The first security measure Joe passes on his way into work is actually several hundred yards from the office, at the gatehouse The first security measure Joe passes on his way into work is actually several hundred yards from the office, at the gatehouse.At the property entrance, there are two lanes – one going in and one going out – with the gatehouse between them. Fixed cameras capture the make and license plate of each vehicle as well as the driver’s face. All this is mapped to a database. The guard inside the station can see if Joe is driving the car make and model listed in his employee record, and can check to make sure it’s the right license plate. It can be set up to also match his face to the face in the employee directory. This process can be applied to delivery trucks as well. The guard also has a list of expected visitors provided by the visitor management system – more on that when Joe gets to the lobby. Unexpected visitors and deliveries are generally turned away.And what’s to stop a determined intruder?As he passes the gatehouse, Joe drives over a patterned area in the road. This is where the auto-blocking technology is located. Joe has opted for a safety net, almost literally – a GRAB-sp, for Ground Retractable Automobile Barrier from Universal Safety Response. This netlike device is far enough past the gatehouse that if someone tried to force his way through, the guard could still pull it up in time to stop him. The GRAB system would more or less fulfill its name, stopping vehicles of up to 80,000 pounds in a considerably less destructive manner than retractable bollards do. (Although Joe greatly enjoyed watching numerous vendors’ truck-ramming-bollards videos during his evaluation phase.) These are not cheap systems; it might cost more than $100,000 to put a vehicle restraining system in one lane. But the gatehouse is the critical access point in the office’s perimeter defense.-Michael Fitzgerald Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe