and Security Division , as he and the company’s founder discuss the SAFETYsuite and its underlying technology. KTC has chosen A Box 4 U based on our history providing safe spaces throughout our industry. We offer both a standard leasing fleet and custom SAFETYsuites which include: • Control Rooms • SCADA Node Structures • Change Rooms • Continue Reading