Focus: Security

Perimeter security technologies can help to detect, deter problems

NFPA 730 includes guidance on the ‘Concentric Circles of Protection’


The NFPA 730, a guide for premises security, includes guidance on the Concentric Circles of Protection: deter, detect, delay and respond. From this, we can build a comprehensive and layered protection program, according to an article on the Campus Safety website.

The first layer involves the perimeter, so it’s critical that a vulnerability assessment begins there.

An assessment of the perimeter should include parking lots and any outlying buildings 

One example of a perimeter security technology, an Automated License Plate Reader (ALPR) features optical character reading that converts a vehicle’s license plate to a data stream that will automatically be checked against various databases to immediately report an unwanted visitor. These unwanted visitors can come from blacklist databases that are available or by entering the information about a specific individual who has been banned from campus. 

Read the article.



March 26, 2019


Topic Area: Security


Recent Posts

Dirty Floors: How Pathogens Can Accumulate and Spread Underfoot

Studies show that healthcare floors are covered in bacteria and can quickly spread throughout patient rooms. 


WellSpan Health Opens Its Newberry Hospital in Pennsylvania


Cahaba Center for Mental Health Ensnared in Data Breach

On March 28, 2025, Cahaba identified suspicious activity in an employee email account.


Reframing the Construction Manager as a Community Manager

Managers must work with patients, community residents and other interested parties to ensure a smooth, successful construction projects


Health First Celebrates 'Topping Off' Ceremony for New Cape Canaveral Hospital Campus

Construction is slated to finish by the end of 2026 or early 2027.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.