Integrated security for Malaysia Airlines

August 2013 Access Control & Identity Management, Surveillance

CEM Systems, part of Tyco Security Products, has announced that the AC2000 security management system has been selected to secure the offices of the 5-star Malaysia Airlines.

Established more than 60 years ago, Malaysia Airlines flies to destinations across six continents. The airline has a long history of providing excellent service and has won over 100 awards in the last 10 years, including Asia’s Leading Airline. Malaysia Airlines required a security solution that was powerful yet reliable and could be integrated with a variety of systems to form a complete security management system (SMS).

“CEM has a long history of working with aviation customers to find the right solution to meet their specific needs,” said Andrew Fulton, senior director, global sales, CEM Systems. “We have maintained our position in the aviation market by continually developing AC2000 and by staying ahead of the industry. Malaysia Airlines key requirement was for one integrated security platform for access control, video and intrusion, as well as integration to an external visitor registration system.”

AC2000 met the requirements for high-level integration using the AC2000 DSC SIA Intruder Interface and the AC2000 American Dynamics TVR video interface. These modules allow the AC2000 access control system to act as the security management system (SMS), with DSC intrusion and American Dynamics range of digital video recorders visible from one unified platform. The AC2000 AED (Alarm Event Display) application forms a single user-friendly interface were administrators can centrally monitor access control, intruder and video systems, all in real time.

In addition, an AC2000 Application Programming Interface (API) has been provided to allow the seamless integration of an external visitor registration system to the AC2000 system visitor’s module. This allows Malaysian Airlines to transfer critical data from an existing visitor system for operational efficiency.

The system at Malaysia Airlines also features the latest in Web functionality with AC2000 WEB Visitors. The module provides a powerful Web-based tool which can be used to monitor visitor access from any location. AC2000 WEB Visitors provides users with the ability to add full details of a schedule visit including date, time, sponsor details and even a visitor image via a standard Web browser.

CEM has also provided Malaysia Airlines with a stable solution with a high level of redundancy. Server redundancy has been achieved using AC2000 Failover which provides a failsafe secondary server and the highest assurance of system reliability should communication be temporarily lost with the central AC2000 server.

For more information contact Tyco Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...
Storage Selection Guide 2026
Storage Selection Guide Surveillance
The Storage Selection Guide 2026 provides video storage and management options customised for small, medium, and large surveillance operations, ensuring effective support for various security requirements.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.