Why ASIS 2017 Will be Known as the Show for Securing Our Borders

Professional security expertise has been more and more in demand around the world, as security has become a growing concern for individuals, businesses, and government. Increases in security can be seen across all sectors: from TSA screenings at the airport, to more security cameras keeping watch over every type of facility, to the rapid growth in consumer home alarm systems and more. At ASIS 2017, the issue of perimeter security will be a major talking point; with former President George W. Bush as a keynote speaker and panels featuring the challenge of securing soft targets like the Boston Marathon bombing, developments in this growing market will be well explored by ASIS attendees.


Perimeter security is a fast-growing sector of the security industry, and for good reason: security at the perimeter of otherwise highly secure facilities has been surprisingly porous. In the past, maintaining proactive security at the perimeters of larger facilities was difficult — guards, often with trained security dogs, would have to be tasked with perimeter monitoring; covering a large area, far from the central security office and with little backup. Even highly secure locations such as airports, nuclear facilities and datacenters, were dependent on chain link fences to keep trespassers at bay. Furthermore, with today’s technology, breaching a more advanced physical perimeter is still frighteningly simple—drones can fly right over any kind of fence or wall. With perimeter security like this, organizations were left open to massive security issues.

Fortunately, perimeter security has come a long way, as a variety of exhibitors will demonstrate across ASIS. Surveillance systems that incorporate analytics can create virtual perimeters and alert security personnel should they be breached (with sophisticated algorithms that can filter out false alarms). With the security system monitoring both sides of a perimeter, some systems can even detect potential breaches before they occur. These analytics can be deployed in the camera itself, or through video management systems (VMS) that are already in use by security operators – limiting the need for additional training for staff. Deploying any of these solutions increases the chances of identifying a breach before or as it occurs, and allows personnel to react immediately and efficiently.

Perimeter security is increasingly on industry minds, and recent security incidents suggest that this element of security will continue to be a high priority in the field. ASIS attendees should keep their eyes open for effective perimeter security solutions that integrate newly available technology, and take the time to understand how they can incorporate these solutions in security deployments in their own industries.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.