There Is No Such Thing As Too Much Security
Airports remain the nation’s top terrorist targets. There is almost no such thing as too much security. But there is such a thing as more intelligent security. More security doesn’t necessarily reduce response times or increase incident closure rates. Traditionally it has meant simply more cameras. Traditionally doesn’t work anymore.
Today’s airport security personnel need more than cameras. They need force multiplying technologies that reduce response time, filter through hours of video intelligently and alert on suspicious activity. Managing the exceptions rather than responding to every piece of information as it arises will change the security dynamic immediately.
Measuring success in terms of reduced response times, cases closed, manpower effectiveness – and true incident avoided make a strategic roadmap essential. A coordinated and systemic deployment of technologies can tighten the perimeters quickly. Identity management can help spot the employee with a new agenda before he/she evolve into a genuine threat.
It’s easy to identify patterns after an catastrophe. But now it’s time to use technology to spot the patterns in advance and prevent disasters before they occur. Because an ounce of prevention remains infinitely more valuable than a pound of cure.
The following technologies can aid Airports:
- VIDEO & NETWORK
The basics of a security architecture always include a video surveillance system. But today’s systems need IT class reliability and scalability. It also needs to act as the nerve center of the security architecture. Compatible is no longer applicable. Interoperable is the key to success. Highly interconnected video looks to access control, identity management and various inspection systems to harden the perimeter. Video now comes in many flavors and retention policies are creating exceptional loads on systems. Enterprise class systems now match the demands. But underestimating the first step of deployment and ignoring the roadmap process can leave you with dead iron quickly.
Long term retention of video data is now critical for insurance and liability claims. Twelve month windows to file claims and suits drive insurance costs up year after year. Unified knows the value of the video and we can now keep a year’s worth of video in just a 4U chassis. Long term pattern recognition can spot operational deficiencies as well as long term repeat offenders. Utilizing a second stream from the existing cameras can create a life saving backup to mission critical video.
We have a camera for every threat and every environment. Fixed and PTZ camera lines are an excellent extension of the physical security product set. Network video recorders especially designed for public and commercial transportation applications. IP surveillance technology provides facility monitoring to the consumer.
A Physical Security Information System is a critical tool in several regards for ports. Preserving legacy investments is made possible by integrating older devices via the PSIM. PSIM takes technology integration to the next level by creating Situational Awareness. Reducing incident response times, documenting responses and workflow definition are force multiplying effects not found in other technologies.
- SENSORS & ANALYTICS
Thermal imaging cuts through darkness, rain and fog eliminating environmental conditions from a Security Managers list of problems.
Long Range Imaging
Long range imaging has progressed at exceptional rates. Coincidentally, so have water based threats. Sony’s one-of-kind- XI’s (ex-eyes) turnkey long range imaging system is the simple answer in this environment. High definition video is created in a panoramic, 270 degree view that also embeds video analytics technology. Filtering out the effects of water while automatically assessing and zooming to threats provides early warning information that can render short range radar useless.
Few budgets are allowing for additional headcount. Video analytics now gets the right video clip in from of the right person. Reduced response times and easily stored video events change the headcount requirements to protect your facility. New technology “learns” standard behavior in the view and identifies behavioral anomalies. No more rule writing. Just productive event reviews. Rapid search capabilities allow large video storage farms to be searched like a database, presenting probable matches in thumbnail format.
Fiber monitoring lines your fence with easy-to-install fiber that can pinpoint intrusion attempts as they happen. Exact X-Y coordinates of a tampering or penetration are identified and reported to security personnel via a variety of methods. This information can then be used to view the incident via video surveillance, dispatch first responders and communicate directly with the perpetrators where such technology is in place.
GPS tracking for business, law enforcement, covert, and personal use. Tracking people, vehicles or assets via cellular or satellite networks. Reduce risk, improve safety and security, optimize fleet operations with real-time, all-satellite GPS tracking and fleet monitoring.
- IDENTITY & ACCESS
You can manage badges and visitors through traditional paperwork. But today’s rapidly changing conditions within the Enterprise call for real time Identity Management. Email access, network access and other resources can be controlled by various IT directories. But if they are not linked to background checks, certification expiration dates and biometric identification technologies do you really have security. Or do you have a false sense of security?
Access Control is at the heart of any security perimeter strategy today. But access control has long had significant shortcomings that can finally be eliminated. Lost cards, shared cards, tailgating and fraud are all problems that an Iris Scanner can eliminate. It’s access control that truly provides one-to-one security.
The first line of defense against a breach internally. The Cisco platform is a key element in the incident response architecture that manages incidents and enhances safety by leveraging the powerful Cisco network. We also offer solutions for managing identities and provisioning access in physical security infrastructure.
Under Vehicle Inspection Systems
Vehicle based threats are no longer limited to military and government facilities. Vehicles by the hundreds enter and exit without inspection today and many points. Rapid inspection of these vehicles is now possible with embedded and portable under vehicle inspection systems. Proactive approaches are at the heart of all IP physical security technologies, and UVIS represents the front line of prevention.
To learn more about airport solutions, Request a Call