Reducing risks at airports and seaports

September 2017 Transport (Industry), Surveillance, Integrated Solutions

Airports and seaports continue to present among the most vulnerable potential targets for terrorists. Within the past two years, attacks at airports in Brussels, Istanbul, and Fort Lauderdale have claimed the lives of more than 80 people and injured more than 500. And while there have been no major terrorist attacks recorded yet at seaports in the U.S. or abroad, you don’t have to look far to see the catastrophic consequences that could result from one. Although it may be impossible to prevent every airport and seaport attack, comprehensive security systems that include video surveillance along with other elements offer the best chances to reduce the risk of such attacks and to support the official response to incidents in these areas.

Mike Prysock
Mike Prysock

Airports and seaports have many inherent security challenges above and beyond the typical baggage and passenger screening functions that are familiar to travellers. Compared to other secure areas such as office buildings they are geographically large and spread out, have a mixture of public and private areas, and have large numbers of vehicles, workers, and visitors moving about the property. Securing and protecting the entire premises requires a comprehensive security system made up of many elements, including fencing and gates, access control, intrusion detectors, video surveillance and much more.

The perimeter of an airport or a seaport presents a particular challenge. For example, many airports have no more than a chain-link fence between the Air Operations Area (AOA) and the outside of the airport. At seaports, this may be true for the entire premises. At an airport, runways, taxiways, aircraft, and other assets protected only by that fence are incredibly vulnerable to anyone with reasonable climbing skills – while, at seaports, ships, containers, vehicles etc. are at risk. It’s not difficult to use a vehicle to break through a chain-link fence, as shown by several recent high-profile perimeter breaches where civilians have taken their car for a joyride down an airport runway. Likewise, virtually anyone with a boat can paddle up to airports that are near water, or any seaport, and gain access. Reports find that airport perimeter security is breached almost once every 10 days.

Solutions for automated perimeter security can help to address this challenge. Today’s surveillance systems can incorporate analytics to monitor the fence line, detect breaches or potential breaches, filter out time-wasting false alarms from animals or blowing debris, and alert authorities quickly when action is needed. And when perimeter security is seamlessly integrated with the airport or seaport’s surveillance system, there is no need to train personnel on a new system or increase your personnel deployment to compensate for new security operations. These solutions are easily deployable, and they function in all environments and weather conditions – a vitally important factor for a security system deployed outdoors and in areas where wind, rain and shaking can be common occurrences.

Video surveillance augments the observations of security personnel and enables operators to effectively engage in real-time monitoring and situation management while supporting investigative and forensic needs. In particular, an open platform approach combined with the ability to integrate with other third-party systems, allows organisations to benefit from other best-in-class technologies to promote a stronger security posture and support a coordinated emergency response when necessary.

Airport and seaport video solutions should be combined with cameras that deliver the best possible images in difficult lighting conditions. Panoramic cameras are ideal for capturing a view of both large open areas and high-interest locations such as entry gates and other sensitive areas. The VMS solution chosen should offer an intuitive platform that displays critical security and video data together to help security officials make quick, effective decisions. It should integrate with third-party hardware and software systems to allow users to build a

tailored best-in-class solution that closely matches the needs of their particular facility.

The threats facing airports and seaports are not going to go away any time soon and video surveillance remains a vital early detection tool. Whether it is spotting a fence jumper or a potential terrorist inside a passenger terminal, video surveillance gives security personnel actionable intelligence they can rely upon. As the data generated by cameras becomes even greater in the years ahead, it is paramount that airports and seaports position themselves to grow with technology.

For more information contact Yvette Venter, Pelco by Schneider Electric, +27 (0)11 254 6400, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Vumacam highlights concerns with proposed Johannesburg CCTV by-laws
Vumacam News & Events Surveillance
Vumacam has raised objections to critical provisions of the by-laws governing privately owned CCTV cameras with a view of public spaces in the city, which were promulgated on Friday, 28 February 2025.

Read more...
Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management Transport (Industry) Videos
Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
The impact of video analytics on business security
AI & Data Analytics Surveillance
As more enterprises work to integrate AI-enabled solutions into their networks, enterprises must not lose sight of the implications of these integrations and the added value they are working to unlock.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...