SlideShare a Scribd company logo
1 of 4
Download to read offline
Shane McClelland, Lori Wirth and Bret Park on
how secure transportation makes business sense



                                                       Networked
                                                       security has arrived
                                                       – a real departure from stovepiped systems
                                                       Transportation agencies around the world are using advanced
                                                       communications capabilities to improve operating efficiencies, enhance
                                                       safety and security, and contribute to a better experience for passengers.




                                                       BEFORE HIS RECENT RETIREMENT,            Mark Forare, the assistant     course shops and restaurants, and scalable enough to accom-
                                                       director of security for the Miami-Dade Aviation Department,            modate the sensors and biometric applications that the airport
                                                       reminisced with Ericsson about how it felt to take on security          and federal government are testing. What’s more, the entire opera-
                                                       responsibilities at Miami International Airport shortly after the       tion is monitored and managed from centrally located security-
                                                       terrorist attacks of September 11, 2001.                                officer workstations.
                                                           Forare was a Miami-Dade Police Department (MDPD) lieuten-               It is an entirely New Security System. And it’s “tightly pulled
                                                       ant, a critical incident response expert and liaison with the US        together and something we’re proud of,” Forare said, smiling, as he
                                                       Federal Aviation Administration. With that experience behind            left the system to his able successor and headed off to relax in the
                                                       him, it wasn’t what he didn’t know about his new Aviation Depart-       Florida sunshine.
                                                       ment job that kept him up at night. He knew all too well that he
                                                       was stepping into a security operation tasked with the safety of        Secure communications: keeping you moving
                                                       more than 30 million passengers traveling through the airport           Like Miami International, many transportation facilities around
                                                       every year.                                                             the world are undergoing major overhauls. Billions of dollars are
                                                           He also knew he would be responsible for completing the             invested annually to modernize current transportation hubs or
                                                       “New Security System,” a project with a name that was innocuous         build new transportation capacity for economic development and
                                                       and ambitious at the same time. Part of the airport’s USD 5.2 billion   to enhance business and commuter travel, as well as tourism.
                                                       capital improvement program, the New Security System was                    In addition to the capital improvement efforts, transportation
                                                       planned prior to 9/11, and underscored after the terrorist attacks      officials responsible for the smooth, daily operation of airports,
                                                       occurred. Among the objectives: increase passenger and personnel        public transit systems, roadways and seaports face growing eco-
                                                       safety, increase surveillance capacity, and reduce overall incident     nomic and environmental challenges. The costs of operating and
                                                       response time.                                                          maintaining modern, efficient transportation systems are rising.
                                                           Forare told Ericsson that given the circumstances – taking on       Increasing fuel costs, stricter environmental regulations and higher
                                                       a high-profile position at a major transportation operation with         demands on capital improvements coupled with downward pric-
                                                       the assignment of building a system that was “new” and “secure”         ing pressure – all place stress on the transportation industry.
                                                       – he couldn’t shake the thought that this New Security System was           If these challenges are not complex enough, government-
                                                       going to be one of those projects where he spent his time trying to     mandated security requirements add to the stress.
                                                       get his contractor, subcontractors and internal departments to play         To take on these challenges, transportation officials must con-
                                                       in the same sandbox. In other words, he dreaded the chaos he was        tinually find ways to enhance safety and security, improve operat-
                                                       sure would ensue.                                                       ing efficiencies and contribute to a better experience for passengers.
                                                           However his story has a better ending than you might suspect.       What they’re realizing is that voice, video and data communica-
                                                       Today, Miami International Airport has an access control and            tions, racing in real time through a converged fixed-mobile net-
                                                       alarm system that secures more than 1,000 points of entry, as well      work, can improve all of the above.
                                                       as a video surveillance system that is synchronized with two-way,           It takes a leap of faith to upgrade a communications network
                                                       simultaneously transmitted audio intercoms. All this data travels       for a transportation operation that probably runs non-stop or close
                                                       in real time over a converged communications network that is            to it. But improve it we must. Unfortunately, that’s one of the
                                                       flexible enough to support transactional information from con-           lessons learned since global terrorists chose the transportation




                                                       46 · Ericsson Business Review 3·2007
Ericsson Business Review 3·2007 · 47
...Networked security has arrived
       Shane McClelland, Lori Wirth and Bret Park on
how secure transportation makes business sense



                                                       industry as a target. Most governments stipulate that transport-                    The good news is that a converged communications network can
                                                       ation authorities must develop comprehensive security plans                         accommodate or enable these systems, as well as the voice, data
                                                       that include:                                                                       and administrative traffic that is typical of any business operation.
                                                       • facility protection systems                                                       Even better from a return-on-investment perspective, the right
                                                       • perimeter security systems                                                        converged communications network may even accommodate
                                                       • redundant critical operations and control systems                                 legacy systems that operate just fine today. At Miami International,
                                                       • chemical, biological, radiological, explosive detection systems;                  the thinking behind the New Security System was to use as many
                                                       • video surveillance equipment                                                      legacy analog CCTV cameras as possible, provide an open architec-
                                                       • communications equipment                                                          ture to allow for new technologies to be added to the system, and
                                                       • emergency response equipment                                                      reduce the number of separate IT networks (and administrat-
                                                       • fire-suppression and decontamination equipment                                     ive and maintenance functions) that it took to operate stand-
                                                       • global positioning or automated vehicle-locator systems                           alone systems.
                                                       • evacuation improvements.                                                              What Ericsson has discovered is that formerly stovepiped sys-
                                                                                                                                           tems often need a new infrastructure to give them new life. An
                                                       A clear picture of the entire operation                                             example is a major metropolitan transit authority that still uses the
                                                       Most transportation authorities look beyond the mandates for                        same magnetic system it used in the 1950s to monitor headway
                                                       even more sophisticated answers: systems that can deactivate wire-                  spacing and telemetry. The transport authority uses the system
                                                       less devices identified as threats, biometrics for smart access and                  because it still works. The difference is that the telemetry data now
                                                       applications that trigger system-wide lockdowns during threats.                     runs over the same network that supports digital video feeds for
                                                                                                                                           security and surveillance.
                                                                                                                                               As a result, the transit authority’s command center (which
                                                                         Getting there                                                     receives, monitors and acts upon all this information) has a clearer
                                                                                                                                           picture of the entire operation, which leads to enhanced situational
                                                                         There are four major steps to improving your security
                                                                                                                                           awareness, improved security and the potential for fewer delays for
                                                                         operation. And no single company does all of it. A
                                                                                                                                           passengers – all because central command connects the dots more
                                                                         communications provider such as Ericsson is typi-
                                                                                                                                           quickly to determine that something’s not quite right on the com-
                                                                         cally involved in steps three and four, and works with
                                                                                                                                           muter train.
                                                                         your security team or partners for steps one and two.
                                                                         1. Risk and threat assessment
                                                                                                                                           A converged network is a breakthrough for security
                                                                         2. Site survey and security system design
                                                                         3. Communications system design                                   Security professionals are continuously striving for better situa-
                                                                         4. Installation, technical assistance, and staff training         tional awareness; they need to know what’s going on in their envi-
                                                                         (on-site maintenance and operations where desired).               ronment in order to accomplish their mission. Situational aware-
                                                                                                                                           ness is derived from contextual information delivered in a timely
                                                                                                                                           fashion. For years, each major electronic security system in opera-
                                                                                                                                           tion has provided a piece of the overall situational picture.
                                                                                                                                           This requires security professionals to assimilate multiple informa-
                                                                                                                                           tional inputs from a variety of sources, before developing a
                                                                                                                                           response decision.
                                                                                                                                              By taking advantage of advanced technologies, security profes-
                                                                                                                                           sionals can automatically integrate the information from a variety
                                                       Homeland Security IT budgets on the rise                                            of sec-urity systems, and then couple it with real-time capabilities
                                                                         6,000                                                             to realize the promise of their investment in communications tech-
                                                                                                                             5,180
                                                                                                                4,880
                                                                                                                                           nologies. The figure on the next page shows how the trend in the
                                                                         5,000
                                                                                    3,812
                                                                                                                                           integration of security applications, coupled with advanced com-
                                                                         4,000                                               +6.2%
                                                                                                                                           munications technology, results in the next-generation electronic
                                                        (USD Millions)




                                                                                                                +28.0%                     security system.
                                                                         3,000                                                             • Situational awareness is a function of contextual information
                                                                                                                                           delivered to decision-makers in a timely manner
                                                                         2,000
                                                                                                                                           • Contextual information is derived from the integration of
                                                                                                                                           previously stand-alone security applications
                                                                         1,000
                                                                                                                                           • Video content is the cornerstone element of contextual information
                                                                            0                                                              • Current security system communications capabilities are not
                                                                                 2006 Actuals              2007 Enacted   2008 Requested   designed to transport large amounts of video traffic, let alone inte-
                                                       Source: President´s fiscal year 08 IT budget, May 2007                              grated video with audio and data traffic




                                                       48 · Ericsson Business Review 3·2007
Leveraging advanced                                                                                   The end game:
 communications
                                                                                                       plug-and-play
                                                                                                       At Miami International,
                                                                                                       there is the potential
        Data management
         and integration                                                                               to someday integrate
                                      Situational        Situational awareness                         fire-detection systems,
                                     awareness                 visualization
          Security policies                                   • Screen updates                         fire alarms and other
                                    updates
                                                             • Virtual presence                        life-saving systems
        Intelligent data fusion                            command and control                         into the network. And
                                                          • Status of state engine
                                                                                                       biometric devices for
                                                  Mission-critical
         Event aggregation                           network                                           fingerprints should be
            /correlation                                                                               relatively simple ad-
                                  Policy-based                                                         ditions to the system.
                     Events       actions
                                                                                                       However, “plug-and-
  Network-attached sensors                                   Actions                                   play” is what security
  • Intelligent video surveillance              • Alerts sent (e-mail, pager, PDA)                     professionals expect from a network of this scope.
     • Access control system                         • Change state of sensors
  • Perimeter detection, seismic                        • Open/close doors                             The network should not have to be redesigned just
          detection, radar                  • Pan/tilt/zoom cameras to event location                  because new technology becomes available.
 • Global positioning information               • Activate additional applications


• Real-time decision-making is based on video-based, contextual           structure? Does it have strong relationships with technology part-
information and real-time communications capability                       ners, including digital video providers, sensor manufacturers and
• A scalable network environment provides room to grow with               access control specialists? Does the vendor have experience in inte-
advancements in security applications                                     grating legacy systems with next-generation applications? Does the
                                                                          vendor have experience in this sector, period?
It is also good for business                                                  As with any complex operation (and as any transportation
And then there’s the enormous promise of mobile communica-                official will tell you), plenty can go wrong in this environment.
tions in this environment: the ability of security and operations         However, when you get communications right, the entire opera-
personnel to access digital video and other critical data on any          tion benefits.
screen, any place, at any time.
   From a business perspective, a converged network can be a
pleasant surprise. Depending on the size of the transportation
operation, converging legacy and next-generation systems into an
advanced communications infrastructure could save millions or
billions of dollars in operating costs.                                   the authors
    Beyond operating efficiencies, agencies such as the Miami-Dade
Aviation Department are generating revenue from their new net-              Shane McClelland (shane.mcclelland@ericsson.com) is responsible for
                                                                            identifying global growth opportunities at Ericsson’s Data Networks and
works. Passenger transportation hubs usually have retail tenants who
                                                                            planning initiatives to win new business in new markets. Before Ericsson, he
need a network for transactional data. By carving out a portion of
                                                                            worked with Marconi, Fore Systems, and as a lieutenant in the US Air Force.
the network that is completely separate from the secure operations
                                                                            McClelland earned his Bachelor of Science in electrical engineering from the
in the airside terminal, an airport can, with very little effort, become
                                                                            University of Denver and his MBA from Southern Illinois University.
a service provider for its shops and restaurants. A port authority with
warehouse and cruise-ship tenants and a train station with adjacent
                                                                            Lori Wirth (lori.wirth@ericsson.com) is a marketing communications special-
retailers are other examples of this business model.
                                                                            ist for Ericsson’s Business Unit Networks. She began her telecommun-
                                                                            ications career in 1998 as a copywriter for Fore Systems, then for Marconi,
How it could all go wrong                                                   and joined Ericsson when the company acquired Marconi in 2006. She
A transportation system that serves the public is arguably one of           holds a Bachelor of Science in public administration and a Bachelor of Arts
the most complex environments to network. Safety and security               in journalism and communications from Point Park University.
are paramount. Safe, affordable transportation for the citizenry is
the remit. It takes an experienced communications partner to help           Bret Park (bret.park@ericsson.com) currently works with portfolio market-
transportation officials (and often their general contractors) create         ing for Ericsson’s Government Solutions unit. He earned his Bachelor of
a safe and secure operation while minimizing the impact on the              Science in mechanical engineering from the University of South Alabama.
smooth flow of people, goods and services through the system.                After graduation, he worked with 3M and ICI Americas before joining Erics-
Asking the right questions could mean avoiding the selection of             son in 1990. Park is completing his MBA from Keller Graduate School of
the wrong communications partner. Does the vendor have in-                  Management, concentrating on finance.
house capabilities to provide an end-to-end fixed and mobile infra-




                                                                                          Ericsson Business Review 3·2007 · 49

More Related Content

Similar to Networked security has arrived - Ericsson Review

IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management responseJack Brown
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIfEngel
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufikRussell Publishing
 
[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docx[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docxhanneloremccaffery
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s NamMerrileeDelvalle969
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsSITA
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emeaChris Keane
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 

Similar to Networked security has arrived - Ericsson Review (20)

IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docx[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docx
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
14 june
14 june14 june
14 june
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
 
Nextgen
NextgenNextgen
Nextgen
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Networked security has arrived - Ericsson Review

  • 1. Shane McClelland, Lori Wirth and Bret Park on how secure transportation makes business sense Networked security has arrived – a real departure from stovepiped systems Transportation agencies around the world are using advanced communications capabilities to improve operating efficiencies, enhance safety and security, and contribute to a better experience for passengers. BEFORE HIS RECENT RETIREMENT, Mark Forare, the assistant course shops and restaurants, and scalable enough to accom- director of security for the Miami-Dade Aviation Department, modate the sensors and biometric applications that the airport reminisced with Ericsson about how it felt to take on security and federal government are testing. What’s more, the entire opera- responsibilities at Miami International Airport shortly after the tion is monitored and managed from centrally located security- terrorist attacks of September 11, 2001. officer workstations. Forare was a Miami-Dade Police Department (MDPD) lieuten- It is an entirely New Security System. And it’s “tightly pulled ant, a critical incident response expert and liaison with the US together and something we’re proud of,” Forare said, smiling, as he Federal Aviation Administration. With that experience behind left the system to his able successor and headed off to relax in the him, it wasn’t what he didn’t know about his new Aviation Depart- Florida sunshine. ment job that kept him up at night. He knew all too well that he was stepping into a security operation tasked with the safety of Secure communications: keeping you moving more than 30 million passengers traveling through the airport Like Miami International, many transportation facilities around every year. the world are undergoing major overhauls. Billions of dollars are He also knew he would be responsible for completing the invested annually to modernize current transportation hubs or “New Security System,” a project with a name that was innocuous build new transportation capacity for economic development and and ambitious at the same time. Part of the airport’s USD 5.2 billion to enhance business and commuter travel, as well as tourism. capital improvement program, the New Security System was In addition to the capital improvement efforts, transportation planned prior to 9/11, and underscored after the terrorist attacks officials responsible for the smooth, daily operation of airports, occurred. Among the objectives: increase passenger and personnel public transit systems, roadways and seaports face growing eco- safety, increase surveillance capacity, and reduce overall incident nomic and environmental challenges. The costs of operating and response time. maintaining modern, efficient transportation systems are rising. Forare told Ericsson that given the circumstances – taking on Increasing fuel costs, stricter environmental regulations and higher a high-profile position at a major transportation operation with demands on capital improvements coupled with downward pric- the assignment of building a system that was “new” and “secure” ing pressure – all place stress on the transportation industry. – he couldn’t shake the thought that this New Security System was If these challenges are not complex enough, government- going to be one of those projects where he spent his time trying to mandated security requirements add to the stress. get his contractor, subcontractors and internal departments to play To take on these challenges, transportation officials must con- in the same sandbox. In other words, he dreaded the chaos he was tinually find ways to enhance safety and security, improve operat- sure would ensue. ing efficiencies and contribute to a better experience for passengers. However his story has a better ending than you might suspect. What they’re realizing is that voice, video and data communica- Today, Miami International Airport has an access control and tions, racing in real time through a converged fixed-mobile net- alarm system that secures more than 1,000 points of entry, as well work, can improve all of the above. as a video surveillance system that is synchronized with two-way, It takes a leap of faith to upgrade a communications network simultaneously transmitted audio intercoms. All this data travels for a transportation operation that probably runs non-stop or close in real time over a converged communications network that is to it. But improve it we must. Unfortunately, that’s one of the flexible enough to support transactional information from con- lessons learned since global terrorists chose the transportation 46 · Ericsson Business Review 3·2007
  • 2. Ericsson Business Review 3·2007 · 47
  • 3. ...Networked security has arrived Shane McClelland, Lori Wirth and Bret Park on how secure transportation makes business sense industry as a target. Most governments stipulate that transport- The good news is that a converged communications network can ation authorities must develop comprehensive security plans accommodate or enable these systems, as well as the voice, data that include: and administrative traffic that is typical of any business operation. • facility protection systems Even better from a return-on-investment perspective, the right • perimeter security systems converged communications network may even accommodate • redundant critical operations and control systems legacy systems that operate just fine today. At Miami International, • chemical, biological, radiological, explosive detection systems; the thinking behind the New Security System was to use as many • video surveillance equipment legacy analog CCTV cameras as possible, provide an open architec- • communications equipment ture to allow for new technologies to be added to the system, and • emergency response equipment reduce the number of separate IT networks (and administrat- • fire-suppression and decontamination equipment ive and maintenance functions) that it took to operate stand- • global positioning or automated vehicle-locator systems alone systems. • evacuation improvements. What Ericsson has discovered is that formerly stovepiped sys- tems often need a new infrastructure to give them new life. An A clear picture of the entire operation example is a major metropolitan transit authority that still uses the Most transportation authorities look beyond the mandates for same magnetic system it used in the 1950s to monitor headway even more sophisticated answers: systems that can deactivate wire- spacing and telemetry. The transport authority uses the system less devices identified as threats, biometrics for smart access and because it still works. The difference is that the telemetry data now applications that trigger system-wide lockdowns during threats. runs over the same network that supports digital video feeds for security and surveillance. As a result, the transit authority’s command center (which Getting there receives, monitors and acts upon all this information) has a clearer picture of the entire operation, which leads to enhanced situational There are four major steps to improving your security awareness, improved security and the potential for fewer delays for operation. And no single company does all of it. A passengers – all because central command connects the dots more communications provider such as Ericsson is typi- quickly to determine that something’s not quite right on the com- cally involved in steps three and four, and works with muter train. your security team or partners for steps one and two. 1. Risk and threat assessment A converged network is a breakthrough for security 2. Site survey and security system design 3. Communications system design Security professionals are continuously striving for better situa- 4. Installation, technical assistance, and staff training tional awareness; they need to know what’s going on in their envi- (on-site maintenance and operations where desired). ronment in order to accomplish their mission. Situational aware- ness is derived from contextual information delivered in a timely fashion. For years, each major electronic security system in opera- tion has provided a piece of the overall situational picture. This requires security professionals to assimilate multiple informa- tional inputs from a variety of sources, before developing a response decision. By taking advantage of advanced technologies, security profes- sionals can automatically integrate the information from a variety Homeland Security IT budgets on the rise of sec-urity systems, and then couple it with real-time capabilities 6,000 to realize the promise of their investment in communications tech- 5,180 4,880 nologies. The figure on the next page shows how the trend in the 5,000 3,812 integration of security applications, coupled with advanced com- 4,000 +6.2% munications technology, results in the next-generation electronic (USD Millions) +28.0% security system. 3,000 • Situational awareness is a function of contextual information delivered to decision-makers in a timely manner 2,000 • Contextual information is derived from the integration of previously stand-alone security applications 1,000 • Video content is the cornerstone element of contextual information 0 • Current security system communications capabilities are not 2006 Actuals 2007 Enacted 2008 Requested designed to transport large amounts of video traffic, let alone inte- Source: President´s fiscal year 08 IT budget, May 2007 grated video with audio and data traffic 48 · Ericsson Business Review 3·2007
  • 4. Leveraging advanced The end game: communications plug-and-play At Miami International, there is the potential Data management and integration to someday integrate Situational Situational awareness fire-detection systems, awareness visualization Security policies • Screen updates fire alarms and other updates • Virtual presence life-saving systems Intelligent data fusion command and control into the network. And • Status of state engine biometric devices for Mission-critical Event aggregation network fingerprints should be /correlation relatively simple ad- Policy-based ditions to the system. Events actions However, “plug-and- Network-attached sensors Actions play” is what security • Intelligent video surveillance • Alerts sent (e-mail, pager, PDA) professionals expect from a network of this scope. • Access control system • Change state of sensors • Perimeter detection, seismic • Open/close doors The network should not have to be redesigned just detection, radar • Pan/tilt/zoom cameras to event location because new technology becomes available. • Global positioning information • Activate additional applications • Real-time decision-making is based on video-based, contextual structure? Does it have strong relationships with technology part- information and real-time communications capability ners, including digital video providers, sensor manufacturers and • A scalable network environment provides room to grow with access control specialists? Does the vendor have experience in inte- advancements in security applications grating legacy systems with next-generation applications? Does the vendor have experience in this sector, period? It is also good for business As with any complex operation (and as any transportation And then there’s the enormous promise of mobile communica- official will tell you), plenty can go wrong in this environment. tions in this environment: the ability of security and operations However, when you get communications right, the entire opera- personnel to access digital video and other critical data on any tion benefits. screen, any place, at any time. From a business perspective, a converged network can be a pleasant surprise. Depending on the size of the transportation operation, converging legacy and next-generation systems into an advanced communications infrastructure could save millions or billions of dollars in operating costs. the authors Beyond operating efficiencies, agencies such as the Miami-Dade Aviation Department are generating revenue from their new net- Shane McClelland (shane.mcclelland@ericsson.com) is responsible for identifying global growth opportunities at Ericsson’s Data Networks and works. Passenger transportation hubs usually have retail tenants who planning initiatives to win new business in new markets. Before Ericsson, he need a network for transactional data. By carving out a portion of worked with Marconi, Fore Systems, and as a lieutenant in the US Air Force. the network that is completely separate from the secure operations McClelland earned his Bachelor of Science in electrical engineering from the in the airside terminal, an airport can, with very little effort, become University of Denver and his MBA from Southern Illinois University. a service provider for its shops and restaurants. A port authority with warehouse and cruise-ship tenants and a train station with adjacent Lori Wirth (lori.wirth@ericsson.com) is a marketing communications special- retailers are other examples of this business model. ist for Ericsson’s Business Unit Networks. She began her telecommun- ications career in 1998 as a copywriter for Fore Systems, then for Marconi, How it could all go wrong and joined Ericsson when the company acquired Marconi in 2006. She A transportation system that serves the public is arguably one of holds a Bachelor of Science in public administration and a Bachelor of Arts the most complex environments to network. Safety and security in journalism and communications from Point Park University. are paramount. Safe, affordable transportation for the citizenry is the remit. It takes an experienced communications partner to help Bret Park (bret.park@ericsson.com) currently works with portfolio market- transportation officials (and often their general contractors) create ing for Ericsson’s Government Solutions unit. He earned his Bachelor of a safe and secure operation while minimizing the impact on the Science in mechanical engineering from the University of South Alabama. smooth flow of people, goods and services through the system. After graduation, he worked with 3M and ICI Americas before joining Erics- Asking the right questions could mean avoiding the selection of son in 1990. Park is completing his MBA from Keller Graduate School of the wrong communications partner. Does the vendor have in- Management, concentrating on finance. house capabilities to provide an end-to-end fixed and mobile infra- Ericsson Business Review 3·2007 · 49