• White Paper-The 4 Most Critical Considerations for Physical Security Systems: #2

    Consideration #2: Scalability, Flexibility, Installation and Disruption of Flow

    When considering security for any asset many people look only into the foreseeable future. One of the most valuable features that KTC offers is an ability to scale any project for size, cost and other variables. In many cases the project is so large it must be done in phases. In these situations we know the scalability of the project and we add the element of flexibility with the installation. With our plans we are able to close sections of a factory or port to install security measures while other locations on the same site remain open for business as usual. This ease of installation maintains safety and operational effectiveness even during major construction.

    When a safety system is installed it can leave a location open to attacks. We maintain the security of a site while it’s most vulnerable. To secure a site temporarily we can for example use portable cameras or wireless cameras to maintain visual supervision. Beyond the cameras we ensure:

    • Perimeter Security of all areas – large and small
    • Monitor and Inspect Vehicles entering and exiting the facility
    • Inspect and Verify all Operations Personnel and Contractors working in the facility


    After the facility is built and secured we implement:

    • Stringent security within the buildings to protect all assets and surrounding area
    • Hierarchically linked security zones established if additional buildings/areas are added
    • During any construction all security elements will be met in surrounding areas
    • Access routes may be altered or closed off to protect asset
    • Personnel will be limited in high-security areas

    Case Study

    When constructing a new port, the initial perimeter may require a two-to five-mile perimeter of physical security. Control system boxes and cameras in vans monitor the concrete trucks and other construction vehicles at ingress and egress points. The outer perimeter generally has the least security and is less dense in terms of various signals we have to monitor (radios, mobile phones, various wireless devices).

    As the site grows and nears completion the Security SCADA system grows along with the port and secures a larger and larger area.

    Surveillance camera

    Ideally, the physical security system can be extended or shrunken, so for example invisible microwave fences may be used with portable tripod stakes so that they can be easily moved around as needed. Also, since the construction phase is temporary, cheaper security elements with relatively short lifetimes may be used to save costs and then removed and replaced for the final permanent installation

    As the port is almost built out, the physical security system expands to protect the INNER perimeter of the port, including the customs houses, storage warehouses, and so on.

    When the port is fully secured, the security system needs to protect and examine goods moving into and out of the dock. The items entering the port pass through several rings of security until they reach their final load-out point. All items in a certain ring of security will be handled at the same level of security. At all locations in the port we now address vulnerabilities that come with a large open port: missile attacks, bombs, shooters, or other types of assaults.

    You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.

    Comments are closed.