Airport-specific access control ­system

November 2013 Access Control & Identity Management, Transport (Industry)

In recent years airports have seen increased threat from potential terrorism, which has caused airports to heighten security and take every step to protect passengers, staff and assets.

For the airport, the greatest risk is posed by people, so airport staff need to be vigilant at all times, meaning airport security personnel need to be able to visually verify staff around the airport.

AC2000 Airport is an airport specific access control system an aviation-specific access control and security management system that is used by airports around the world, including over 80% of UK airports. It manages access throughout the airport and prevents unauthorised access to secure areas. It controls the flow of passengers, temporary cardholders and baggage through access points inside the airport and provides command and control for airport security, law enforcement and airport management personnel.

AC2000 VIPPS (Visual Imaging Pass Production) application allows security personnel to produce permanent and temporary badges to manage the flow of staff and site visitors.

Check-In Desk enabling application allows CEM card readers to be used to enable/ disable shared check-in desks or luggage carousels. This provides a report on check-in desk usage and the airlines which have used them. This report can then be sent to the finance system and used to invoice the appropriate airlines.

Air-bridge monitoring is another useful tool for airports. Card readers installed at each air-bridge ensure that only authorised and trained personnel can operate them. A valid card and/or PIN must be presented before activation. Similar to Check-In Desk enabling, the system provides data which can be reported on and used to charge airlines appropriately for their usage.

CEM card readers offer multiple layers of security throughout airports, controlling airside and landside boundaries, gates, air traffic control towers and associated remote airport buildings. With an internal database, CEM card readers can validate cards off-line validation and ensure 24/7 access to key areas with zero downtime.

Emerald is CEM’s touch screen card reader. It brings AC2000 Airport intelligence directly to the edge. A reader and controller in one, with integrated Voice over IP (VoIP) intercom, emerald provides secure access to key AC2000 Airport system functionality through a range of applications directly at the door.

The S610 range of intelligent card readers provide card access with additional PIN security and an LCD display where messages such as Access Denied and Card Expiring are easily displayed. This prevents operational delays as ID cardholders can quickly communicate reasons for denied entry to the airport ID unit. The S610f fingerprint reader allows for triple authentication using PIN, card and fingerprint.

AC2000 Rolling Transaction Display (RTD) allows security staff to visually identify cardholders prior to their gaining access through a secure door. Also for roaming security throughout the airport, the CEM S3030 portable reader provides security personnel with a lightweight handheld card reading device which has an advanced display to provide images of cardholders for visual verification.

AC2000 Airport is a flexible, customisable solution which provides high levels of integration with third-party systems including video, intrusion and fire. Another airport specific feature is Airport Door Modes which include Passenger, Interlock and Lobby Mode. These door modes enable airports to efficiently control the flow of passenger traffic

The AC2000 Airport access control system supports unlimited cardholders and doors and features unlimited expansion capabilities.

Best practice for airport security depends on each specific airport’s local and international regulations and requirements. What is possible, what is allowed and what is best practice regarding airport security will differ greatly for each airport. That is why it is important for airports to install an access control and security management system that has the flexibility to adapt or be customised to meet their unique security requirements. AC2000 Airport offers airports the flexibility to change and evolve their security system as airport legislation changes over time in response to various threats.

For more information contact Tyco Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Driving down fleet management costs
Asset Management Transport (Industry) Logistics (Industry)
As we move into the latter part of the first quarter of 2026, businesses operating fleets can expect expenses to increase from the procurement stage through to termination, due to various local and international factors.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.