Airport access control
The 22nd edition of inter airport Europe, the International Exhibition for Airport Equipment, Technology, Design & Services, was officially opened at the Munich Trade Fair Centre in Germany. Until Friday, 11th October 2019, a total of 659 exhibitors from 40 countries will present a unique variety of the latest airport equipment on a total net exhibition space of 33,550 square metres. This represents a 5.5% increase in floor space compared with the previous event in 2017. The most important...
Global threat detection and security technologies company, Smiths Detection is showcasing for the first time an integrated checkpoint solution at inter airport Europe 2019, which harnesses biometric technology to enable risk-based screening practices. With air passenger growth predicted to double by 2037, the aviation industry will be challenged to support this capacity growth whilst providing operational efficiencies and meeting shifting passenger expectations of the airport experience. To cop...
At the end of September 2019, eleven professional application developer companies, primarily from Nordic countries, got together in Stockholm to demonstrate their creations for Airbus’s Tactilon Dabat device. This was the 5th edition of the Critical App Challenge, which has already taken place in Germany, Belgium, Hungary, and the Middle East and North Africa region in order to give local innovative companies from these regions the chance to demonstrate their solutions for public safety a...
Percepto, a global market expert for autonomous industrial drone solutions, will change the perception that drones are the enemy of the airport, at the ACI EUROPE Security Summit, which is being hosted in Tel Aviv, Israel, from 17th – 19th September 2019. In a presentation entitled ‘Drones in Airports Friends or Foes?’ Percepto will address how the latest innovations in drone technology can improve airport safety, security and operations. VP of Marketing at Percepto, Illy Grub...
Security and Safety Things GmbH (SAST) will demonstrate their open IoT platform for video surveillance cameras at the Global Security Exchange (GSX) in Chicago, September 10 to 12, 2019 at McCormick Place. The world's first open and standardised operating system with a global IoT marketplace will feature applications from more than 15 partner software developers running on security cameras from more than five camera manufacturers in an innovative, airport-themed booth at GSX. "GSX is the ideal...
Recognising the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, and Bosch, leading companies in access, secure connectivity and mobile/CE device solutions – announced the launch of the FiRa Consortium. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases...
Ping Identity, globally renowned provider of identity defined security solutions, has announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. Cloud identity, access management PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment. Enterprises can provide authentication for all users with a highly-configurable global authentication authority that includes versatile single sign-on (SSO) and highly-scalable directory services, while also maintaining data and resource isolation. This allows global organisations the ability to automate IAM operations, simplify management and achieve their cloud-first objectives. PingCloud Private Tenant Enterprises need a dependable way for customers, employees and partners to sign-on to their services and applications Enterprises need a dependable way for customers, employees and partners to conveniently sign-on to their services and applications. However, this requires companies to support multiple standards, different authentication flows, a wide range of identity and service providers while operating and maintaining the solution. For this reason, PingCloud Private Tenant allows enterprises to automate the operation of their IAM solution, so IT staff can focus on innovation, in addition to providing a global authentication authority. PingCloud Private Tenant provides the following capabilities and benefits: Coud IAM: Practically limitless configuration options combined with a dedicated cloud environment means enterprises control their data and security while also automating IAM operations. Highly-configurable authentication and directory services: Regardless of where applications or resources reside, enterprises can leverage PingCloud Private Tenant’s extensibility for their diverse user populations and identity types. Simplified identity management and minimised costs: Moving IAM solutions from on-premises to the cloud can save companies significant IT operational costs. PingCloud Private Tenant provides the convenience of centralised configuration via self-service and concierge support options, allowing enterprises to save without compromising support for challenging and complex enterprise use cases. Architected for enterprise hybrid IT: PingCloud Private Tenant reaches every corner of an enterprise’s hybrid IT or multi-cloud environment without the need to install, update and manage separate on-premises proxies and agents. Automated operations to reduce complexity: IT teams are able to respond more quickly and easily to global demand for IAM services by reducing geographical deployment complexity and simplifying IAM operations. Multi-tenant cloud solutions PingCloud Private Tenant expands on the range of deployment options that Ping provides to enterprise customers PingCloud Private Tenant allows them to create different environments for development, test and production as needed, with regional configuration options to comply with geographic or regulatory constraints. PingCloud Private Tenant expands upon the broad range of deployment options that Ping provides to its enterprise customers, spanning multi-tenant cloud solutions, private cloud solutions and on premises software. These solutions cover the range of enterprise deployment preferences and use cases, and can operate independently or work together seamlessly as needed to support complex hybrid IT environments. Hybrid IT environments “Enterprises increasingly straddle hybrid IT and multi-cloud environments, as they prioritise a high standard of security and customer experience,” says Loren Russon, vice president of product management, Ping Identity. “PingCloud Private Tenant is designed to simplify identity management while providing the ability to retain full control of data and security.”
Star Alliance, globally renowned airline alliance, and NEC Corporation, international supplier of IT, network and biometric technologies, has signed a partnership agreement to develop a biometric data-based identification platform that will significantly improve the travel experience for frequent flyer program customers of Star Alliance member airlines. Biometric data-based identification The interoperable platform advances the Star Alliance and NEC strategic vision of delivering a seamless customer journey, while strengthening loyalty value proposition within the travel ecosystem. Star Alliance customers who opt-in to biometrics will have a seamless and handsfree passenger experience Once implemented, Star Alliance customers who opt-in to biometrics will have a seamless and handsfree passenger experience, allowing them to pass through curb-to-gate touchpoints within airports, such as check-in kiosks, bag-drop, lounges, and boarding gates, which traditionally require both a passport and boarding pass, by using a secure identity management solution featuring facial recognition technology. Identity management Moreover, the platform will help airports and the Star Alliance member airlines to increase operational efficiency. The service will be available to customers who are enrolled in one of the Star Alliance frequent flyer programs and who have authorised the use of their biometric data. With a few easy steps on their mobile device, customers will have the option to enroll in the new platform using high-tech security technology. They only need to enroll once and can then use their biometrics data multiple times at biometrics touchpoints of any participating airport whenever they travel with a Star Alliance member airline. Data security Personal data, such as photo and other identification details, are encrypted and safely stored within the platform. From the outset, the system has been designed in compliance with applicable data protection laws making use of the latest facial recognition technology. Personal data will only be processed with the consent of the passenger. Passengers may be required to show their passport during security and immigration procedures. Jeffrey Goh, CEO Star Alliance said, "In NEC, we have found a strong partner who shares our vision of a seamless travel experience for air travelers. At Star Alliance we are committed to making the customer journey better, and this strategic partnership with NEC will help us make the way from curb to gate to aircraft a much simpler, yet innovative experience for our customers." Facial recognition NEC is pleased to join forces with Star Alliance to bring an improved cross terminal customer experience" Takashi Niino, President and CEO of NEC Corporation, added, "NEC is pleased to join forces with Star Alliance to bring an improved cross terminal customer experience. Facial recognition is truly revolutionising the airline industry and making flying more enjoyable, just as it was always intended. In support of this partnership, similar to our implementations in United States, Singapore, Hong Kong and Japan, NEC will mobilise its global resources and provide local assistance to each of the member airlines to leverage this secure, interoperable platform and rapidly bring our common vision to reality." Star Alliance and NEC aim to introduce the first biometric solution at a Star Alliance airport hub by the first quarter of 2020.
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can use them to unlock security door handles, too. Code Handle is a stylish handle with an integrated electronic PINpad. When you fit a Code Handle to your door, you make sure only authorised people get in. Without a 4-digit code, the handle stays locked and the door stays closed. Fire accredited Code Handle For such a simple device, Code Handle packs several clever features into its sleek, low-profile design“Code Handle is unique in comparison to common code door locks: it has the code function and battery incorporated inside its handle, so you don’t need to make extra modifications to your door,” explains Lars Angelin, Business Development Manager for Code Handle at ASSA ABLOY EMEA. For such a simple device, Code Handle packs several clever features into its sleek, low-profile design. When you close the door behind you, Code Handle locks itself, so you don’t need to put down whatever you are carrying. From inside, a Code Handle opens freely. It is also fire accredited (EN 1363). Code Handle is simple to install and retrofit. Everything you need for a simple, effective security barrier is inside the box. Two screws fit a new Code Handle to almost any interior door, with left- or right-hand opening. There is no need to cable the door, connect it to mains, or pay a specialist installer. Works with standard lock hardware Code Handle is the lock of choice for sensitive, low-security doors in all kinds of placesCode Handle works in tandem with standard lock hardware. You can keep your existing cylinder or lock mechanism and just change the handle. Two standard batteries (CR2) slot inside the Code Handle, and typically last 30,000 lock/unlock cycles before replacement. Code Handle is an attractive proposition, with an elegant contemporary design, in brushed stainless steel and satin chrome. No more ugly push-button-and-twist mechanical PIN locks spoiling the look of your office. Code Handle is the lock of choice for sensitive, low-security doors in all kinds of places. At libraries, airports, railway stations, gyms, schools, car dealerships, restaurants and offices, a Code Handle PIN lock keeps the public out of accessible private rooms. In company archives, stock rooms, customer toilets, management offices and medicine stores, Code Handle deters casual intruders and keeps your property safe and secure.
inter airport Europe 2019, the International Exhibition for Airport Equipment, Technology, Design and Services will be held from 8 - 11 October 2019 at the Munich Trade Fair Centre in Germany. This year, the show once again presents the Excellence Awards in the four exhibition categories interTERMINAL, interRAMP, interDATA and interDESIGN. In addition, a Special Award will be presented in the category ‘interFUTURE’, in order to acknowledge the recent industry trend of the airport of the future. The submission of entries from exhibiting companies at this year’s event is now closed. A variety of innovative equipment, products and services has been submitted. The advancements cover the airport of the future, improved security systems, intelligent passenger and baggage handling systems and much more. Airport industry awards The ceremony will take place in the Seminar Theatre in Hall C6 of the Munich Trade Fair Centre The winners of the Awards are selected via an online vote which is now open. The entire airport industry is invited to participate in the vote on the official inter airport Europe website. Airport professionals have a maximum of five votes – for one winner in each category. Voting closes on 6th September 2019. The winning companies in each of the five categories will be presented with an award at the inter airport Europe Opening and Awards Ceremony on 8 October 2019, at 11am. The ceremony will take place in the Seminar Theatre in Hall C6 of the Munich Trade Fair Centre. All exhibitors, visitors and the press are cordially invited to join. The opening times of inter airport Europe 2019 are from 8th to 10th October, from 9:00 to 17:00, and on 11th October, from 9:00 to 15:00. The advance ticket sale starts from August via the Online Ticket Shop. Entrance tickets are available online at favourable prices. Alternatively, tickets can be purchased on-site during all four show days.
GET Group North America, an innovative developer of mobile ID technology with over 20 years of experience in identity management, announced that its GET Mobile ID Digital Identity Solution for iOS can support near-field communication (NFC) for identity transactions at Point of Sale (POS), airports, and even kiosks. GET Mobile ID for Android already supports NFC identity transactions. GET Group NA and global partner Scytáles AB, innovative developers of mobile ID technology, are the first to extend the new ISO 18013-5 standard so that iOS devices can also use NFC for data transmission, or allow NFC tap followed by either local or online data transfer, all under citizen control. Protecting citizen privacy We are proud to be participating in the development of the ISO 18013-5 standard, together with Scytáles AB"“Supporting NFC for both iOS and Android devices is critical to developing a variety of more secure and convenient retail, payment, and ID verification use cases for mobile driver’s licenses and other forms of mobile ID,” said David Kelts, Director of Product Development, Mobile Identity, GET Group North America. “We are proud to be participating in the development of the ISO 18013-5 standard, together with Scytáles AB, and committed to ensuring our technology will protect citizen privacy and meet specifications for secure interoperability on all mobile device operating systems.” David Kelts will be participating on the Secure Technology Alliance's Industry Panel Review of Retail Use Cases of mDLs on July 16th at the Atlanta Airport Marriott Hotel as part of the ‘Mobile Driver’s Licenses for Retail Use’ workshop. From 2:00-2:45, this industry panel will feature mDL solution providers discussing their approaches, functionalities, and the use cases important for MDLs to succeed in retail identity transactions. ISO 18013-5-compliant identity transactions ISO 18013-5, which is expected to be published later this year, is the international standard that specifies the technical and interoperability requirements for mobile driver’s licenses (mDL). GET Group NA and Scytáles AB are ready to enable ISO 18013-5-compliant identity transactions between both iOS and Android devices and POS terminals already used today for payments. This will broaden the possibilities for retail, payment and ID verification use cases of mDLs, such as: Age-based purchases where both age-verification and payment information can be transmitted in the same tap of a mobile device; “Tap & Go” identity transactions at stadiums, federal buildings, airports, etc.; Electronic identity and address verification for check cashing.
German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier ‘HEMISPHERE’. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to forensic evaluations – the use of facial recognition technologies is becoming increasingly important for customers of video technology solutions. The integration of AnyVision’s technology will enable Dallmeier customers to utilise facial recognition data within various modules of the Dallmeier HEMISPHERE software platform. Facial recognition solution This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data In this way, security and business processes can be optimised, e.g. through blacklist/whitelist procedures, marketing optimisation through VIP-customer recognition, forensic evaluations in law enforcement procedures or the automation of access controls in office or manufacturing environments. This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data within various solution suites. Specifically, AnyVision’s facial recognition solution will be integrated into the Dallmeier HEMISPHERE SeMSy® Video and Security Management Suite, as well as in other solution suites of the HEMISPHERE platform, such as the Situational Awareness / Incident Management or Data and Security Information Management. Video security technology “In today’s increasingly complex world, customers need solutions that can integrate powerful components from leading manufacturers within a single platform strategy. Partnerships like this with AnyVision ensure that our customers always have the optimal combination of leading technologies at their disposal,” said Dieter Dallmeier, Founder & CEO, Dallmeier. “Dallmeier’s solutions in sectors such as safe city, stadiums, airports, logistics, casinos but also in the processing industry cover more and more topics that go far beyond classic video security technology. This makes it all the more important to work together with the right partners for complementary technologies which, when combined, offer decisive added value.” The German manufacturer Dallmeier electronic has been manufacturing solutions for security applications and process optimisation for 35 years. The portfolio includes cameras, recording systems and software. Security and surveillance AnyVision currently develops technology for security and surveillance Dallmeier’s solutions are used worldwide by customers in areas such as safe city, stadiums, airports, logistics, casinos but also in the processing industry. The partnership is also part of AnyVision’s mission to make its innovative AI-powered technology available to more businesses and environments across the globe. Unlike other software solutions in the market, AnyVision’s software is plug-and-play for new and existing systems, and able to overcome challenges such as occlusions, different angles of view, and poor lighting conditions. AnyVision currently develops technology for security and surveillance, mobile authentication, access control, and real-world analytics. Boris Gokhman, Vice President of Strategic Partnerships at AnyVision, commented: "Facial, body, and object recognition have real-world benefits right now. Collaborating with best-of-breed technology partners to help more organisations ‒ working across diverse sectors ‒ harness new capabilities and achieve those benefits is hugely important to us. We are delighted to be working with Dallmeier on this and look forward to expanding this partnership in the future.”
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centres (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximise situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernised and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimise human error and optimise resource utilisation. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command centre through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA case study But does that mean that organisations need to hold off on implementing biometric solutions? Or do they need to ‘force’ it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organisation to reap the benefits. In 1953, New York Metro Transit Authority (MTA), one of the world’s largest mass transit systems, began using tokens as payment for subway rides – a solution to engineers’ problem of creating a machine that could accept different types of coins for the new 15-cent fare. This technological advancement that may seems almost archaic today, served the MTA well for 40 years before the introduction of the MetroCard - a lighter, more automated solution. Technology adaption works Yet, the MTA, despite positive results from its first implementation in 1993, had both the older tokens and the new MetroCards in place, simultaneously for a full decade until 2003. This allowed “early adopters”, who understood the advantages of the MetroCard, to switch over, while allowing those that preferred their ‘trusty’ tokens to continue using them. In 2003, when tokens were finally phased out for a MetroCard-only system, only a small percentage of commuters were still using tokens; most had realised the significant benefits to the card and had switched over of their own volition. The MTA example serves as a model for how technology adoption works. From tokens to MetroCards, fax to email, landlines to cellphones –there is a distinct process new technologies go through as they are introduced and ultimately adopted by the public. Biometric technologies are no different. Yet, organisations must find way to implement new biometric systems that simultaneously provide organisations with the significant advantages biometrics offer, while ensuring that users are given time to adapt to and adopt the new technology. Let’s look at a few practical strategies for biometric adoption: 1. Optional, with added value Many facilities, such as airports, stadiums and theme parks, already use biometric technology to create ‘express lanes’ to save time and improve efficiency. Frequent fliers, VIPs and season ticketholders can enjoy faster and more personalised service with biometric identification solutions. These users can still opt to be identified the old-fashioned way, with an ID card or ticket, but doing so means they will have to line up and wait their turn as the old methods are much less efficient than biometrics technologies. Airports, stadiums and theme parks already use biometric technology to create ‘express lanes’ to save time and improve efficiency Biometrics can also be used to improve the customer experiences, or create more tailored, personalised programs. For example, the ICER (Industry, Culture, Education and Recreation) Innovation Center in the Netherlands implemented biometric visual identification technology to create customised experiences for museum visitors that were fun and interactive. Visitors could choose not to take part in the biometrics-enhanced visit and experience the baseline version of the museum, but by utilising the biometric system, museum goers are offered a tailored experience where exhibits and information are presented based on what a visitor has already seen in the museum. 2. Start with biometrics in optional locations Not all services or locations in a corporate setting are mandatory for employees to visit. For example, employee centers or health and wellness facilities are social settings for individuals to relax and connect. Implementing biometrics-based identification solutions in these types of settings allow employees to interact with the new technology in a low-stress environment and only if they choose to. For example, companies can provide an option for employees to pay for meals at corporate cafeterias using biometric identification, saving break time for those who choose to adopt the technology and enabling them to skip longer payment lines. This has the added benefit of reducing fraud resulting from lost or stolen ID cards. 3. Educate users in advance To ensure smooth deployment and adoption of biometric technology – whether partial or full – it is important to ensure that new users are educated on the new technology in advance of its deployment. For example, employees may have privacy or data security concerns. It’s critical that organisations clarify that the data being collected is kept private and secure. This information can be imparted in several ways. Organisations should be as transparent as possible and provide employees with enough information to address concerns. A Town Hall meeting can be held to explain benefits of the technology and answer questions that new users might have. Providing educational materials to new users, such as letters or videos that explain the new technology can put employees at ease. Make sure to outline how data privacy will be ensured as well as the benefits that employees stand to gain. Have management lead by example and be the first to enroll in the biometrics system. This can help inspire confidence and trust in the system. Make implementation competitive and fun. This can help users who aren’t as excited about the technology take part and learn about it. Implementation of biometric technology can still allow individuals in an organisation a choice of whether or not to partake. Over time, most people tend to adopt new technology by choice if it saves time and makes life easier. When considering biometric systems, keep in mind that it doesn’t necessarily require full adoption now and can coexist with other systems until users feel comfortable with the system, and recognise the benefits it provides.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and information widely available on the Internet. In this case, technology offers a solution, too. A new kind of key cannot be duplicated by 3D printing. Ironically, it is manufactured using 3D printing techniques. UrbanAlps Stealth Key A Swiss company called UrbanAlps has introduced the Stealth Key, a key that is designed and manufactured from the inside out. The mechanical elements that enable the key to uniquely open a matching lock are hidden away inside the key beneath a pair of narrow ledges, where they are not susceptible to being scanned and duplicated using 3D printing. UrbanAlps offers a range of cylinder locks and keys based on the Stealth Key concept. A high-tech padlock incorporates additional security features such as a shrouded shackle to avoid cutting, anti-drill capabilities, and resistance to lock picking. Stealth Keys are made using 3D printing and a laser to fuse together successive layers of metallic powder added in a manufacturing process called "successive layer melting." Manufactured from the inside out, complex internal features are "printed" and then covered over later with a solid layer that shields the complex inner workings from being duplicated. Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities. It is less expensive than other technologies designed to shore up the security vulnerabilities of 3D printing, such as keys that combine both mechanical and electronic components. The company’s website touts “simple and affordable key copy protection.” Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities 3D printing challenge Locks and keys are among the oldest security technologies, dating back to Egyptians and the Romans. Their value has been proven over the centuries and they continue to provide security in many applications, even in today's high-tech environment. However, 3D printing presents a challenge. 3D duplication became a high-profile problem in 2015 when 3D printable computer-aided design (CAD) files for Transportation Security Administration (TSA) master keys were published on the Internet. Those are the keys used by airport security staff to open private suitcases for inspection. The files allow the keys to be duplicated and used to successfully open TSA-approved locks. The hacking of security systems is nothing new—most electronic security systems have been hacked, or have the potential to be hacked in the future. Increasingly, security involves an ongoing one-upmanship between the good guys and the bad guys – the programmers and the hackers, the white hats and the black hats – whether the technology is computer systems or even the locks and keys that have been around for centuries.
The reason for long lines at U.S. airports is that the airlines now charge fees for checked bags. It’s as good an explanation as any of why airport passenger screening lines suddenly and mysteriously grew out of control during May (and then became manageable again in June). It’s not the only explanation floating about – there’s plenty about high travel volumes, Transportation Security Administration (TSA) personnel shortages, etc. etc. – but it’s the one that appeals to the disgruntled traveller in all of us. In the absence of definitive answers, why shouldn’t two of the biggest gripes we all have with air travel – luggage fees and long security wait times – be a case of cause and effect? I acknowledge the oversimplification. However, in addition to its obvious appeal, the explanation also has a germ of truth, and skipping past the details, it’s the government’s fault! US government negligence towards TSA officers Specifically, the U.S. government has levied a 7.5 percent excise tax on airplane ticket prices. However, the tax doesn’t apply to baggage fees. In effect, there is an incentive for airlines to lower ticket prices (subject to the tax) and implement or raise baggage fees (which are not) to offset the reductions. The approach gives travellers a specific incentive (say, $25) to carry their bags onto the plane rather than check them before going through the screening area. More bags clog up the operation, thus delaying airport screening. Absent the federal tax, it makes sense to “bundle” the charges into a higher ticket price rather than charging separately. Hence the argument: It’s the government’s fault! Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis There are other possible explanations that are also the government’s fault, from not enough overtime pay for TSA-employed screening officers, to insufficient staffing of screening checkpoints. The leader of the union that represents TSA officers says Congress has “starved TSA of the resources it needs to meet growing demands at our nation’s airports.” Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis. Nobody likes to wait two hours (or more!) in an airport screening queue, which was the unfortunate situation that flooded news reports during much of May. Attempted solutions add to airport security check delays And some of the proposed solutions seemed to contribute to the problem. For example, a new automated technology – so-called Innovation Lanes – provides expedited screening processes and promises to move passengers through the system more quickly. However, it was the installation of the new equipment at a security checkpoint in Atlanta (during which the checkpoint was closed) that contributed to some of the more extreme wait times in May. Another proposed solution is the TSA PreCheck lanes, where prescreened passengers get to speed through wearing their belts and shoes. But fewer than the projected number of passengers opted to pay the $85 fee for the programme, and some observers have suggested that resources devoted to screening PreCheck passengers could do more overall good if reassigned to screening the masses. “I got here two and a half hours before my flight, and security took two to three hours to get through,” one traveller recently told a TV station in Chicago. In March, TSA Administrator Peter Neffenger said wait times had nearly doubled over the previous year. Not to mention reports of data showing that TSA agents fail 95 percent of security tests involving passing weapons through security. For now, the problem seems to have abated, and airport and TSA officials were congratulating each other all around after average wait times improved drastically over the Memorial Day holiday weekend. A new TSA 10-point plan (more officers, overtime, canine teams, etc.) is being implemented. But what about the upcoming busy summer travel season? We may not have seen the end of those long security wait times…
AlertEnterprise Inc., the physical-logical security convergence software company, announced that its Airport Guardian software has been selected by Los Angeles World Airports (LAWA) as the new Identity Management and Credentialing System (IMCS) at Los Angeles International Airport (LAX). Airport Guardian cyber-physical security software will be deployed to deliver a new level of converged security, identity and access intelligence, and enhanced customer experience across IT, physical and OT systems. “At LAWA, we work hard to provide a high level of safety, security, and service for our customers, communities, and stakeholders,” said Aura Moore, Deputy Executive Director - CIO of LAX. “We’ve selected AlertEnterprise software as our new Identity Management and Credentialing System for its integrated, configurable, and futureproof design. This new system will enable us to improve security, enhance customer experience, minimise risk, and proactively enforce compliance for many years to come.” Ensuring real-time compliance With Airport Guardian software, LAX will be able to streamline and automate their entire badge lifecycle processWith Airport Guardian software, LAX will be able to streamline and automate their entire badge lifecycle process, from application to badge printing, and access provisioning. By automating core processes with role-based workflow and active policy enforcement, the airport can ensure compliance in real-time, which helps to eliminate costly auditing efforts. The deployment of Airport Guardian software will include a secure, web-based portal that will enable LAX personnel to manage employees, vendors, and visitors across their enterprise landscape. Applicants and Authorised Signatories will be able to start, save, and submit applications, including requesting access to critical areas that require additional approval. Streamline application processes With built-in schedule management, Airport Guardian software will help the LAWA Badge Office streamline application processes and enhance customer experience, including reduced wait times, and application status visibility to applicants and authorised signatories. The aviation content pack features DACS, STA, CHRC, Rap Back, and LMS integrations as part of the Airport Guardian software Airport Guardian software includes an aviation specific content pack comprised of Tenant Management, Incident Management, Asset Governance, built-in airport compliance, industry reporting, badge auditing, and process automation best practices. The aviation content pack features DACS, STA, CHRC, Rap Back, and Learning Management Systems (LMS) integrations as part of the Airport Guardian software. Airport Security Awareness training The Airport Guardian software’s powerful LMS integration feature is designed to assist LAX administration teams in tracking and enforcing mandatory training for personnel including active shooter, Airside Vehicle Operating Permit, and Airport Security Awareness training. “LAX is one of world’s premier and busiest airports, and we are thrilled that they have selected AlertEnterprise as part of their security modernisation and digital transformation,” said Ruby Deol, AlertEnterprise Chief Operating Officer. “Our game-changing approach of converged cyber-physical security is helping to make airports and critical infrastructure around the world more secure while creating a positive workforce and customer experience.”
Christchurch International Airport is situated on the east coast of New Zealand and receives around six million passengers and 70,000 commercial flights per year. The airport is the main gateway for New Zealand’s South Island and is a busy hub for passenger and freight movement. In a legislation-driven airport environment, the airport is regulated by a number of Civil Aviation mandates and rules, which include the requirement to control and monitor all access to restricted landside and airside areas. In selecting Gallagher for the airport’s security solution, the airport company, Christchurch International Airport Limited (CIAL), found a vastly flexible system capable of withstanding extreme conditions when put to the test in a real-life emergency. Requirement of a flexible security system CIAL took the opportunity to review its security systems and look for solutions that afforded greater system flexibilityOriginally opened in 1959, the airport terminal has undergone a number of expansions and upgrades over time. With passenger numbers continuing to grow, a new $237 million terminal was designed and construction began in 2009. As a part of the new terminal design, CIAL took the opportunity to review its security systems and look for new and innovative solutions that afforded greater system flexibility. The airport’s previous security system was both analogue and digital and presented limitations on what a non-technical staff member could do within the system. “To make changes, for example, add a door to the access control system, we had to get specialists in,” said Ford Robertston, the airport’s Manager of Quality and Security. “Ultimately, our wish list included a system our own staff could configure, hardware that overcame the reliability issues we faced with cards not reading, as well as an open platform with a high degree of flexibility and reporting capabilities.” Monitored electric fencing The site’s perimeter security incorporates five vehicle auto-gates which allow authorised vehicles access to the airfieldOn the exterior, Gallagher’s perimeter security system provides monitored electric fencing for a small section of Christchurch Airport’s 16km fence line – which protects more than 300 hectares of land. The site’s perimeter security incorporates five vehicle auto-gates which allow authorised vehicles access to the airfield. When drivers badge their access card at an auto gate, a photo of the cardholder appears on the operator’s screen, along with competency information. If the driver’s Civil Aviation ID, airside driving permit or another competency is due to expire, the operator is notified on screen and can advise the driver. The main auto-gate is manned 24 hours a day, seven days a week. If someone requests access at an unmanned auto-gate, their photo and competencies are channelled to the operator at the main auto-gate, reducing after hours staff and running costs. Gallagher security management platform Christchurch Airport is a multi-tenant site where several core organisations operate. A number of these organisations – including the national carrier, Air New Zealand – operate independent Gallagher security management platforms. This customisation provided the ability to move seamlessly between domestic and international airport operationsCardholder information can be enrolled between these platforms, enabling employees from each organisation to access multiple areas of the airport using a single access card. The multi-tenant functionality creates a flexible system that reduces the costs associated with issuing and managing multiple cards. As a domestic and international airport, CIAL, Gallagher and security partner ECL Group, together developed a customisation that would enable CIAL staff to manage airbridge configuration via the security management platform. This customisation provided the ability to move seamlessly between domestic and international airport operations. Airbridges and access controlled doors Using 14 fully-automated and motorised airbridges and access controlled doors, airport staff use workstations to configure the system and easily transition the airport from domestic to international operations – ensuring passengers are directed to secure zones including customs and immigration when appropriate. All doors are operated with an access card and once an area of the airport has been ‘sealed’ for security (for example, an international departure lounge), access to these areas is automatically denied and they become accessible only via a security clearance entryway.
As a major transportation hub in Northeastern China, Changchun Longjia International Airport processes a huge amount of passengers every year. In response to massive economic growth in the region, the airport – with a total volume of almost 13 million passengers in 2018 – needed an additional terminal. Built over the course of three years, the state-of-the-art Terminal 2 building covers a total area of 55,600 square meters. Since its opening in October 2018, the expansive Terminal 2 building has been serving all domestic flights from 22 airlines including Air China, Shenzhen Airlines and Shandong Airlines while international flights are now concentrated in Terminal 1. Meeting airport security guidelines Bosch received the contract based on a proven track record of large-scale airport security installationsLooking to safeguard this vital new infrastructure, the airport security managers wanted to integrate video security, intrusion detection, public address and access control for staff within one platform while meeting current government security guidelines for airports. Since 2017, these laws include mandatory storage of all video data for a 90-day period, which puts a premium on adequate data storage in a space covered by over 1,000 cameras around the clock. Given the project’s massive scale, managers wanted to work with a one-stop provider to ensure seamless integration of all solutions and delivery according to stringent timelines with end-to-end security intact on opening day. After diligent market research, Bosch received the contract based on a proven track record of large-scale airport security installations and the ability to connect all components – video security, intrusion alarms, access control and public address systems – on the Building Integration System (BIS). Installation of IP dome cameras Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh wintersFor video security, Bosch experts installed nearly 1,500 cameras inside and outside Terminal 2, including moving cameras such as the AUTODOME IP 4000i and IP 5000i and FLEXIDOME IP 6000 VR series. All IP-based cameras are centrally managed on the Bosch Video Management System (BVMS) and support security personnel by detecting threats and triggering automated alerts via built-in Essential Video Analytics. Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh winters. And to maintain a small data footprint while meeting the legal obligation for 90-day data storage, the cameras use efficient H.265 compression technology, thereby reducing bandwidth to a low 2 Mbps and storage space by up to 50 percent compared to other cameras. As a direct result, security managers in Changchun have been able to achieve savings in the number of networked storage units as well as energy consumption and cooling cost for the server room. Unified management of access control “The reduced bandwidth leading to a fewer number of storage cabinets in the server room was a major reason why our client opted for the Bosch solution,” said Mustaine Hu, Technical Support Manager at Bosch Building Technologies. The Building Integration System supports unified management of access control for airport personnel at 350 doorsMeeting another key customer requirement, the Building Integration System (BIS) from Bosch supports unified management of access control for airport personnel at nearly 350 doors. A combination of card reader and video security eliminates the risk of non-employees accessing critical areas with a stolen card and creates a seamless passage for authorised staff without additional screening. Bringing security full circle, the installed public address system allows security personnel to broadcast real-time announcements via more than 1,200 ceiling loudspeakers. The system ensures controlled evacuation in emergency situations and also sounds alarms triggered by connected intrusion sensors to alert personnel. Security for travellers and personnel Fully operative since the grand opening of Terminal 2, the Bosch system now provides end-to-end security for travellers, personnel and property at Changchun Longjia International Airport. As a scalable and IP-based system, it is future-proof to accommodate further expansions and has delivered cost savings on video storage and power consumption since day one. In face of China’s rapid economic growth, about 200 of the country’s 497 airports will require similar expansions over the coming years, making Changchun an important reference for Bosch Building Technologies in the region.
Johnson Controls announce that the aviation specific CEM Systems AC2000 Airport access control solution has been selected to secure the new Bahrain International Airport. The powerful CEM Systems AC2000 Airport software and industry leading CEM Systems hardware is being installed at Bahrain International Airport to ensure the highest level of integrated security and assist in controlling passenger flow across the airport. The contract was awarded by Thales and will be delivered by regional partner Tyco Fire and Security Middle East. Bahrain International Airport is the international airport of Bahrain, located in Muharraq, an island about 7 km northeast of the capital Manama. The airport is currently undergoing a $1.1 billion expansion that will boost the airport's capacity to fourteen million passengers per year. Resilient solution for aviation security “This contract to secure Bahrain International Airport represents another significant win for CEM Systems AC2000 Airport solution in the growing aviation sector in the Middle East region,” said Philip Verner, regional sales director, Building Technologies & Solutions, Johnson Controls. “The powerful CEM Systems AC2000 Airport has a proven record as one of the most reliable and resilient access control and security management solutions available for aviation security. It not only provides Bahrain International Airport with advanced access control throughout terminal buildings and airside/landside boundaries, but it also provides a range of software applications to enhance the airport’s onsite operations and increase business efficiency.”
Vega Systems Inc. has announced that their Redundancy Management Framework (RMF) software has begun operations at a prominent airport in the Middle East. The airport surveillance software plugin for Milestone XProtect enhances video security. Typically, without the software system, video surveillance down-times at critical infrastructure locations have the potential to create security loopholes. Vega Systems' RMF reduces live video disruption to milliseconds during server failure episodes while simultaneously providing uninterrupted access to all archived footage. This, along with other beneficial features, mitigates the impact of server failures on security. Vega Systems' RMF RMF is a novel, few-to-all approach towards enhancing XProtect Recording Server Redundancy through dual recording. A few redundant servers can handle concurrent failures of all primary servers. Offering a live view recovery almost instantaneously following the recording server failure, the system works two orders of magnitude faster than fail-over recording. RMF is a result of collaboration between Vega Systems Inc in San Jose, California, Sunjin Infotech based in Seoul, South Korea, and Milestone Systems' Middle East offices. The product is a plug-in framework for the Canon subsidiary Milestone Systems' XProtect software.
Traka has been specified at a main UK international Airport to deliver bespoke solutions for the safe management of replica improvised explosive devices (IEDs), alongside intelligent key management systems. The UK airport, which cannot be named for security reasons, uses replica IEDs for training purposes across its security network, to ensure correct procedures are being followed in the unfortunate event of a real threat. Security management using replica IEDs The importance of secure management of replica IEDs is integral, with recent well-publicised events having shown the major disruption caused by any unaccounted items, including an abandonment of the last game of the season for Manchester United in 2016. Traka, which already provides the airport with essential intelligent key management units, created a bespoke management locker solution for the safe storage of replica IEDs on site, to ensure they could only be operated by authorised personnel. The units present audit control capability and reporting on an instant basis with any units that do not get returned being instantly accountable. To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole" Intelligent key management Says a Security Manager at the Airport, “To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole, with a real possibility of closure and consequential mass disruption.” “With increasing numbers of passengers and noted global security threats, we cannot afford to take the risk and knew Traka could be called upon as the experts to provide a solution. The lockers not only provide an extra security dimension, but also ensure the smooth running of the Airport security. They enhance our training objectives as the audit control capability allows replica IEDs to be used across terminal staff, safe in the knowledge they will always be accounted for and returned.” The lockers support the Airport’s use of Traka solutions for intelligent key management Asset and vehicle tracking The lockers support the Airport’s use of Traka solutions for intelligent key management for security and engineering keys, alongside asset and vehicle control. Ben Farrar, Traka Market Development Manager added, “It is the focus of every Airport to deliver the best possible experience for passengers, while ensuring their absolute safety and security at all times. And in doing so, ensure staff can present all processes in a smooth and stress-free environment.” “Traka’s provision of bespoke locker solutions for the safekeeping of replica IEDs, alongside our intelligent key management systems as used by this Airport may only seem like smaller details in a complex security matrix. But they work together for the benefit of security teams to ensure effective management and automation, decreasing the likelihood of causing delays and disrupting the airport flow unnecessarily.”