top of page
  • SDS

Passive security



As explained in the previous article, the partitioning of the area requires the implementation of control and detection devices. All of these systems are called "passive security" as opposed to "active security".


Clarification and terminology before continuing. A lot of "security sellers" pretend to use artificial intelligence, AI. This is true and fake, but do they know why? You’ll know it


1 AI is the overall implemented systems able to simulate human intelligence. We write SIMULATE and not replace. And so, they are capable of giving an illusion of a kind of intelligence without any free will. We currently distinguish 3 various AI.


2 The "Machine Program", AI totally linked to the programmer such as the "Global Positioning System" (GPS), video games, character recognition (OCR), augmented or not virtual reality and even video motion detection (VMD). Finally, it is the current computer for domestic use, business and of course for security on a large scale.


3 The "Machine Learning", AI also linked to the programmer with additional algorithms. It allows the synthesis and data comparison, as well as their event-driven restitution. This is the machine that beat Kasparov. This AI is used in medicine, education, research, but also very high-tech security such as video analytics intelligence. SDS is one of the few specialists in Asia.


4 The "Autonomous Machine", the blood-curding AI ... Completely unlinked from the programmer, it systematically learns, manages and develops its own neural networks, gains in logic, self-learns and stores knowledge. Worse, it tests itself by making its own improvised errors. This is the famous GO machine (refer to the strategic game). Always in experimentation, this machine is both promising and terrifying ...

When some will sale AI, you will be I-nitiated :-)

Like AI, there are 3 categories of passive security. Of course, the aim advisor will be to organize them in synergy in order to gain in efficiency, to down the costs and increase the skills of the active safety (officers) without disturbing the functioning on-site.


Physical protections: are equipment or hard constructions used to seal an area or perimeter, and slow down any intrusions. These elements can guarantee several uses depending on their resistance to shock, deflagration, thrust, impact, shear or other. Resistance to water, sound dispersion, thermal or electromagnetic propagation will also be among the qualities required, if applicable, depending on in situ needs.

This equipment can be walls, doors, windows, locks or even elevators among others. Each of these components is inert or interlocked.


Control and management equipment ensure regular access, fluidity of flows, and compartmentalization of areas. These can be access controls, but also "AI" software to override permissions. An accessible room could be refused to all or almost all if a critical attendance threshold is reached. In this case, intelligent video analysis systems EVITECH type will be only one to use. These systems are supposed to control movement permissions and access rights.


The detection and alert equipment ensure permanent vigilance of the spaces in order to detect anomalies between the rules and the reality. Some, such as motion detection or volumetric alarms, offer few possibilities in terms of detection (yes / no). Other equipment, on the other hand (high-tech), can easily combine several behaviors and take the appropriate measures independently in response to a threat.


SDS is already in the future. Today, expertise and audits of risks and threats make it possible to synergise the three categories, such as on very sensitive sites as follow:

The passages are analyzed in perimetry, in case of alert, drones automatically set off on a reconnaissance patrol on the GPS point activated. A control room receives live images and directs interventions. And that's just the beginning …


At a time when the threat is growing (terrorism, crime, espionage, etc.), technology will never replace humans, but will stay at its service in order to limit false alerts and guide interveners in order to optimize their efficiency and protect them in the action.

Every day, the limits of security are unlocked in order to offer companies, but also governments, the greatest serenity in their evolution against adversaries. This document gives a kind of the main basic without talking about more specific equipment such as armored vehicles, safes or advanced signaling ...

Security in a company must be as transparent as possible so as not to constrain while inspiring a climate of trust. It’s an alchemy that few security managers know how to implement ...


The threat can also come from within knowingly or not. This is often the result of a lack of awareness and a laxity in the application of the rules. This is the subject of our next article on the notion of protection of secrets and confidential documents.


So, remember it, stay suspicious of counterfeits …

0 views0 comments

Recent Posts

See All
bottom of page