<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=159683641205248&amp;ev=PageView&amp;noscript=1">

Perimeter Protection Considerations

Matt Golueke September 13, 2017 12:02 PM

Perimeter Protection Considerations thumbnail 2.png

Making the decision to move detection from your front door to your property perimeter isn't always cut and dry.

We're bringing key topics to you in the series Security Solutions: At The Perimeter

Topic 1: Perimeter Protection Considerations

There are many things to consider when evaluating your current or new perimeter detection strategy.

  • Early warning detection and assessment
  • Continuous line of detection
  • Delaying intruder access
  • Response force reaction time
  • Threat analysis
  • Risk assessment
  • Single layer protection
  • Dual layer protection
  • Multi-layer protection

Tim Claus, Southwest Microwave's Eastern Regional Manager, presented these topics at the Perimeter Defense Strategies best practices seminar series:

  

Security Solutions: At The Perimeter SERIES TOPICS

 

LEARN MORE

Visit our Perimeter Detection web portal and download Site Survey: Perimeter Detection

Perimeter detection portal-1.pngPerimeter_detection_brochure_cover_image.jpg

 

SYSTEM UPGRADE

Many end users have a Southwest Microwave INTREPID MicroPoint or MicroNet system in place. Since their end of life in 2010, Southwest Microwave estimates that replacement parts will be available for just another year.

The guide below will help you plan for the transition to a new MicroPoint II or MicroNet II system. The good news is that quite a few compnents, including your good-condition cable, from your old system can be used with the new system, thus reducing overall cost of a system upgrade.

Migration Strategy Guide - Southwest Microwave cover spiralbinderclosed_550x681 (1).png

comment quote bubbles.png

 

 

Contact our team for Expert Security Advice

 

 

Topics: Technical - Simplified, Your Challenge, Our Solution

View More Blog Topics

Trends, interviews, and practical advice on all things Security - Return to Main Blog Page

Search Our Blog

Subscribe for Blog Updates