ICT Today

ICT Today July_August_September 19

Issue link: https://www.e-digitaleditions.com/i/1132978

Contents of this Issue

Navigation

Page 26 of 63

July/August/September 2019 I 27 fundamental principles and applications commonly deployed in today's perimeter intrusion detection applications: • Photoelectric beams • Microwave detection (bi-static/mono-static) • Fence vibration sensors • Linear detection system (strain sensitive cable) • Fiber optic fence detection (vibration detection using optical time-domain reflectometry) • Video motion detection (analytics) • Ground-based radar • Electric field detection • Capacitance detection sensors • Taut wire • Buried fiber optic acoustic and seismic detection • Ported coax buried seismic detection • Balance buried pressure sensors • Buried geophone • Acoustic detection (air turbulence) While not all of these technologies utilize sensors that are IP-based, most perimeter detection systems span large distances. Therefore, much of the data connectivity is accomplished by employing outside plant (OSP) optical fiber cabling, which is why the ICT professional needs to understand the fundamental principles sensitive data centers in desert or sparsely populated areas, ICT professionals must incorporate security-in- depth to ensure cybersecurity measures are accompanied by the appropriate physical security for their enterprise customers. BIOGRAPHY: Anthony is a security and technology specialist with Burns' Aviation Group. He has devoted his entire 40+ year career to project planning and design for security and technology applications for airports, transportation, and other building occupancies. His expertise covers a broad range of applications in physical security, life safety, and ICT. Anthony is a BICSI Registered Communications Distribution Designer (RCDD) and a board-certified Physical Security Professional (PSP) by ASIS International. He can be reached at afrassetta@burns-group.com. of security-in-depth. As with any technology system, understanding the design and appli- cation of various technologies informs the ICT designer of how to deploy the appropriate connectivity. Most of these systems require some manner of ICT connectivity, and in some cases, the actual technology is directly based on ICT, such as fiber-based fence detection and buried fiber optic acoustic or seismic detection systems. These ICT applications are vitally important for the deter and detect phases of the 5D methodology, which in turn helps to ensure that the most efficient delay and defend strategies are met. Additionally, as companies increasingly construct security- You know us for our hand bendable Snake Tray ® and preconfi gured Mega Snake ® but did you know we now off er the full line of cable trays including aluminum ladder and steel runway! Call 800-308-6788 or visit www.snaketray.com fƿ CABLE MANAGEMENT! Y k f h d b d bl S fƿ ƿ CABLE M CABLE M Hand Bendable Preconfi gured Aluminum Steel Made in the USA | Snake Tray ® products are patent protected. ICT BICSI may-jun 2019.indd 1 3/20/2019 11:53:20 AM

Articles in this issue

Links on this page

Archives of this issue

view archives of ICT Today - ICT Today July_August_September 19