Perimeter Selection Guide

SMART Alarm, Intrusion & Perimeter Detection 2024 Perimeter Security, Alarms & Intruder Detection

Select technology: All


| AcoustAlert | Boomgate | Gallagher Security | OPTEX



Type of device: Gate

Company: Boomgate Systems

Brand: Boomgate

Supplier: Elvey Security Technologies

Device name: Glide Master Bi-Folding Speedgate

Variations in range available: Customisation is a key feature of our Glide Master Bi-Folding Speedgate, allowing customers to choose from a variety of styles to match their specific needs and aesthetic preferences.

Integrations available: The Glide Master Bi-Folding Speedgate is designed to interface seamlessly with any access control system, requiring only a normally open (n/o) contact to close and open again to trigger the gate.

Description: Introducing Boomgate’s Glide Master Bi-Folding Speedgate, meticulously engineered to meet the demands of high-security environments while maintaining a compact form factor. This Glide Master Bi-Folding Speedgate excels in applications where rapid opening and closing cycles are essential, ensuring seamless and efficient access control. With its robust design, it fits perfectly in spaces where conventional gates often fall short, making it an ideal choice for commercial properties.

Contact: Andre Rossouw

Tel: +27 11 674 4441

boomgate@global.co.za



Type of device: Hydraulic Bollard

Company: Boomgate Systems

Brand: Boomgate

Device name: Warrior Hydraulic Bollards

Variations in range available: The hydraulic bollard can be lowered manually during a power failure. Furthermore, the hydraulic bollard can operate with a comprehensive range of cabinet-mounted key switches for emergency service or site specific operational requirements.

Integrations available: Banks, car parks, commercial/industrial premises, embassies, military installations, security establishments, toll roads, hotels, hospitals, high-risk cargo depots, border posts, cash handling depots and more.

Accessories: REDSCAN Mini-Pro

Description: Boomgate’s hydraulic bollards can be used to control vehicles in either one-way or two-way configurations and are specifically designed to interface with its range of access control security systems, remote manned operation, or open/close vehicle loop detectors. The traffic red light is illuminated while the hydraulic bollard is in its active position. The green light is only illuminated once the hydraulic bollard is fully retracted.

Contact: Andre Rossouw

Tel: +27 11 674 4441

boomgate@global.co.za



Type of device: Command Centre

Company: Gallagher Security

Brand: Gallagher Security

Integrations available: VMS integration, Rest API, visitor management, key cabinet integrations,third-party readers including biometric, locker management, car park management, tagboards, intercom integration, sensor integration, additional licences, and additional credential

Target customer: Healthcare, government, education, mining, data centres, estates, logistics, finance.

Description: Command Centre is the powerful software at the heart of Gallagher’s integrated security solutions, a centralised platform that gives you unparalleled control of every aspect of your site. Command Centre grows with you, from one door to thousands. With Command Centre’s intuitive interface, you have the power to monitor, manage, and personalise every aspect of your security system, from cardholders to alarms and beyond.

Contact: Tarryn Fortune

Tel: +27 73 372 4556

tarryn.fortune@gallagher.com



Type of device: Fence Controller

Company: Gallagher Security

Brand: Gallagher Security

Device name: F-Series Fence Controller

Integrations available: F41: Fence zones, inputs and outputs. F42: Fence zones, inputs, outputs, HV synch and dual pulse mode.

Target customer: Healthcare, government, education, mining, data centres, estates, logistics, finance.

Description: F4 Controllers, available in two variants, are the next generation in high-performance monitored pulse fence control. They deliver maximum intruder deterrent through regulated, non-lethal electrical pulses, superior detection capabilities, and meet existing global safety standards.

Contact: Tarryn Fortune

Tel: +27 73 372 4556

tarryn.fortune@gallagher.com



Type of device: Acoustic vibration detection system

Company: Modular Communications SA

Brand: AcoustAlert

Supplier: Modular Communications

Variations in range available: One field processor can cover a 600-metre span of fence line split into 2 x 300-metre zones. Any number of field processors can be networks to cover many kilometers of fence line and various combinations of detection on the fence.

Integrations available: AcoustAlert comes with its own configuration software and has a graphics component so the site perimeter can be shown on a computer screen and the detection zones indicated as normal or in alarm. I/O control is also possible.

Accessories: The MOXA IO network unit interfaces to the software so other input.

Target customer: The target for this product is light through to medium industry site protection and really gives security professionals another level of detection on the perimeter using a different technology solution.

Description: AcoustAlert is an acoustic detection system fixed to perimeter fencing structures. The detection cable can pick up vibrations on the fence and transfer these to a field processor for analysis. Depending on the acoustic amplitude developed in the cable caused by fence vibrations, an alarm can be triggered and relayed back to the control room for immediate response. The sensitivity of the detected signal can be adjusted.

Contact: Cliff Rose

Tel: +27 83 456 9542

cliff@modular.co.za



Type of device: LiDAR detector

Company: Regal Security Distributors

Brand: OPTEX

Device name: REDSCAN Pro

Variations in range available: REDSCAN Pro

Integrations available: REDSCAN Mini-Pro

Accessories: REDSCAN Mini.

Target customer: Video management software (VSM) and PSIM; ONVIF compliance; network security features: HTTPS, SNMP and IEEE802.1X.

Contact:

Tel: REDSCAN, Optex’s award-winning LiDAR security system, accurately detects the size and distance of moving objects. Using advanced sensors and intelligent analytics, it creates an invisible barrier to protect buildings and assets. Unlike traditional systems, REDSCAN’s LiDAR technology is unaffected by heat or lighting, ensuring reliable security across diverse environments. It’s ideal for various safety and security applications.

Christiaan de Jager

christiaan.de.jager@regalsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.