What is all that money being spent on? Cybersecurity is comprised of technical precautions that include: Network Intrusion Detection Systems, logging and monitoring, Email filters,Network Intrusion Prevention, Network architecture considerationsMulti-Factor Authentication The effects of phishing However, cybersecurity isn't threatened by computer hackers alone. In fact, the greatest threat to corporate or government networks is now…
Employees trained in how to appropriately respond to and report potential threats can easily and cost-effectively supplement even the most sophisticated of security systems. They can observe and react to things that seem out of the ordinary, which analytic cameras miss. Employees with airport-wide access, such as maintenance workers, can see and identify potential threats…
Interactive and personalized media not only help remove stress from air travel. These innovations can also improve convenience, efficiency and safety. Unique travel experiences support tourism efforts by drawing attention to the cultural and natural features of the surrounding region, distinguishing airports at a time when competition among travel options reaches new heights. In the…
To ensure technology system benefits are realized early in the planning stages, a Master Systems Integrator (MSI) can, if scoped correctly, develop a holistic, strategic approach. Consequently, engaging an MSI early in planning and design phases has emerged as a solution to tackle the complexity of technology integration. Collaborative Systems Integration Multiple definitions of Master…
Logistical constraints, limited staffing levels, and high costs associated with rebadging are confounding security credentials offices. Widespread rebadging efforts come as many airports are already overwhelmed by the safety and security challenges associated with significantly reduced passenger travel volumes, reduced airport income causing reduced budgets and spending, and layoffs and furloughs amid the global pandemic.…
Authenticating Biometrics Biometric authentication is used in several different ways . The most common is multi-factor authentication, using biometrics in conjunction with an access token and PIN or password, for example, to gain access to a facility or computer system. Biometrics also are used to identify a specific user from a population of known persons,…
Expanding and Enhancing Capabilities VRC expands the capabilities of a traditional, brick-and-mortar ramp tower by providing intelligent views, coupled with data, in a setting not otherwise possible. Most recognizable is the VRC use of a video wall in lieu of a traditional window. VRC employs the concept of an intelligent “window” view, creating a virtual…
Make Technology a Priority from the Start Traditional airport planning and design begins with engaging a planner and architect to address increased passenger demand or infrastructure needs. But, while airport planning and design commonly includes cutting-edge architecture and striking aesthetics, their current and future technology needs often are not considered until much later. As a…