The global market for licensed mobile radio (LMR) infrastructure and system integration grew 14 percent, reaching $4.6 billion in 2017. Significant growth was noted in Asia, as revenues increased by 26 percent. However, Europe also experienced 8 percent growth in infrastructure and system integration revenue.

Cost-optimised digital technology

Cost-optimised digital technology accounted for the largest infrastructure and system integration market in 2017, accounting for 50 percent of all infrastructure revenues globally.

The Association of Public-Safety Communications Officials Project 25 (APCO P25) continued to be a significant revenue generator of LMR infrastructure, particularly in North America, which accounted for more than three-quarters of the world’s P25-derived infrastructure revenue.

TETRA and LMR infrastructure Terrestrial Trunked Radio (TETRA) infrastructure revenues increased in every major region in 2017

Terrestrial Trunked Radio (TETRA) infrastructure revenues increased in every major region in 2017, and IHS Markit projects revenues will exceed $1 billion by 2022.

Investments in LMR infrastructure are growing globally, as users continue to rely on LMR infrastructure to support their mission-critical and business-critical communications networks across the globe.

Cost-optimised digital technologies are increasingly popular in public safety and security sectors in developing parts of the world where no national TETRA or P25 network exists, such as in China, Hong Kong and other parts of Asia, as well as Africa and Eastern Europe. Cost-optimised digital technology is also successful in business-critical sectors in developed regions, like North America, Japan and the United Kingdom. IHS Markit projects that cost-optimised digital technology will be the fastest growing infrastructure and systems integration market over the next five years, competing with TETRA not only in commercial and business critical sectors, but also public-safety and security sectors in developing regions.

APCO P25 critical communications network

APCO P25 is a significant market for LMR infrastructure and systems integration. P25 provides high-end critical-communications networks to governments and commercial sectors around the world -- from Australia, to parts of the Middle East and Africa, to Latin America and Asia – but the largest single market is North America, which adopted P25 as the communications of choice for its emergency services. Despite the coexistence of FirstNet, the broadband data network for emergency services, the narrowband P25 continues to see renewed investment across North America, with large-scale network upgrades in 2018. Examples include the Motorola Solutions multi-million-dollar contract to modernise the P25 network in Portsmouth, Virginia and provide P25 technology to its emergency services, and the Harris deal to upgrade the United States Customs and Border Protection (CBP) network. North America is forecast to remain the largest global market for P25 infrastructure and systems integration.

TETRA and TETRAPOL communication networks TETRA is one of the fastest growing infrastructure and systems integration markets in the world

TETRA is one of the fastest growing infrastructure and systems integration markets in the world. TETRA-derived infrastructure revenues increased in every major region in 2017, with particular growth noted across Europe, the Middle East, Africa and the Americas, however the real success story was China, which has increased investment into TETRA sharply over the last couple of years, providing secure communications to transportation hubs in metropolitan areas.

Europe has a diverse mix of LMR technologies. It is home to the world’s largest share of TETRA and TETRAPOL networks serving nationwide mission-critical public-safety networks over many years. Investment into narrowband technology continues to increase despite the emergence of LTE networks. Germany, the United Kingdom and Nordic countries have invested heavily in TETRA and will continue to do so. In fact, this year the United Kingdom announced that it will extend its Airwave network until at least 2022.

ASTRID, PIT and C2000 networks

There are also ongoing upgrades to the ASTRID network in Belgium, the C2000 network in the Netherlands and the PIT network in Italy. Investment continues in many parts of Western Europe, with new entrants in Eastern Europe and developing parts of Europe. TETRAPOL, despite the maturity of this technology, also continues to provide upgrades to existing users, including a midlife upgrade to Switzerland’s Polycom network and the Hamburg transport hub. Furthermore, investment into cost-optimised digital technology also increases, as countries with nationwide public-safety networks adopt cost-optimised digital networks for their business-critical sectors, and nations like Croatia, without a nationwide TETRA or TETRAPOL network, consider cost optimised digital technology for their mission critical requirements. 

Police Digital Trunking (PDT) Asia has a large network of cost-optimised digital technologies, in both the public-safety and security sectors, and business-critical sectors, alike

Asia has a large network of cost-optimised digital technologies, in both the public-safety and security sectors, and business-critical sectors, alike. The Chinese government officially backed the nationwide migration of police forces across China to police digital trunking (PDT), which bolsters investment into cost-optimised digital technologies in this region. Other Asian countries have invested in cost-optimised digital technology, such as India, Mongolia, Kazakhstan, Bangladesh and Indonesia.

China was the real success story in 2017, with significant growth noted in cost-optimised digital technologies and TETRA infrastructure and system integration and the largest LMR infrastructure and system integration market in the world.  Investment into LMR infrastructure increased by over 40 percent in 2017, as TETRA infrastructure projects continued to materialise in the transportation sector and cost-optimised digital technology investment continued with digital mobile radio (DMR) and police digital trunking (PDT) across vertical sectors.

LTE technology

Despite the emergence of LTE technology, investment in LMR infrastructure continues to grow, as governments and commercial sectors utilise secure, low-latency, high-resilience narrowband networks to fulfil their critical communications requirements. In the short term, LTE will complement critical voice with data, rather than replace LMR altogether, as investment into LTE is required to increase coverage and resilience. Only in the next five to ten years could LTE substitute for TETRA, TETRAPOL or other high-end LMR technologies, as capital investments are considered in nationwide or large-scale deployments.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

Embracing digital transformation in the security industry
Embracing digital transformation in the security industry

Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.

What are the security challenges of protecting utilities?
What are the security challenges of protecting utilities?

Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?

Q&A: how the ‘secret service of Hollywood’ protects celebrities
Q&A: how the ‘secret service of Hollywood’ protects celebrities

At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimising physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specialising in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognise the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in.  Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customised solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximise their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.