International references [please note all of these products may not be available in your country]

Nylofor 3D Super - Zedelgem - Belgium

Securifor - Zelzate - Belgium

Securifor - Bierbeek - Belgium

Securifor 2D - Turin - Italy

Securifor 2D - Merksplas - Belgium

Securifor 2D - Marche-En-Famenne - Belgium

Securifor - Leiden - Netherlands

Securifor 2D - Luxembourg (city) - Luxembourg

Securifor - Prêles - Switzerland

Securifor - Freestate - South Africa

Securifor - Freestate - South Africa

Securifor - Freestate - South Africa

Securifor 358 Single Skin - Freestate - South Africa

Securifor - Gauteng - South Africa

Securifor - Gauteng - South Africa

Securifor 358 Single Skin - South Africa

Securifor 358 Double Skin - South Africa

Wolseley - South Africa

Securifor 358 Double Skin - South Africa

Securifor 358 Dublo - Cape Town - South Africa

Securifor 2D - ORLEANS - France

Securifor 2D - MARSEILLE - France

Securifor 2D - LYON - France

Nylofor 3D - Katowice-Zarzecze - Poland

Securifor 358 Double Skin - Dendermonde - Belgium

Securifor - Mol - Belgium

Securifor - Torremolinos (Málaga) - Spain

Securifor - Trondheim - Norway

Securifor - Merksplas - Belgium

Securifor swing gate - Sleidinge - Belgium

Securifor - Den Haag - Netherlands

Securifor swing gate - Oostrum - Netherlands

Securifor - Hong Kong - China

Securifor - Gauteng - South Africa

Securifor 2D - Toulouse - France

Securifor - Amiens - France

Nylofor 2D Super/XL - Amiens - France

Securifor - Den Haag - Netherlands

Securifor - Cadier en Keer - Netherlands

Securifor - Stavanger - Norway

Fortinet Medium - Kuala Belait - Brunei

Securifor - Österåker - Sweden

Securifor - Steenokkerzeel - Belgium

Securifor - Freestate - South Africa

Securifor - Wortel - Belgium

Securifor - Helsingborg - Sweden

Securifor - Zelzate - Belgium

Nylofor 2D Super/XL - Porto - Portugal

Perimeter security, containment, and stability are critical functions which require the integration of security systems into one manageable platform that provides real-time control.

Today, security buyers can choose from a wide range of perimeter security technologies that allow them to maintain full control and visibility of inmates. Be it to delay an intrusion, to detect and intervene, or to efficiently control access, correctional facilities need technologies they can rely on.
Security technology today is becoming increasingly effective in deterring, delaying and detecting possible security incidents. 

The most direct way to ensure perimeter security is the installation of fences. The wide variation of fence types can be explained according to the several different security zones in which a correctional facility can be broken down. Each of these zones has its own special purpose and security level.

Delay: Fences in the ‘delay’ category hinder entry and for that reason are considered as ‘security fencing’. The delay perimeter’s objective is to slow down an active intrusion enough to force the intruder to give up or allow the security team to respond. The caused delay must be longer than the time needed for intervention.
Detect & intervene: Fences with integrated detection systems must trace any form of unwanted breach of the fence. Additional electronic components such as an acoustic alarm, security lighting and camera surveillance also have a deterrent effect. Upon detection, prison personnel can be alerted in time to intervene in the incident.
Access control: Access onto the site can be controlled by using turnstiles, barriers and gates.   

The strength of the security layer will depend on the level of dissuasion, the delay that the physical barrier can cause, the accuracy of the detection system and the speed of the intervention.A risk assessment or security audit for each facility should be the first step in rolling out a perimeter security project. A risk assessment identifies the possible threats as well as the possible consequences of any security breach. 

A thorough risk assessment allows for the right selection of the technology mix. But even then, the selected installations and technologies need to be re-evaluated periodically based on their performance. If the technologies do not provide the required security levels, then additional measures might be needed.