<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Perimeter-Security on Verkada Microsoite</title><link>https://info.verkada.com/category/perimeter-security/</link><description>Recent content in Perimeter-Security on Verkada Microsoite</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 21 Jun 2022 23:31:34 +0000</lastBuildDate><atom:link href="https://info.verkada.com/category/perimeter-security/index.xml" rel="self" type="application/rss+xml"/><item><title/><link>https://info.verkada.com/perimeter-security/physical-intrusion-detection-systems-pids/</link><pubDate>Tue, 21 Jun 2022 23:31:34 +0000</pubDate><guid>https://info.verkada.com/perimeter-security/physical-intrusion-detection-systems-pids/</guid><description>Physical Intrusion Detection Systems Controlling access to physical and digital spaces using authentication, credentials, and other measures is just one part of access control. Especially for larger organizations, with larger security footprints, the ability to spot potential threats and send alerts is critical in preventing, or at least mitigating, breaches.
What Are Physical Intrusion Detection Systems (PIDS)? To achieve this level of security, many organizations deploy an intrusion detection system (IDS) or intrusion prevention system of some form.</description></item><item><title/><link>https://info.verkada.com/perimeter-security/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/perimeter-security/</guid><description>What is Physical Perimeter Security? Physical perimeter security includes the systems and technologies that protect people, property, and assets within a facility by detecting and preventing unauthorized intrusions. There are 5 key principles behind 5D perimeter security design:
1. Deter The objective of perimeter security is to deter malicious actors from attempting the intrusion in the first place. With video surveillance technology integrated with perimeter alarms and access control, organizations have real-time visibility into unusual or suspicious activity, with can be verified remotely by professional monitoring or a virtual guard.</description></item></channel></rss>