A checkpoint supporting transportation security
A complete solution that enables to integrate all security subsystems into a united complex, to collect and process their information, to identify links between events and automate incident response.

This solution is for You, if it is necessary:

  • To fulfill transport legislation’s requirements.
  • To receive objective and reliable information about the facility security level in real time.
  • To estimate efficiency of the technical equipment use and the work of the security forces.
  • To monitor compliance of facilities’ corporate security standards.
  • To collect the information to justify improving the legal environment and organizational structure.
  • To collect the information to justify investments in improving technical means of security.
The advantages of the solution
  • Information collection and processing from all security systems of the facility.
  • Timely and consistent response to threats.
  • Control of deviations from regulations, training, progress reporting.
  • Daily activities automation of security forces, incident response, management of physical security systems.
  • Security levels management.
  • Detection of violations in the security measures taken.
  • The characteristics of the solution
    • Improving the efficiency of identifying penetration attempts to the object:
      • Integration of street situational video and audio analysis, biometric video analysis and integrated automated search system connected to databases of wanted people.
      • Detection of moving objects on the site and on routes of approach to it using radar systems.
      • Detection of radio-emitting equipment’s position data (mobile phones, radio stations, UAVs).
      • Integration of satellite monitoring systems to detect unauthorized entry, theft, unattended vehicles, attacks on drivers, deviations in traffic.
      • Detection of access point crossings between transport security sectors without showing a pass next to another person.
      • Detection of unauthorized access to the platform from the luggage collection premises.
      • Detection of unauthorized entry into the luggage compartment by means of luggage transport tapes.
      • Integration of computer and network equipment monitoring system to detect faults of integrated security system components.
    • Efficiency improvement of information security systems by integrating them into a united integrated security system:
      • Complex information analysis from authentication systems, information systems and ACS means.
      • Detection of external attacks aimed at interference in the technological process and other important areas effecting the safety.
      • Detection of insiders attempting to come round the information security system.
    • Assistance in verification of alarming events and control of decisions made by operators:
      • The output of complete information about the incident in order to correctly assess the situation.
      • Events combination related to a single situation treated as a single incident.
      • The ability to switch quickly between incidents, with easy visualization of completed and non-completed tasks.
      • Automation of attracting physical security forces, assigning them jobs and immediate transfer of information required for search and detention of the trespassers without delay.
      • Automatic and automated hazard level assignment to incidents with priority processing of the most dangerous incidents.
      • Radio wire integration and alerts automation.
      • Operators’ work control, identifying deviations from incidents’ reaction rules.
    • The complete analysis of incoming signals:
      • Alarm signals’ hazard evaluation based on statistics analysis.
      • Detection of unusual user activity when using ACS
      • Detection of attempts to pass through the checkpoint using someone else's pass
      • Detection of broken or blocked alarm annunciators.
      • Complete analysis of non-alarm signals in order to predict a dangerous situation or the development of an incident according to a dangerous scenario.
    • Planning the alignment of security forces, management and control of security staff:
      • Creation of available resources (workforce and means) database.
      • Stationary points’ arrangement on the map and plans, identification of the boundaries and routes of moving posts, work schedules appointment for posts, arrangement of additional posts for the regime of increased security.
      • Resources binding to posts for full-time and heavy security regime, the adequacy assessment of existing forces and resources.
      • Providing information on the current use of resources, displaying the location and status of forces and resources, assigning tasks to them.
      • Integration of radio digital system.
      • Using a multi-function safe mobile device.
      • Detection of violations in the guard force’s work: excommunication from posts, non-compliance of patrol schedules and routes, untimely performance of tasks, deviations from instructions.
    • Security levels’ management for instant switching of technical means and human resources in the regime of increasing security:
      • Regime of increasing security activation and deactivation.
      • Creating a database and an order for engagement of additional forces and resources in the regime of increasing security.
      • Patrol routes and schedules’ changing and monitoring compliance.
      • Expansion of areas controlled by video detectors, radars and other detection equipment.
      • Automatic build up of control of access and on-site mode with increased security.
      • Activation control of additional workstations of transport security equipment, redistribution of information output to the workstation.