border security


Vigilance reminder as London gears up for “massive security operation” ahead of funeral for The Queen

A security response on an “unprecedented scale” is underway as London prepares for the state funeral of The Queen. Read More

Security products round-up – August 2022

IFSEC Global takes readers through the latest product launches and software updates to hit the security market throughout August 2022. Read More

IFSEC to be featured in new BBC series which explores protective measures that secure UK’s borders and high profile venues

IFSEC is to be featured in new BBC Series exploring how the UK's borders, largest venues and most high-profile exhibitions are secured. Read More

What makes a security fence anti climb?

Does anti climb security fencing exist? And what features can make them more challenging for intruders to climb? IFSEC Global explores. Read More

Politicians voice privacy concerns about US border remote video surveillance plans

Proposals to erect remote video surveillance towers on the US-Canadian border have come under attack from state officials and politicians. Read More

We’re making life too easy for terrorists – former IATA chief

Governments around the world are “making life too easy” for terrorists, the former head of security for airline body IATA […] Read More

Indian Army to erect High-tech Fence on LoC on Kashmir Border

The Indian Army will erect a new fence Line of Control in Kashmir to withstand the challenge posed by heavy snowfall. Read More



Sign up to free email newsletters

Downloads

The 2022 State of Physical Access Control Report

Whitepaper: Reshaping the future of retail with security technology

Whitepaper: Boosting efficiency and streamlining security with an integrated access control solution

Three essential reasons to upgrade your access control technology

Whitepaper: Choosing the right facial recognition solution for access control

The Video Surveillance Report 2021

Whitepaper: Video Analytics Re-imagined – The Impact of Powerful Edge AI

Whitepaper: Effective Techniques for Robust OT Security