Longread | Security Management
2020
How to Deter, Detect, Delay and Deny intruders
At Heras we advise companies and organizations in how to protect and secure their most valuable assets. Our proven approach takes a thorough look at each and every aspect of the situation. We ensure that we listen and understand our clients needs, to ensure that all potential risks are taken into consideration and that appropriate steps are taken to mitigate these risks. In this article, we explain how we implement and achieve the most appropriate solution.
Heras actively operate in six European countries. Each country has slightly different laws and regulations in relation to perimeter security. In the Netherlands there are many guidelines but in the UK and Germany there are many requirements and regulations that products and installations must abide by. Over the last 25 years we have worked within these guidelines and regulations and we have gained a substantial amount of experience and knowledge. From this we have perfected our way of working and developed our own proven approach, based on best practices,
and created the Heras Security Model. We now apply this in all countries and sectors we operate in, From business sites to airports and high-security locations. This document outlines and explains how we do this.
Which threat do you want to mitigate?
Protecting your most valuable assets is about keeping out unauthorized people.
Every company faces numerous different types of threats. Some organizations are a potential target for organized crime, other companies may face petty thieves,
activists, espionage or just curious walkers or animals. Appropriate security is
required in all situations, but all require different measures dependent on the threat &
risk level. Sometimes a warning sign or a white line on the road is sufficient, in most cases it needs much more than this.
That is why we a proven procedure to take into consideration the different threats, to understand which scenarios apply at the individual sites. What valuable assets do you have on your property? Which threat do you want to prevent? What is the purpose of the proposed security measure ? Is it to prevent crime ? or just to keep out casual passers-by. Is it to prevent visitors from entering dangerous areas?.
These and many other questions must be answered to allow an effective system to be designed and implemented.
By understanding your specific situation, we can then discuss which scenarios are most relevant. By taking a critical look at your situation, we will propose an action plan for the most suitable security solution within your budget, time and requirements.
Demarcate, deter, detect, delay
This action plan is based on a number of proven methods. Firstly, we start from the
3Ds - deter, detect and delay (as used by the UK government security body, CPNI).
This model prescribes that the security of a site must meet five conditions.
1. Clarify your perimeter boundary, indicating what is yours.
2. Deterrence what level is needed.
3. Detection of an intrusion/attack attempt.
4. Delay of potential intruders.
5. Controlling access control of people and vehicles.