Boundaries of Security Report
Encyclopedia
The Boundaries of Security Report is an annual perimeter security report accessible to a wide range of professional security consultants, integrators and professionals in both the public and private sectors.
The Boundaries of Security report regularly covers:
Prepared by designers and manufacturers Future Fibre Technologies
, the industry report analyses a range of perimeter intrusion detection technologies and explains their fundamental operating principles, typical applications, and the strengths and vulnerabilities of each.
Some of the technologies analysed are:
The Boundaries of Security report also contains whitepapers explaining the importance and operation of artificial intelligence
in processing raw alarm data to eliminate nuisance alarms in perimeter intrusion detection technologies, plus environmental considerations that must be undertaken to ensure optimal infrastructure security
.
The Boundaries of Security report regularly covers:
- Emerging industry trends and independent market research in the perimeter security market
- Comprehensive analysis of leading perimeter intrusion detection technologies in the industry
- Best Practice recommendations for infrastructure securityInfrastructure SecurityInfrastructure security is the security provided to protect infrastructure, especially critical infrastructure, such as airports, highways rail transport, hospitals, bridges, transport hubs, network communications, media, the electricity grid, dams, power plants, seaports, oil refineries, and...
and high value asset protection
Prepared by designers and manufacturers Future Fibre Technologies
Future Fibre Technologies
Future Fibre Technologies is a fiber optic sensing technologies company based in Melbourne, Australia, with its US head office in Mountain View, California, Middle East head office in Dubai and European head office in London...
, the industry report analyses a range of perimeter intrusion detection technologies and explains their fundamental operating principles, typical applications, and the strengths and vulnerabilities of each.
Some of the technologies analysed are:
- Fence mounted sensors (Fibre Optic, Taut Wire, MicrophonicMicrophonicsMicrophonics describes the phenomenon where certain components in electronic devices transform mechanical vibrations into an undesired electrical signal...
Cables, Vibration Rattler Sensors) - Buried sensors (Fibre Optic, Leaky Coaxial, GeophoneGeophoneThe term geophone derives from the Greek word "geo" meaning "earth" and "phone" meaning "sound".A geophone is a device which converts ground movement into voltage, which may be recorded at a recording station...
) - Open area sensors (Microwave, InfraredInfraredInfrared light is electromagnetic radiation with a wavelength longer than that of visible light, measured from the nominal edge of visible red light at 0.74 micrometres , and extending conventionally to 300 µm...
, Ground Based Radar) - Video sensors (Video AnalyticsVideo Content AnalysisVideo Content Analysis is the capability of automatically analyzing video to detect and determine temporal events not based on a single image...
)
The Boundaries of Security report also contains whitepapers explaining the importance and operation of artificial intelligence
Artificial intelligence
Artificial intelligence is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its...
in processing raw alarm data to eliminate nuisance alarms in perimeter intrusion detection technologies, plus environmental considerations that must be undertaken to ensure optimal infrastructure security
Infrastructure Security
Infrastructure security is the security provided to protect infrastructure, especially critical infrastructure, such as airports, highways rail transport, hospitals, bridges, transport hubs, network communications, media, the electricity grid, dams, power plants, seaports, oil refineries, and...
.
See also
- Infrastructure securityInfrastructure SecurityInfrastructure security is the security provided to protect infrastructure, especially critical infrastructure, such as airports, highways rail transport, hospitals, bridges, transport hubs, network communications, media, the electricity grid, dams, power plants, seaports, oil refineries, and...
- Homeland SecurityHomeland securityHomeland security is an umbrella term for security efforts to protect states against terrorist activity. Specifically, is a concerted national effort to prevent terrorist attacks within the U.S., reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do...
- Physical SecurityPhysical securityPhysical security describes measures that are designed to deny access to unauthorized personnel from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts...
- Airport securityAirport securityAirport security refers to the techniques and methods used in protecting airports and aircraft from crime.Large numbers of people pass through airports. This presents potential targets for terrorism and other forms of crime due to the number of people located in a particular location...
- Port securityPort securityPort security refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain...