Physical perimeter security

From the outset, the notion of security perimeter allows us to get to the heart of the matter. Within this scope, the company must delay or prevent physical access to premises, systems and information by unauthorized actors. The constraint is noticeable and it is therefore not a question of forgetting to maintain the availability of access for legitimate actors!

The security perimeters will in particular allow you to define sensitive areas containing your vital systems. The protection of physical access must be sufficient to respond to the threat scenarios identified.

Securing an entrance also means controlling the physical access of people and equipment to the different zones (depending on the sensitivity of these zones). It is a matter of supervising human activity since no passage should be transparent.


Provide industry-leading system design resources, unprecedented technology options with flexible networking capabilities, and the best customer support tools to deliver reliable, long-term solutions to all issues perimeter protection to all our customers around the world.

TUNTEC offers its customers the most complete range available in terms of electronic systems for detecting perimeter intrusions (unauthorized access, risks of vandalism, theft or malicious attack on critical infrastructures and threats to people). We ensure that all critical elements inside and on the detection perimeter are protected by reliable technologies that give the best results in the industry.


Simple access control

To secure entrances and exits to the premises of your company, we offer several solutions:

  • the badge reader only lets in holders of the company badge

  • the biometric reader recognizes employees based on a physical characteristic (fingerprint, eye, etc.)
  • Code keypad requires entering a confidential number
  • the intercom allows you to hear or see the person asking to enter
    Electric or electronic locks (badges, fingerprints, codes, etc.)

Access control devices generally include three elements:

  • An authentication system (code, badge, key, biometric element, etc.)
  • An authorization system (a person can for example be correctly authenticated but not be authorized to enter the premises at a given time)
  • A traceability system allowing reporting of access rights.

The choice of your access control equipment will depend on the desired level of security, the type of premises to be equipped or your budget.


Short and long range microwave barriers and transceivers for intruder detection in outdoor areas, gates and entrances, as well as on walls and roofs.


Revolutionary smart sensors mounted on a fence maximize the probability of detection and prevent false alarms.


Intelligent sensors providing volumetric monitoring of the terrain, which makes it possible to locate intrusion attempts with a precision of 3 m for applications where invisible protection is essential.


Advanced security management systems that monitor, display and control the entire perimeter security program.