Cyber Security
Our partner's solutions provide:

Complete Hardware Visibility
Visibility to all hardware assets such as the connected network elements and peripherals.

Rogue Device Mitigation
Rogue device mitigation for devices operating on the physical layer of the ISO-OSI model or Human Interface Device (HID) impersonating devices.

Low Ownership Cost
Software that is simple to operate. This leads to low human intervention overheads and minimal maintenance.

Policy Enforcement
Granular access control measures which allow specific hardware usage to be enforced based on roles or device characteristics.

Actionable Measures
Actionable measures that ensure clear delivery to the user without any rules or post-processing needed.

Native Third-Party Integrations
Integration with leading cybersecurity products and third-party vendor's tools straight out of the box.

Surveys & Audits
Client budget, capacity, and severity of findings will be used to generate a full report containing required standards and actions in order to comply with local and international standards.

Planning & Design
Correct and detailed planning is the key to ensuring the highest standards of airport security. The latest available technology will be evaluated in order to provide efficient and seamless security for passengers.

Security Upgrades
The existing budget will be utilised in the most efficient manner in order to maximise efficacy. Efficient, streamlined, seamless, and customer-friendly passenger handling will be the result of technology and correct procedures.

Threat Analysis & Risk Management
With the ongoing development of sophisticated aviation threats, risk registers need to be permanently reevaluated in order to identify vulnerable areas. Risk-based approaches will be used to mitigate high priority risks and save resources.

Blast Mitigation
Malicious explosives can result in loss of life, injury, damage to assets, operation disruption, and irreversible reputational damage. Bollards, glass protection, blast containers are all examples of viable blast mitigation solutions that can be implemented after a property assessment.
Aviation & Security Consultancy

Security Control Rooms
Proper design of security control rooms will ensure that any incident will be handled in the best available environment and condition with an emphasis on comfortable technological interfaces. Command, control and communication systems will integrate all standalone systems to one central system.

Passenger Screening & Body Scanning
Technologies include Archway Metal Detectors (AMD), Hand-Held Metal Detectors (HHMD), as well as Millimetre-wave scanners, backscatter machines, and low-dose x-ray.

Hand Baggage Screening
Various configurations of x-rays can be chosen, for example; single view and multi-view x-rays, Computerised Tomography (CT), and networked x-ray machines.

Detection of Liquids, Aerosols, and Gels (LAGS)
The current International Civil Aviation Organisation (ICAO) regulations require an automatic detection of LAGS inside the passenger's bag. This can be achieved using proper screening equipment. Verification and identification of liquid explosives are also available.

Hold Baggage Screening (HBS)
A full HBS system can be designed based on baggage throughput, airport layout, and other intricate factors. The design will conform to the TSA and ECAC regulations and will comply with all local civil aviation regulations. Combinations of multi-view Explosive Detection Systems (EDS) equipment and Computerised Tomography (CT) machines will be offered. Explosive Trace Detection (ETD) equipment will complement the HBS solution.

Cargo Screening
New TSA and ECAC regulations enforce various changes to the air freight operation, to cover the whole air cargo supply chain. Various methods of cargo screening can be provided; x-ray machines, ETD equipment, canines, and more, as well as complete design and implementation of air cargo security systems.

Vehicle Screening
Trucks, vans, and passenger vehicles can be screened to detect prohibited items, smuggling of goods, and human trafficking according to the client's requirements. Our team will design the most cost-effective solution for any client. Training will be provided for the security team.
Security Technology

Perimeter Fences & Gates
Vehicle road blockers, grips, gates, and booms are all examples of viable solutions offered based on the threats and risk audit. A high-level security fence will delay any intruder with conventional/power tools such that the response time is matched.

Perimeter Intrusion Detection System (PIDS)
An integrated PIDS solution will detect, alert, and verify any attempt to climb on, cut, lift, or jack the fence. A reliable solution with a low false-positive rate can be tailor-made to integrate with CCTV, access control systems, thermal cameras, and other systems.

CCTV
A Video Management System (VMS) is a critical tool for any secure site, which can be operated in different modes: active monitoring, exception-based, detection-based, and investigation. Indoor, outdoor, Pan-Tilt-Zoom (PTZ), day and night, long-range, cooled (or uncooled) thermal cameras can all be equipped. Video storage for review, investigation, evidence, and training purposes will complement the VMS.

Video Analytics
Hot spot areas don't need to be constantly monitored by an operator as alarms will be generated by various sets of rules for any camera, which will notify the operator and allow them to respond accordingly. This results in a cost-effective solution that cuts down on manpower, will provide better efficiency, and ensure that critical incidents do not slip under the radar.

Facial Recognition
Our partner's facial recognition system includes face, body, and object recognition along with alerts for a Person of Interest (POI) or suspicious object. The system doubles as an access control solution to chosen restricted areas using the subject's face as the biometric authentication medium. The system is capable of using footage from the VMS to ensure a detection accuracy of 99.9%, which reduces the number of false alarms generated and can assist to combat crime or terrorist activity.

Access Control Systems
Access control systems are the key to keep an unwanted/unauthorized person or vehicle from entering a secured area. Coded cards contain security features such as a photo, holograms, magnetic chips, and electronic chips. A biometric feature like a fingerprint, palm print, vein pattern, iris, or face can be used as well to enhance the security of the card.
Security Training & Operations

Personnel Recruitment
Choosing competent and suitable security employees is a key factor for any long term, sustainable security team. Security personnel will be evaluated on various security requirements, including physical and cognitive abilities. Dedicated software will check the applicant’s capability to concentrate, detect, interpret, and investigate the x-ray images.

Screener Training (passengers, HBS, and cargo)
Our training courses for aviation screeners include an introduction to x-ray machines, x-ray image interpretation, CT training, HBS, and cargo operators. ETD training can be provided as well.

Passenger Profiling
This truly unique training will result in detecting any behavioural irregularities of any passenger, coupled with training to verify travel documents. This capability can help security personnel to concentrate on potential criminals and terrorists instead of directing energy at the wrong people. Resources can be applied according to the findings and can be used more efficiently.

Security Screening, Supervision, and Operation Management
We can take over or complement the existing security operations at airports. We will deploy screeners, security supervisors, and site managers to any position necessary. A quality assurance team will ensure full compliance with local and international regulations. Reports on service levels will be provided to the client as required.
Brokering & Logistics Services

Cutting-edge Logistics
We specialise in high-level, security-related logistics and offer unique outsourcing services. We supply a wide range of advanced, security-oriented services and products - representing some of the most respected companies in the fields of aviation security.

Intermediary Services
We serve as an intermediary between the suppliers or contractors to governments worldwide, offering international sales and purchasing representation, as well as dedicated consultancy in institutional and civilian specialised security.

Security Expertise
We serve as security subject matter experts to large organisations and governments worldwide, offering dedicated consultancy, high-end advisory, and outsourcing services in institutional and government security matters.