SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Shane McClelland, Lori Wirth and Bret Park on
how secure transportation makes business sense



                                                       Networked
                                                       security has arrived
                                                       – a real departure from stovepiped systems
                                                       Transportation agencies around the world are using advanced
                                                       communications capabilities to improve operating efficiencies, enhance
                                                       safety and security, and contribute to a better experience for passengers.




                                                       BEFORE HIS RECENT RETIREMENT,            Mark Forare, the assistant     course shops and restaurants, and scalable enough to accom-
                                                       director of security for the Miami-Dade Aviation Department,            modate the sensors and biometric applications that the airport
                                                       reminisced with Ericsson about how it felt to take on security          and federal government are testing. What’s more, the entire opera-
                                                       responsibilities at Miami International Airport shortly after the       tion is monitored and managed from centrally located security-
                                                       terrorist attacks of September 11, 2001.                                officer workstations.
                                                           Forare was a Miami-Dade Police Department (MDPD) lieuten-               It is an entirely New Security System. And it’s “tightly pulled
                                                       ant, a critical incident response expert and liaison with the US        together and something we’re proud of,” Forare said, smiling, as he
                                                       Federal Aviation Administration. With that experience behind            left the system to his able successor and headed off to relax in the
                                                       him, it wasn’t what he didn’t know about his new Aviation Depart-       Florida sunshine.
                                                       ment job that kept him up at night. He knew all too well that he
                                                       was stepping into a security operation tasked with the safety of        Secure communications: keeping you moving
                                                       more than 30 million passengers traveling through the airport           Like Miami International, many transportation facilities around
                                                       every year.                                                             the world are undergoing major overhauls. Billions of dollars are
                                                           He also knew he would be responsible for completing the             invested annually to modernize current transportation hubs or
                                                       “New Security System,” a project with a name that was innocuous         build new transportation capacity for economic development and
                                                       and ambitious at the same time. Part of the airport’s USD 5.2 billion   to enhance business and commuter travel, as well as tourism.
                                                       capital improvement program, the New Security System was                    In addition to the capital improvement efforts, transportation
                                                       planned prior to 9/11, and underscored after the terrorist attacks      officials responsible for the smooth, daily operation of airports,
                                                       occurred. Among the objectives: increase passenger and personnel        public transit systems, roadways and seaports face growing eco-
                                                       safety, increase surveillance capacity, and reduce overall incident     nomic and environmental challenges. The costs of operating and
                                                       response time.                                                          maintaining modern, efficient transportation systems are rising.
                                                           Forare told Ericsson that given the circumstances – taking on       Increasing fuel costs, stricter environmental regulations and higher
                                                       a high-profile position at a major transportation operation with         demands on capital improvements coupled with downward pric-
                                                       the assignment of building a system that was “new” and “secure”         ing pressure – all place stress on the transportation industry.
                                                       – he couldn’t shake the thought that this New Security System was           If these challenges are not complex enough, government-
                                                       going to be one of those projects where he spent his time trying to     mandated security requirements add to the stress.
                                                       get his contractor, subcontractors and internal departments to play         To take on these challenges, transportation officials must con-
                                                       in the same sandbox. In other words, he dreaded the chaos he was        tinually find ways to enhance safety and security, improve operat-
                                                       sure would ensue.                                                       ing efficiencies and contribute to a better experience for passengers.
                                                           However his story has a better ending than you might suspect.       What they’re realizing is that voice, video and data communica-
                                                       Today, Miami International Airport has an access control and            tions, racing in real time through a converged fixed-mobile net-
                                                       alarm system that secures more than 1,000 points of entry, as well      work, can improve all of the above.
                                                       as a video surveillance system that is synchronized with two-way,           It takes a leap of faith to upgrade a communications network
                                                       simultaneously transmitted audio intercoms. All this data travels       for a transportation operation that probably runs non-stop or close
                                                       in real time over a converged communications network that is            to it. But improve it we must. Unfortunately, that’s one of the
                                                       flexible enough to support transactional information from con-           lessons learned since global terrorists chose the transportation




                                                       46 · Ericsson Business Review 3·2007
Ericsson Business Review 3·2007 · 47
...Networked security has arrived
       Shane McClelland, Lori Wirth and Bret Park on
how secure transportation makes business sense



                                                       industry as a target. Most governments stipulate that transport-                    The good news is that a converged communications network can
                                                       ation authorities must develop comprehensive security plans                         accommodate or enable these systems, as well as the voice, data
                                                       that include:                                                                       and administrative traffic that is typical of any business operation.
                                                       • facility protection systems                                                       Even better from a return-on-investment perspective, the right
                                                       • perimeter security systems                                                        converged communications network may even accommodate
                                                       • redundant critical operations and control systems                                 legacy systems that operate just fine today. At Miami International,
                                                       • chemical, biological, radiological, explosive detection systems;                  the thinking behind the New Security System was to use as many
                                                       • video surveillance equipment                                                      legacy analog CCTV cameras as possible, provide an open architec-
                                                       • communications equipment                                                          ture to allow for new technologies to be added to the system, and
                                                       • emergency response equipment                                                      reduce the number of separate IT networks (and administrat-
                                                       • fire-suppression and decontamination equipment                                     ive and maintenance functions) that it took to operate stand-
                                                       • global positioning or automated vehicle-locator systems                           alone systems.
                                                       • evacuation improvements.                                                              What Ericsson has discovered is that formerly stovepiped sys-
                                                                                                                                           tems often need a new infrastructure to give them new life. An
                                                       A clear picture of the entire operation                                             example is a major metropolitan transit authority that still uses the
                                                       Most transportation authorities look beyond the mandates for                        same magnetic system it used in the 1950s to monitor headway
                                                       even more sophisticated answers: systems that can deactivate wire-                  spacing and telemetry. The transport authority uses the system
                                                       less devices identified as threats, biometrics for smart access and                  because it still works. The difference is that the telemetry data now
                                                       applications that trigger system-wide lockdowns during threats.                     runs over the same network that supports digital video feeds for
                                                                                                                                           security and surveillance.
                                                                                                                                               As a result, the transit authority’s command center (which
                                                                         Getting there                                                     receives, monitors and acts upon all this information) has a clearer
                                                                                                                                           picture of the entire operation, which leads to enhanced situational
                                                                         There are four major steps to improving your security
                                                                                                                                           awareness, improved security and the potential for fewer delays for
                                                                         operation. And no single company does all of it. A
                                                                                                                                           passengers – all because central command connects the dots more
                                                                         communications provider such as Ericsson is typi-
                                                                                                                                           quickly to determine that something’s not quite right on the com-
                                                                         cally involved in steps three and four, and works with
                                                                                                                                           muter train.
                                                                         your security team or partners for steps one and two.
                                                                         1. Risk and threat assessment
                                                                                                                                           A converged network is a breakthrough for security
                                                                         2. Site survey and security system design
                                                                         3. Communications system design                                   Security professionals are continuously striving for better situa-
                                                                         4. Installation, technical assistance, and staff training         tional awareness; they need to know what’s going on in their envi-
                                                                         (on-site maintenance and operations where desired).               ronment in order to accomplish their mission. Situational aware-
                                                                                                                                           ness is derived from contextual information delivered in a timely
                                                                                                                                           fashion. For years, each major electronic security system in opera-
                                                                                                                                           tion has provided a piece of the overall situational picture.
                                                                                                                                           This requires security professionals to assimilate multiple informa-
                                                                                                                                           tional inputs from a variety of sources, before developing a
                                                                                                                                           response decision.
                                                                                                                                              By taking advantage of advanced technologies, security profes-
                                                                                                                                           sionals can automatically integrate the information from a variety
                                                       Homeland Security IT budgets on the rise                                            of sec-urity systems, and then couple it with real-time capabilities
                                                                         6,000                                                             to realize the promise of their investment in communications tech-
                                                                                                                             5,180
                                                                                                                4,880
                                                                                                                                           nologies. The figure on the next page shows how the trend in the
                                                                         5,000
                                                                                    3,812
                                                                                                                                           integration of security applications, coupled with advanced com-
                                                                         4,000                                               +6.2%
                                                                                                                                           munications technology, results in the next-generation electronic
                                                        (USD Millions)




                                                                                                                +28.0%                     security system.
                                                                         3,000                                                             • Situational awareness is a function of contextual information
                                                                                                                                           delivered to decision-makers in a timely manner
                                                                         2,000
                                                                                                                                           • Contextual information is derived from the integration of
                                                                                                                                           previously stand-alone security applications
                                                                         1,000
                                                                                                                                           • Video content is the cornerstone element of contextual information
                                                                            0                                                              • Current security system communications capabilities are not
                                                                                 2006 Actuals              2007 Enacted   2008 Requested   designed to transport large amounts of video traffic, let alone inte-
                                                       Source: President´s fiscal year 08 IT budget, May 2007                              grated video with audio and data traffic




                                                       48 · Ericsson Business Review 3·2007
Leveraging advanced                                                                                   The end game:
 communications
                                                                                                       plug-and-play
                                                                                                       At Miami International,
                                                                                                       there is the potential
        Data management
         and integration                                                                               to someday integrate
                                      Situational        Situational awareness                         fire-detection systems,
                                     awareness                 visualization
          Security policies                                   • Screen updates                         fire alarms and other
                                    updates
                                                             • Virtual presence                        life-saving systems
        Intelligent data fusion                            command and control                         into the network. And
                                                          • Status of state engine
                                                                                                       biometric devices for
                                                  Mission-critical
         Event aggregation                           network                                           fingerprints should be
            /correlation                                                                               relatively simple ad-
                                  Policy-based                                                         ditions to the system.
                     Events       actions
                                                                                                       However, “plug-and-
  Network-attached sensors                                   Actions                                   play” is what security
  • Intelligent video surveillance              • Alerts sent (e-mail, pager, PDA)                     professionals expect from a network of this scope.
     • Access control system                         • Change state of sensors
  • Perimeter detection, seismic                        • Open/close doors                             The network should not have to be redesigned just
          detection, radar                  • Pan/tilt/zoom cameras to event location                  because new technology becomes available.
 • Global positioning information               • Activate additional applications


• Real-time decision-making is based on video-based, contextual           structure? Does it have strong relationships with technology part-
information and real-time communications capability                       ners, including digital video providers, sensor manufacturers and
• A scalable network environment provides room to grow with               access control specialists? Does the vendor have experience in inte-
advancements in security applications                                     grating legacy systems with next-generation applications? Does the
                                                                          vendor have experience in this sector, period?
It is also good for business                                                  As with any complex operation (and as any transportation
And then there’s the enormous promise of mobile communica-                official will tell you), plenty can go wrong in this environment.
tions in this environment: the ability of security and operations         However, when you get communications right, the entire opera-
personnel to access digital video and other critical data on any          tion benefits.
screen, any place, at any time.
   From a business perspective, a converged network can be a
pleasant surprise. Depending on the size of the transportation
operation, converging legacy and next-generation systems into an
advanced communications infrastructure could save millions or
billions of dollars in operating costs.                                   the authors
    Beyond operating efficiencies, agencies such as the Miami-Dade
Aviation Department are generating revenue from their new net-              Shane McClelland (shane.mcclelland@ericsson.com) is responsible for
                                                                            identifying global growth opportunities at Ericsson’s Data Networks and
works. Passenger transportation hubs usually have retail tenants who
                                                                            planning initiatives to win new business in new markets. Before Ericsson, he
need a network for transactional data. By carving out a portion of
                                                                            worked with Marconi, Fore Systems, and as a lieutenant in the US Air Force.
the network that is completely separate from the secure operations
                                                                            McClelland earned his Bachelor of Science in electrical engineering from the
in the airside terminal, an airport can, with very little effort, become
                                                                            University of Denver and his MBA from Southern Illinois University.
a service provider for its shops and restaurants. A port authority with
warehouse and cruise-ship tenants and a train station with adjacent
                                                                            Lori Wirth (lori.wirth@ericsson.com) is a marketing communications special-
retailers are other examples of this business model.
                                                                            ist for Ericsson’s Business Unit Networks. She began her telecommun-
                                                                            ications career in 1998 as a copywriter for Fore Systems, then for Marconi,
How it could all go wrong                                                   and joined Ericsson when the company acquired Marconi in 2006. She
A transportation system that serves the public is arguably one of           holds a Bachelor of Science in public administration and a Bachelor of Arts
the most complex environments to network. Safety and security               in journalism and communications from Point Park University.
are paramount. Safe, affordable transportation for the citizenry is
the remit. It takes an experienced communications partner to help           Bret Park (bret.park@ericsson.com) currently works with portfolio market-
transportation officials (and often their general contractors) create         ing for Ericsson’s Government Solutions unit. He earned his Bachelor of
a safe and secure operation while minimizing the impact on the              Science in mechanical engineering from the University of South Alabama.
smooth flow of people, goods and services through the system.                After graduation, he worked with 3M and ICI Americas before joining Erics-
Asking the right questions could mean avoiding the selection of             son in 1990. Park is completing his MBA from Keller Graduate School of
the wrong communications partner. Does the vendor have in-                  Management, concentrating on finance.
house capabilities to provide an end-to-end fixed and mobile infra-




                                                                                          Ericsson Business Review 3·2007 · 49

Weitere ähnliche Inhalte

Ähnlich wie Networked security has arrived - Ericsson Review

Thinking Highways
Thinking HighwaysThinking Highways
Thinking HighwaysFalascoj
 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management responseJack Brown
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIfEngel
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufikRussell Publishing
 
[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docx[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docxhanneloremccaffery
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s NamMerrileeDelvalle969
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsSITA
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emeaChris Keane
 

Ähnlich wie Networked security has arrived - Ericsson Review (20)

Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docx[removed]REVISED FEBRUARY 19.docx
[removed]REVISED FEBRUARY 19.docx
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
14 june
14 june14 june
14 june
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
 
Nextgen
NextgenNextgen
Nextgen
 

Mehr von Ericsson France

Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...
Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...
Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...Ericsson France
 
2011 Sustainability and Corporate Responsibility report - Ericsson
2011 Sustainability and Corporate Responsibility report - Ericsson2011 Sustainability and Corporate Responsibility report - Ericsson
2011 Sustainability and Corporate Responsibility report - EricssonEricsson France
 
Étude City Life - ConsumerLab Ericsson - Mai 2012
Étude City Life - ConsumerLab Ericsson - Mai 2012Étude City Life - ConsumerLab Ericsson - Mai 2012
Étude City Life - ConsumerLab Ericsson - Mai 2012Ericsson France
 
Ericsson consumer lab identifies what consumers really want from their operators
Ericsson consumer lab identifies what consumers really want from their operatorsEricsson consumer lab identifies what consumers really want from their operators
Ericsson consumer lab identifies what consumers really want from their operatorsEricsson France
 
Communiqué de Presse - Rapport intermédiaire ericsson sur le trafic des données
Communiqué de Presse - Rapport intermédiaire ericsson sur le trafic des donnéesCommuniqué de Presse - Rapport intermédiaire ericsson sur le trafic des données
Communiqué de Presse - Rapport intermédiaire ericsson sur le trafic des donnéesEricsson France
 
How teenagers are using technology in their social lives? - ConsumerLab Ericsson
How teenagers are using technology in their social lives? - ConsumerLab EricssonHow teenagers are using technology in their social lives? - ConsumerLab Ericsson
How teenagers are using technology in their social lives? - ConsumerLab EricssonEricsson France
 
Smart devices make people dependent on cloud services - Michael Björn, head o...
Smart devices make people dependent on cloud services - Michael Björn, head o...Smart devices make people dependent on cloud services - Michael Björn, head o...
Smart devices make people dependent on cloud services - Michael Björn, head o...Ericsson France
 
Leveraging Information and Communication Technology (ICT) for the Base of the...
Leveraging Information and Communication Technology (ICT) for the Base of the...Leveraging Information and Communication Technology (ICT) for the Base of the...
Leveraging Information and Communication Technology (ICT) for the Base of the...Ericsson France
 
Redefining urban life - Ericsson Business Review
Redefining urban life - Ericsson Business ReviewRedefining urban life - Ericsson Business Review
Redefining urban life - Ericsson Business ReviewEricsson France
 
Cloud based OTT Video Services : a business case analysis
Cloud based OTT Video Services : a business case analysisCloud based OTT Video Services : a business case analysis
Cloud based OTT Video Services : a business case analysisEricsson France
 
Sustainability and Corporate Responsibility Report 2010 – Technology for Good
Sustainability and Corporate Responsibility Report 2010 – Technology for GoodSustainability and Corporate Responsibility Report 2010 – Technology for Good
Sustainability and Corporate Responsibility Report 2010 – Technology for GoodEricsson France
 
Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...
Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...
Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...Ericsson France
 
Ericsson white paper - Device connectivity unlocks value
Ericsson white paper - Device connectivity unlocks valueEricsson white paper - Device connectivity unlocks value
Ericsson white paper - Device connectivity unlocks valueEricsson France
 
Présentation des résultats financiers ST Ericsson (Q3 2010)
Présentation des résultats financiers ST Ericsson (Q3 2010)Présentation des résultats financiers ST Ericsson (Q3 2010)
Présentation des résultats financiers ST Ericsson (Q3 2010)Ericsson France
 
Présentation des résultats financiers Sony Ericsson (Q3 2010)
Présentation des résultats financiers Sony Ericsson (Q3 2010)Présentation des résultats financiers Sony Ericsson (Q3 2010)
Présentation des résultats financiers Sony Ericsson (Q3 2010)Ericsson France
 
Tv consumer insights ericsson consumer lab - 2010
Tv consumer insights   ericsson consumer lab - 2010Tv consumer insights   ericsson consumer lab - 2010
Tv consumer insights ericsson consumer lab - 2010Ericsson France
 
Présentation des résultats financiers ST Ericsson (Q2 2010)
  Présentation des résultats financiers ST Ericsson (Q2 2010)  Présentation des résultats financiers ST Ericsson (Q2 2010)
Présentation des résultats financiers ST Ericsson (Q2 2010)Ericsson France
 
Présentation des résultats financiers Sony Ericsson (Q2 2010)
  Présentation des résultats financiers Sony Ericsson (Q2 2010)  Présentation des résultats financiers Sony Ericsson (Q2 2010)
Présentation des résultats financiers Sony Ericsson (Q2 2010)Ericsson France
 
Roadshow Ericsson 2010 : introduction d'Olivier Cimelière
Roadshow Ericsson 2010 : introduction d'Olivier CimelièreRoadshow Ericsson 2010 : introduction d'Olivier Cimelière
Roadshow Ericsson 2010 : introduction d'Olivier CimelièreEricsson France
 
Ericsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and DiagnosingEricsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and DiagnosingEricsson France
 

Mehr von Ericsson France (20)

Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...
Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...
Traffic and Market Report – On the Pulse of the Networked Society - Ericsson ...
 
2011 Sustainability and Corporate Responsibility report - Ericsson
2011 Sustainability and Corporate Responsibility report - Ericsson2011 Sustainability and Corporate Responsibility report - Ericsson
2011 Sustainability and Corporate Responsibility report - Ericsson
 
Étude City Life - ConsumerLab Ericsson - Mai 2012
Étude City Life - ConsumerLab Ericsson - Mai 2012Étude City Life - ConsumerLab Ericsson - Mai 2012
Étude City Life - ConsumerLab Ericsson - Mai 2012
 
Ericsson consumer lab identifies what consumers really want from their operators
Ericsson consumer lab identifies what consumers really want from their operatorsEricsson consumer lab identifies what consumers really want from their operators
Ericsson consumer lab identifies what consumers really want from their operators
 
Communiqué de Presse - Rapport intermédiaire ericsson sur le trafic des données
Communiqué de Presse - Rapport intermédiaire ericsson sur le trafic des donnéesCommuniqué de Presse - Rapport intermédiaire ericsson sur le trafic des données
Communiqué de Presse - Rapport intermédiaire ericsson sur le trafic des données
 
How teenagers are using technology in their social lives? - ConsumerLab Ericsson
How teenagers are using technology in their social lives? - ConsumerLab EricssonHow teenagers are using technology in their social lives? - ConsumerLab Ericsson
How teenagers are using technology in their social lives? - ConsumerLab Ericsson
 
Smart devices make people dependent on cloud services - Michael Björn, head o...
Smart devices make people dependent on cloud services - Michael Björn, head o...Smart devices make people dependent on cloud services - Michael Björn, head o...
Smart devices make people dependent on cloud services - Michael Björn, head o...
 
Leveraging Information and Communication Technology (ICT) for the Base of the...
Leveraging Information and Communication Technology (ICT) for the Base of the...Leveraging Information and Communication Technology (ICT) for the Base of the...
Leveraging Information and Communication Technology (ICT) for the Base of the...
 
Redefining urban life - Ericsson Business Review
Redefining urban life - Ericsson Business ReviewRedefining urban life - Ericsson Business Review
Redefining urban life - Ericsson Business Review
 
Cloud based OTT Video Services : a business case analysis
Cloud based OTT Video Services : a business case analysisCloud based OTT Video Services : a business case analysis
Cloud based OTT Video Services : a business case analysis
 
Sustainability and Corporate Responsibility Report 2010 – Technology for Good
Sustainability and Corporate Responsibility Report 2010 – Technology for GoodSustainability and Corporate Responsibility Report 2010 – Technology for Good
Sustainability and Corporate Responsibility Report 2010 – Technology for Good
 
Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...
Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...
Internet très haut débit mobile : Monaco Telecom lance un pilote 4G LTE avec ...
 
Ericsson white paper - Device connectivity unlocks value
Ericsson white paper - Device connectivity unlocks valueEricsson white paper - Device connectivity unlocks value
Ericsson white paper - Device connectivity unlocks value
 
Présentation des résultats financiers ST Ericsson (Q3 2010)
Présentation des résultats financiers ST Ericsson (Q3 2010)Présentation des résultats financiers ST Ericsson (Q3 2010)
Présentation des résultats financiers ST Ericsson (Q3 2010)
 
Présentation des résultats financiers Sony Ericsson (Q3 2010)
Présentation des résultats financiers Sony Ericsson (Q3 2010)Présentation des résultats financiers Sony Ericsson (Q3 2010)
Présentation des résultats financiers Sony Ericsson (Q3 2010)
 
Tv consumer insights ericsson consumer lab - 2010
Tv consumer insights   ericsson consumer lab - 2010Tv consumer insights   ericsson consumer lab - 2010
Tv consumer insights ericsson consumer lab - 2010
 
Présentation des résultats financiers ST Ericsson (Q2 2010)
  Présentation des résultats financiers ST Ericsson (Q2 2010)  Présentation des résultats financiers ST Ericsson (Q2 2010)
Présentation des résultats financiers ST Ericsson (Q2 2010)
 
Présentation des résultats financiers Sony Ericsson (Q2 2010)
  Présentation des résultats financiers Sony Ericsson (Q2 2010)  Présentation des résultats financiers Sony Ericsson (Q2 2010)
Présentation des résultats financiers Sony Ericsson (Q2 2010)
 
Roadshow Ericsson 2010 : introduction d'Olivier Cimelière
Roadshow Ericsson 2010 : introduction d'Olivier CimelièreRoadshow Ericsson 2010 : introduction d'Olivier Cimelière
Roadshow Ericsson 2010 : introduction d'Olivier Cimelière
 
Ericsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and DiagnosingEricsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and Diagnosing
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Networked security has arrived - Ericsson Review

  • 1. Shane McClelland, Lori Wirth and Bret Park on how secure transportation makes business sense Networked security has arrived – a real departure from stovepiped systems Transportation agencies around the world are using advanced communications capabilities to improve operating efficiencies, enhance safety and security, and contribute to a better experience for passengers. BEFORE HIS RECENT RETIREMENT, Mark Forare, the assistant course shops and restaurants, and scalable enough to accom- director of security for the Miami-Dade Aviation Department, modate the sensors and biometric applications that the airport reminisced with Ericsson about how it felt to take on security and federal government are testing. What’s more, the entire opera- responsibilities at Miami International Airport shortly after the tion is monitored and managed from centrally located security- terrorist attacks of September 11, 2001. officer workstations. Forare was a Miami-Dade Police Department (MDPD) lieuten- It is an entirely New Security System. And it’s “tightly pulled ant, a critical incident response expert and liaison with the US together and something we’re proud of,” Forare said, smiling, as he Federal Aviation Administration. With that experience behind left the system to his able successor and headed off to relax in the him, it wasn’t what he didn’t know about his new Aviation Depart- Florida sunshine. ment job that kept him up at night. He knew all too well that he was stepping into a security operation tasked with the safety of Secure communications: keeping you moving more than 30 million passengers traveling through the airport Like Miami International, many transportation facilities around every year. the world are undergoing major overhauls. Billions of dollars are He also knew he would be responsible for completing the invested annually to modernize current transportation hubs or “New Security System,” a project with a name that was innocuous build new transportation capacity for economic development and and ambitious at the same time. Part of the airport’s USD 5.2 billion to enhance business and commuter travel, as well as tourism. capital improvement program, the New Security System was In addition to the capital improvement efforts, transportation planned prior to 9/11, and underscored after the terrorist attacks officials responsible for the smooth, daily operation of airports, occurred. Among the objectives: increase passenger and personnel public transit systems, roadways and seaports face growing eco- safety, increase surveillance capacity, and reduce overall incident nomic and environmental challenges. The costs of operating and response time. maintaining modern, efficient transportation systems are rising. Forare told Ericsson that given the circumstances – taking on Increasing fuel costs, stricter environmental regulations and higher a high-profile position at a major transportation operation with demands on capital improvements coupled with downward pric- the assignment of building a system that was “new” and “secure” ing pressure – all place stress on the transportation industry. – he couldn’t shake the thought that this New Security System was If these challenges are not complex enough, government- going to be one of those projects where he spent his time trying to mandated security requirements add to the stress. get his contractor, subcontractors and internal departments to play To take on these challenges, transportation officials must con- in the same sandbox. In other words, he dreaded the chaos he was tinually find ways to enhance safety and security, improve operat- sure would ensue. ing efficiencies and contribute to a better experience for passengers. However his story has a better ending than you might suspect. What they’re realizing is that voice, video and data communica- Today, Miami International Airport has an access control and tions, racing in real time through a converged fixed-mobile net- alarm system that secures more than 1,000 points of entry, as well work, can improve all of the above. as a video surveillance system that is synchronized with two-way, It takes a leap of faith to upgrade a communications network simultaneously transmitted audio intercoms. All this data travels for a transportation operation that probably runs non-stop or close in real time over a converged communications network that is to it. But improve it we must. Unfortunately, that’s one of the flexible enough to support transactional information from con- lessons learned since global terrorists chose the transportation 46 · Ericsson Business Review 3·2007
  • 2. Ericsson Business Review 3·2007 · 47
  • 3. ...Networked security has arrived Shane McClelland, Lori Wirth and Bret Park on how secure transportation makes business sense industry as a target. Most governments stipulate that transport- The good news is that a converged communications network can ation authorities must develop comprehensive security plans accommodate or enable these systems, as well as the voice, data that include: and administrative traffic that is typical of any business operation. • facility protection systems Even better from a return-on-investment perspective, the right • perimeter security systems converged communications network may even accommodate • redundant critical operations and control systems legacy systems that operate just fine today. At Miami International, • chemical, biological, radiological, explosive detection systems; the thinking behind the New Security System was to use as many • video surveillance equipment legacy analog CCTV cameras as possible, provide an open architec- • communications equipment ture to allow for new technologies to be added to the system, and • emergency response equipment reduce the number of separate IT networks (and administrat- • fire-suppression and decontamination equipment ive and maintenance functions) that it took to operate stand- • global positioning or automated vehicle-locator systems alone systems. • evacuation improvements. What Ericsson has discovered is that formerly stovepiped sys- tems often need a new infrastructure to give them new life. An A clear picture of the entire operation example is a major metropolitan transit authority that still uses the Most transportation authorities look beyond the mandates for same magnetic system it used in the 1950s to monitor headway even more sophisticated answers: systems that can deactivate wire- spacing and telemetry. The transport authority uses the system less devices identified as threats, biometrics for smart access and because it still works. The difference is that the telemetry data now applications that trigger system-wide lockdowns during threats. runs over the same network that supports digital video feeds for security and surveillance. As a result, the transit authority’s command center (which Getting there receives, monitors and acts upon all this information) has a clearer picture of the entire operation, which leads to enhanced situational There are four major steps to improving your security awareness, improved security and the potential for fewer delays for operation. And no single company does all of it. A passengers – all because central command connects the dots more communications provider such as Ericsson is typi- quickly to determine that something’s not quite right on the com- cally involved in steps three and four, and works with muter train. your security team or partners for steps one and two. 1. Risk and threat assessment A converged network is a breakthrough for security 2. Site survey and security system design 3. Communications system design Security professionals are continuously striving for better situa- 4. Installation, technical assistance, and staff training tional awareness; they need to know what’s going on in their envi- (on-site maintenance and operations where desired). ronment in order to accomplish their mission. Situational aware- ness is derived from contextual information delivered in a timely fashion. For years, each major electronic security system in opera- tion has provided a piece of the overall situational picture. This requires security professionals to assimilate multiple informa- tional inputs from a variety of sources, before developing a response decision. By taking advantage of advanced technologies, security profes- sionals can automatically integrate the information from a variety Homeland Security IT budgets on the rise of sec-urity systems, and then couple it with real-time capabilities 6,000 to realize the promise of their investment in communications tech- 5,180 4,880 nologies. The figure on the next page shows how the trend in the 5,000 3,812 integration of security applications, coupled with advanced com- 4,000 +6.2% munications technology, results in the next-generation electronic (USD Millions) +28.0% security system. 3,000 • Situational awareness is a function of contextual information delivered to decision-makers in a timely manner 2,000 • Contextual information is derived from the integration of previously stand-alone security applications 1,000 • Video content is the cornerstone element of contextual information 0 • Current security system communications capabilities are not 2006 Actuals 2007 Enacted 2008 Requested designed to transport large amounts of video traffic, let alone inte- Source: President´s fiscal year 08 IT budget, May 2007 grated video with audio and data traffic 48 · Ericsson Business Review 3·2007
  • 4. Leveraging advanced The end game: communications plug-and-play At Miami International, there is the potential Data management and integration to someday integrate Situational Situational awareness fire-detection systems, awareness visualization Security policies • Screen updates fire alarms and other updates • Virtual presence life-saving systems Intelligent data fusion command and control into the network. And • Status of state engine biometric devices for Mission-critical Event aggregation network fingerprints should be /correlation relatively simple ad- Policy-based ditions to the system. Events actions However, “plug-and- Network-attached sensors Actions play” is what security • Intelligent video surveillance • Alerts sent (e-mail, pager, PDA) professionals expect from a network of this scope. • Access control system • Change state of sensors • Perimeter detection, seismic • Open/close doors The network should not have to be redesigned just detection, radar • Pan/tilt/zoom cameras to event location because new technology becomes available. • Global positioning information • Activate additional applications • Real-time decision-making is based on video-based, contextual structure? Does it have strong relationships with technology part- information and real-time communications capability ners, including digital video providers, sensor manufacturers and • A scalable network environment provides room to grow with access control specialists? Does the vendor have experience in inte- advancements in security applications grating legacy systems with next-generation applications? Does the vendor have experience in this sector, period? It is also good for business As with any complex operation (and as any transportation And then there’s the enormous promise of mobile communica- official will tell you), plenty can go wrong in this environment. tions in this environment: the ability of security and operations However, when you get communications right, the entire opera- personnel to access digital video and other critical data on any tion benefits. screen, any place, at any time. From a business perspective, a converged network can be a pleasant surprise. Depending on the size of the transportation operation, converging legacy and next-generation systems into an advanced communications infrastructure could save millions or billions of dollars in operating costs. the authors Beyond operating efficiencies, agencies such as the Miami-Dade Aviation Department are generating revenue from their new net- Shane McClelland (shane.mcclelland@ericsson.com) is responsible for identifying global growth opportunities at Ericsson’s Data Networks and works. Passenger transportation hubs usually have retail tenants who planning initiatives to win new business in new markets. Before Ericsson, he need a network for transactional data. By carving out a portion of worked with Marconi, Fore Systems, and as a lieutenant in the US Air Force. the network that is completely separate from the secure operations McClelland earned his Bachelor of Science in electrical engineering from the in the airside terminal, an airport can, with very little effort, become University of Denver and his MBA from Southern Illinois University. a service provider for its shops and restaurants. A port authority with warehouse and cruise-ship tenants and a train station with adjacent Lori Wirth (lori.wirth@ericsson.com) is a marketing communications special- retailers are other examples of this business model. ist for Ericsson’s Business Unit Networks. She began her telecommun- ications career in 1998 as a copywriter for Fore Systems, then for Marconi, How it could all go wrong and joined Ericsson when the company acquired Marconi in 2006. She A transportation system that serves the public is arguably one of holds a Bachelor of Science in public administration and a Bachelor of Arts the most complex environments to network. Safety and security in journalism and communications from Point Park University. are paramount. Safe, affordable transportation for the citizenry is the remit. It takes an experienced communications partner to help Bret Park (bret.park@ericsson.com) currently works with portfolio market- transportation officials (and often their general contractors) create ing for Ericsson’s Government Solutions unit. He earned his Bachelor of a safe and secure operation while minimizing the impact on the Science in mechanical engineering from the University of South Alabama. smooth flow of people, goods and services through the system. After graduation, he worked with 3M and ICI Americas before joining Erics- Asking the right questions could mean avoiding the selection of son in 1990. Park is completing his MBA from Keller Graduate School of the wrong communications partner. Does the vendor have in- Management, concentrating on finance. house capabilities to provide an end-to-end fixed and mobile infra- Ericsson Business Review 3·2007 · 49