Boom Barrier

Security Efficient Control for Entry and Exit

Boom Barrier

A boom barrier, also known as a boom gate, is a bar, or pole pivoted to allow the boom to block vehicular or pedestrian access through a controlled point.Typically the tip of a boom gate rises in a vertical arc to a near vertical position. Boom gates are often counterweighted, so the pole is easily tipped. Boom gates are often paired either end to end, or offset appropriately to block traffic in both directions. Some boom gates also have a second arm which hangs 300 to 400 mm below the upper arm when lowered, to increase approach visibility, and which hangs on links so it lies flat with the main boom as the barrier is raised. Some barriers also feature a pivot roughly half way, where as the barrier is raised, the outermost half remains horizontal, with the barrier resembling an upside-down when raised.

There are various technologies for an automatic boom barrier. One of them is electro-mechanical, which is widely used due to its reliability. The other technologies are often manufacturer specific. These electro-mechanical devices come with 24VDC drive units which can run continuously without generating heat, so electro-mechanical boom barriers can be operated continuously and in an intensive duty cycle.

An automatic boom barrier can be operated through:

  • Push button
  • Remote control
  • RFID tags / RFID reader
  • Loop detectors
  • Opto-electronic sensors
  • Any third party access control device
Security Alarm & Security Company

Services under Security And Surveillance

CCTV

CCTV

Closed-circuit television (CCTV), also known as...

arrow
Access Control

Access Control

Access control is a fundamental component of data security that dictates who’s allowed to...

arrow
Public Address System

Public Address System

A public address system (PA system) is an electronic system...

arrow
Boom Barrier

Boom Barrier

A boom barrier, also known as a boom gate, is a bar, or pole pivoted...

arrow
Perimeter Protection

Perimeter Protection

Perimeter protection is the first line in the defense to detect an intruder...

arrow
Command And Control

Command And Control

Command and control (C2) is a "set of organizational and technical...

arrow
Intrusion Security Audit

Intrusion / Security Audit

In most publicly reported cases, the attackers had already been inside the compromised systems...

arrow
Intrusion LV Audit

Intrusion / LV Audit

Considering some employees in the department abuse their privilege...

arrow

Trusted by