Leveraging Technology Over the Road

Enhancing transit security for safer and smarter systems

Transportation is an essential industry that enables goods and products to be transported efficiently and effectively across state and country lines. However, the transportation industry is not immune to security incidents. Transit authorities, including railway and rapid transit stations, must deploy comprehensive solutions to create safer environments for passengers and staff.

The increased risk of security incidents worldwide has propelled the need for enhanced security protocols amid increased public pressure. The Transportation Security Administration (TSA) reported that travel volume increased to near pre-pandemic levels in 2021. With approximately 1.6 million passengers screened per day, the need to protect travelers and staff is critical. Transit authorities require comprehensive protection to ensure the highest level of security.

Video surveillance is a crucial tool that transit authorities can use to improve security protocols. In many deployments today, video management software is used as the backbone of comprehensive security command systems that support thousands of cameras. Other advanced solutions, such as video analytics, access control and emergency communication tools, work with video to ease high availability and resiliency to all systems.

While more cameras lead to more data, transportation staff continuously search for ways to use this information for better insight, detection and awareness. Emerging technologies like machine learning and video analytics can vastly improve accuracy, allowing stakeholders to make continued operational improvements. At the same time, transit authorities must ensure the highest security of the data collected and protect network-enabled solutions from cyber threats.

Aside from making systems safer, transit stations can use technology that can be leveraged to increase operational efficiencies and build more robust business processes. Video data can be used to evaluate current processes, such as ticketing, or help retail stores within the facility reduce theft. Mobile video applications can support staff in the field, making operations more efficient and reducing queue lengths.

Ensuring the safety and security of passengers has always been a significant concern for transit system operators. With intelligent infrastructure, trusted IT processes, and advanced video surveillance platforms, operators can create safer, more intelligent transit systems.

Containerized VMS is becoming an essential technology that transit authorities can use to improve security protocols and modernize video management. A container is a lightweight executable that runs on any infrastructure and is created by packaging software code with the operating system and dependencies required to run the code. Containerization bundles the application code with the required configuration files, libraries and dependencies.

This "container" can run on any platform or cloud by itself. Pre-configured and installed prerequisites are needed for containerized VMS solutions functionality, and no additional frameworks or database software are necessary. Deployments of these systems need less retrofitting and communication across enterprise servers because they do not have separate server requirements.

Containerization is a popular technology used in IT environments to package and deploy applications, providing a lightweight and portable solution for software deployment. Containerization enables developers to create consistent and reproducible environments for their applications. Containers are isolated from each other and from the host system, providing a secure and controlled runtime environment. This isolation ensures that applications running within containers do not interfere with each other and helps prevent conflicts between different software dependencies.

Containerization also promotes scalability and resource efficiency. Containers can be rapidly deployed and scaled horizontally to manage varying levels of workload. Each container can run multiple instances of an application, allowing for efficient use of system resources.

Additionally, containerization platforms often include orchestration tools that automate the management of containerized applications, making it easier to scale, monitor and manage large deployments. Containers also enable the adoption of microservices architectures, where applications are broken down into smaller, loosely coupled components running in separate containers. This approach promotes modularity, scalability and easier maintenance of complex applications.

Containerized VMS is an ideal solution for transit authorities that need a comprehensive and secure system. The technology can provide an intelligent and data-driven approach to security management and response, allowing for a quicker and more effective response to security incidents. The use of containerized VMS can also help transit authorities investigate equipment breakdowns, diagnose operational problems, and monitor device health, allowing operations within the command center to act quickly.

As the world continues to evolve and new security threats emerge, transit authorities must remain vigilant and adapt to meet the challenges ahead. By leveraging intelligent infrastructure, trusted IT processes, and advanced video surveillance platforms, transit authorities can create safer and more intelligent transit systems. Ultimately, these efforts will improve safety for passengers and staff, increase operational efficiencies, and contribute to the continued growth and success of the transportation industry.

This article originally appeared in the July / August 2023 issue of Security Today.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.