SlideShare a Scribd company logo
1 of 25
Download to read offline
Aviation Security and
the Active Shooter
Exploring Gunshot Detection Technology
Our Business Model:
• Service-based provider
• Expertise in complex, enterprise-wide solutions
• Provide customers’ choice of products & services
• Global reach, local service
Convergint is a global, service-based systems integrator
with more than 75 locations and over 2,500 colleagues
Our Goal: To make a daily difference for our customers
by being their best service provider
Convergint Technologies
Electronic
Security
Fire Alarm
& Life Safety
Mass
Notification
Building
Automation
Healthcare
Technologies
Communications
Services
VANCOUVER
FT. MCMURRAY
EDMONTON
CALGARY
LLOYDMINSTER
OTTAWA
REGINALETHBRIDGE
LOS ANGELES
SAN FRANCISCO
PORTLAND
SEATTLE
DENVER
EUGENE
AUSTIN
HOUSTON
DALLAS
NEW
ORLEANS
SAN
ANTONIO
TULSA
OK CITY
ST. LOUIS
WICHITA
MINNEAPOLIS
DETROIT
ATLANTA
JACKSONVILLE
NASHVILLE
NEWPORT NEWS
RICHMOND
DC
BOSTON
CORNING
TAMPA
MIAMI
ORLANDO
BAKERSFIELD
CHICAGO
PHOENIX
SIOUX FALLS
CONVERGINT OFFICE
CONVERGINT CONNECT PARTNER
CHARLESTON
RALEIGH
GREENVILLE
CHARLOTTE
NEW YORK
EDISON
SUFFERN
PHILADELPHIA
DES MOINES
TORONTO
MISSISSAUGA
BRANTFORD
WINDSOR
PEORIA
CLEVELAND
COLUMBUS
CINCINNATI
MOORESVILLE
North American Coverage
Our Values & Beliefs are not just words on a page,
but the very fabric of Convergint culture
Consistent
Leadership &
Direction
Culture of
Service &
Accountability
It All Begins
With the Right
People
Continuous
Improvement
& Giving Back
Unchanged
Since Our
Formation
Provide a
Business
Compass
Values & Beliefs
Tailored solutions
to meet customer
needs
$7 million per
year on colleague
training
Goal to be the
best service
provider
Dedicated to
delivering
results
Colleagues Culture Choice Certifications
Service Excellence
Membership in ACI-NA & AAAE, and Safe Skies partner
Industry-leading, aviation-centric service software
Specializes in complex solutions such as identity management,
event management, mass notification, & more
Convergint understands the aviation
environment in both airports and
their airline clients
30 airports 5 air carriers
Convergint & Aviation
Strategic partner with experience in technology
Low false alarm rate means reliability for client
Simple integration for standalone or platform-based
1
2
3
Why We Chose Shooter Detection Systems
Provide time & information to client
Leverage existing systems
Create a fully integrated system
Address high vulnerability areas
that the airport identifies
Goals of the Project
Deployment Strategy
• Use new construction as a starting point
• Consider Security Identification Display Area and sterile access to be unsterile
Every airport faces different risk
Device location planning
Open layout for deployment
Wheel and spoke deployment
• An Active Shooter is an individual actively engaged in killing or
attempting to kill people in a confined and populated area
• In most cases, there is no pattern or method to victim selection
• Active shooter situations are unpredictable and evolve quickly
• Typically, the immediate deployment of law enforcement is
required to stop the shooting and mitigate harm to victims
• Because active shooter situations are often over within 10 to 15
minutes, individuals must be prepared both mentally and
physically to deal with an active shooter situation.
The Active Shooter Profile
• Incidents in the U.S. are rising
dramatically each year
• Threat is to people in everyday
environments: At school, at work, in
malls, at sporting events, in a night
club
• Schools and businesses implement
Emergency Action Plans specific to
the Active Shooter
• Average citizens trained in “Run-Hide-
Fight” – includes recognizing the
sound of gunshots
A Rising Threat That Can Happen Anywhere
2014 and 2015 showed the highest Active Shooter Incidents ever in a two-
year period, according to a June 2016 update to the FBI’s landmark study
findings. These statistics were released following the worst mass shooting in
American history at an Orlando night club on June 12, 2016.
Statistics: Incidents on the Rise
DECREASE RESPONSE TIME
DECREASE INCIDENT DURATION
DECREASE LOSS OF LIFE
In an Active Shooter Incident, Every Second Counts
• 4-6 minutes: Average delay to dial 911
• 12.5 Minutes: Average duration of an active shooter incident
• 18 Minutes: Average response time of emergency response/law
enforcement
In Columbine, the first reliable 911 call
stating shots were fired occurred 6 minutes
after the first shot. In those first 6 minutes
12 students and faculty had already been
killed or wounded.
SDS Technology is the Missing Piece
Response Time
INFORMATION: A Critical Component in Active Shooter Response
WHAT is it? Loud Noise vs. Gunshot
WHEN was the first shot? Timeline
WHERE is the shooter? Location/Movement
WHO is the shooter? Visual Description
• Building occupants need information to
make the best decision to help themselves
– Do I run, hide or fight?
• Law Enforcement needs actionable
intelligence to isolate, contain and mitigate
the threat
Accurate information helps determine the best
course of action, for both occupants and First
Responders.
The Need for Actionable Intelligence
• $45 Million of Research and Development Investment
• $350 Million in Systems Deployed Worldwide
• Lowest False Alarm Rate in the Industry, over 12,000 Systems in Use
The Evolution of Superior Gunshot Detection
SDS History & Experience
Dual Factor Authentication
• Microphones listen for weapon muzzle blast
• IR sensors look for muzzle flash signatures
• The Guardian Sensor validates an Acoustic
Bang by also looking for an Infrared Flash
The Guardian Sensor validates an Acoustic Bang
by also looking for an Infrared Flash.
Key Features
• Immediate and accurate alerting – <1 second
• ZERO False alerts
• Provides shot location and tracks history and
movement of shots
• Easy integration into existing security
technologies such as Access Control, Video
Surveillance, Mass Notification, Mobile
Applications, Alarm Panels, etc.
Guardian Indoors Shooter Detection: Guardian Sensor
The Guardian Sensor
blends easily into any
facility design.
Sensor Design
Major Metro City
Major Software Companies &
Fortune 500 Corporations
Department of Homeland
Security
Air Force Research Laboratory
European Police DepartmentInternational Airports
The Guardian system has a 100% detection rate
with ZERO FALSE ALERTS in every test and environment.
Independent Testing
SDS has 14 million hours of installed time
in real-world environments
with ZERO FALSE ALERTS.
Guardian Indoor Shooter Detection Installations
SDS Gateway
Software
Standard Network Diagram
• Guardian instantly sends communication alerts
via digital floor plan map, text message and e-
mail with time and location of each gunshot
incident.
• With the addition of systems integration,
Guardian communicates with additional
notification pathways such as access control,
alarm panels, video management, mass
notification, digital radios, and mobile
application technologies.
User Interface & Security Systems Integration
Technology Integrations
LIVE FIRE DEMONSTRATION
Gunshot Detection
and Security Systems Integration
Product Demonstration
For More Information…
Contact
Matt Powell
matt.powell@convergint.com
404-804-2617

More Related Content

What's hot

Protecting the manufacturing industry
Protecting the manufacturing industryProtecting the manufacturing industry
Protecting the manufacturing industryCybereason
 
Protecting the healthcare industry
Protecting the healthcare industryProtecting the healthcare industry
Protecting the healthcare industryCybereason
 
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan LacksThe Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan LacksCybereason
 
The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?Cybereason
 
Security Intelligence for Energy Control Systems
Security Intelligence for Energy Control SystemsSecurity Intelligence for Energy Control Systems
Security Intelligence for Energy Control SystemsQ1 Labs
 
Threat Intelligence Victory Garden
Threat Intelligence Victory GardenThreat Intelligence Victory Garden
Threat Intelligence Victory GardenRyan Kovar
 
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders LeagueThreat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders LeagueAvkash Kathiriya
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Video Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxVideo Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxTechnomine
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsRoger Johnston
 
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareWhen Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareMarcoTechnologies
 

What's hot (16)

Protecting the manufacturing industry
Protecting the manufacturing industryProtecting the manufacturing industry
Protecting the manufacturing industry
 
Protecting the healthcare industry
Protecting the healthcare industryProtecting the healthcare industry
Protecting the healthcare industry
 
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan LacksThe Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
 
The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?
 
Security Intelligence for Energy Control Systems
Security Intelligence for Energy Control SystemsSecurity Intelligence for Energy Control Systems
Security Intelligence for Energy Control Systems
 
TSCM-June15
TSCM-June15TSCM-June15
TSCM-June15
 
The Bug Sweepers TSCM Guide
The Bug Sweepers TSCM GuideThe Bug Sweepers TSCM Guide
The Bug Sweepers TSCM Guide
 
Threat Intelligence Victory Garden
Threat Intelligence Victory GardenThreat Intelligence Victory Garden
Threat Intelligence Victory Garden
 
2015 ERII-CCISM
2015 ERII-CCISM2015 ERII-CCISM
2015 ERII-CCISM
 
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders LeagueThreat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Video Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxVideo Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptx
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Analogic Opsec 101
Analogic Opsec 101Analogic Opsec 101
Analogic Opsec 101
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareWhen Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
 

Viewers also liked

The future of Hotel
The future of HotelThe future of Hotel
The future of Hoteljjohyejin
 
Active shooter presentation
Active shooter presentationActive shooter presentation
Active shooter presentationKristy Paine
 
MULTI FACETED ATTACK AND SECURITY RESPONSE
MULTI FACETED ATTACK AND SECURITY RESPONSEMULTI FACETED ATTACK AND SECURITY RESPONSE
MULTI FACETED ATTACK AND SECURITY RESPONSEStephen Kasomphe
 
Department of Homeland Security Resources on Active Shooter Prevention
Department of Homeland Security Resources on Active Shooter PreventionDepartment of Homeland Security Resources on Active Shooter Prevention
Department of Homeland Security Resources on Active Shooter PreventionChris Grollnek
 
Active-Shooter Incidents in the U.S. between 2000 and 2013
Active-Shooter Incidents in the U.S. between 2000 and 2013Active-Shooter Incidents in the U.S. between 2000 and 2013
Active-Shooter Incidents in the U.S. between 2000 and 2013Chris Grollnek
 
Active Shooter Situations in the Workplace
Active Shooter Situations in the WorkplaceActive Shooter Situations in the Workplace
Active Shooter Situations in the WorkplaceHuman Capital Media
 
Leben im Rhythmus in Brasilien
Leben im Rhythmus in BrasilienLeben im Rhythmus in Brasilien
Leben im Rhythmus in Brasilienheadliner_school
 
An Overview of Acumatica Version 4.2
An Overview of Acumatica Version 4.2An Overview of Acumatica Version 4.2
An Overview of Acumatica Version 4.2Gabriel Michaud
 
Grupo amor richard orientacion familiar final
Grupo amor  richard orientacion familiar finalGrupo amor  richard orientacion familiar final
Grupo amor richard orientacion familiar finalelkokerichar
 
Surviving an active shooter 2
Surviving an active shooter 2Surviving an active shooter 2
Surviving an active shooter 2Donielle Haynes
 
Active Shooter Preparedness Survey: Key Findings & Best Practices
Active Shooter Preparedness Survey: Key Findings & Best PracticesActive Shooter Preparedness Survey: Key Findings & Best Practices
Active Shooter Preparedness Survey: Key Findings & Best PracticesWilliam Penfield
 
Eine Tür geht zu, eine andere geht auf /wenling
Eine Tür geht zu,  eine andere geht auf /wenlingEine Tür geht zu,  eine andere geht auf /wenling
Eine Tür geht zu, eine andere geht auf /wenlingheadliner_school
 
Active Shooter Awareness Virtual Roundtable
Active Shooter Awareness Virtual RoundtableActive Shooter Awareness Virtual Roundtable
Active Shooter Awareness Virtual RoundtableBen Davila
 
A Guide to Investing in Student Property in Sheffield 2015 – Aspen Woolf
A Guide to Investing in Student Property in Sheffield 2015 – Aspen WoolfA Guide to Investing in Student Property in Sheffield 2015 – Aspen Woolf
A Guide to Investing in Student Property in Sheffield 2015 – Aspen WoolfAspen Woolf
 

Viewers also liked (19)

The future of Hotel
The future of HotelThe future of Hotel
The future of Hotel
 
Active shooter presentation
Active shooter presentationActive shooter presentation
Active shooter presentation
 
MULTI FACETED ATTACK AND SECURITY RESPONSE
MULTI FACETED ATTACK AND SECURITY RESPONSEMULTI FACETED ATTACK AND SECURITY RESPONSE
MULTI FACETED ATTACK AND SECURITY RESPONSE
 
Department of Homeland Security Resources on Active Shooter Prevention
Department of Homeland Security Resources on Active Shooter PreventionDepartment of Homeland Security Resources on Active Shooter Prevention
Department of Homeland Security Resources on Active Shooter Prevention
 
Active-Shooter Incidents in the U.S. between 2000 and 2013
Active-Shooter Incidents in the U.S. between 2000 and 2013Active-Shooter Incidents in the U.S. between 2000 and 2013
Active-Shooter Incidents in the U.S. between 2000 and 2013
 
Active Shooter Situations in the Workplace
Active Shooter Situations in the WorkplaceActive Shooter Situations in the Workplace
Active Shooter Situations in the Workplace
 
Pmi innovative gc
Pmi innovative  gcPmi innovative  gc
Pmi innovative gc
 
Leben im Rhythmus in Brasilien
Leben im Rhythmus in BrasilienLeben im Rhythmus in Brasilien
Leben im Rhythmus in Brasilien
 
An Overview of Acumatica Version 4.2
An Overview of Acumatica Version 4.2An Overview of Acumatica Version 4.2
An Overview of Acumatica Version 4.2
 
Coding
CodingCoding
Coding
 
Grupo amor richard orientacion familiar final
Grupo amor  richard orientacion familiar finalGrupo amor  richard orientacion familiar final
Grupo amor richard orientacion familiar final
 
Guidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter EventGuidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter Event
 
Beyond Active Shooter
Beyond Active ShooterBeyond Active Shooter
Beyond Active Shooter
 
Surviving an active shooter 2
Surviving an active shooter 2Surviving an active shooter 2
Surviving an active shooter 2
 
Active Shooter Preparedness Survey: Key Findings & Best Practices
Active Shooter Preparedness Survey: Key Findings & Best PracticesActive Shooter Preparedness Survey: Key Findings & Best Practices
Active Shooter Preparedness Survey: Key Findings & Best Practices
 
Eine Tür geht zu, eine andere geht auf /wenling
Eine Tür geht zu,  eine andere geht auf /wenlingEine Tür geht zu,  eine andere geht auf /wenling
Eine Tür geht zu, eine andere geht auf /wenling
 
RuBI Rasa Bima #2
RuBI Rasa Bima #2RuBI Rasa Bima #2
RuBI Rasa Bima #2
 
Active Shooter Awareness Virtual Roundtable
Active Shooter Awareness Virtual RoundtableActive Shooter Awareness Virtual Roundtable
Active Shooter Awareness Virtual Roundtable
 
A Guide to Investing in Student Property in Sheffield 2015 – Aspen Woolf
A Guide to Investing in Student Property in Sheffield 2015 – Aspen WoolfA Guide to Investing in Student Property in Sheffield 2015 – Aspen Woolf
A Guide to Investing in Student Property in Sheffield 2015 – Aspen Woolf
 

Similar to Aviation Security and the Active Shooter

Gunshot detection sheet
Gunshot detection sheetGunshot detection sheet
Gunshot detection sheetJeremyGarcia46
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Health and Safety Apps 2017
Health and Safety Apps 2017Health and Safety Apps 2017
Health and Safety Apps 2017John Newquist
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Xerxes Oosthuizen
 
Defentect cbrn threat_detection system
Defentect cbrn threat_detection systemDefentect cbrn threat_detection system
Defentect cbrn threat_detection systemSandeep Kumar
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2DroneSec
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property ProtectionQuality CCTV
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSolarWinds
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsJoshua Berman
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
FUTURE JANUARY2012ppt
FUTURE JANUARY2012pptFUTURE JANUARY2012ppt
FUTURE JANUARY2012pptstone Johnson
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutionskoottummel
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghNapier University
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 

Similar to Aviation Security and the Active Shooter (20)

Gunshot detection sheet
Gunshot detection sheetGunshot detection sheet
Gunshot detection sheet
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Health and Safety Apps 2017
Health and Safety Apps 2017Health and Safety Apps 2017
Health and Safety Apps 2017
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)
 
Defentect cbrn threat_detection system
Defentect cbrn threat_detection systemDefentect cbrn threat_detection system
Defentect cbrn threat_detection system
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property Protection
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
APT Event - New York
APT Event - New YorkAPT Event - New York
APT Event - New York
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
FUTURE JANUARY2012ppt
FUTURE JANUARY2012pptFUTURE JANUARY2012ppt
FUTURE JANUARY2012ppt
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutions
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
"Navigate the MDR Marketplace Like a Pro!"
 "Navigate the MDR Marketplace Like a Pro!" "Navigate the MDR Marketplace Like a Pro!"
"Navigate the MDR Marketplace Like a Pro!"
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 

Recently uploaded

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Aviation Security and the Active Shooter

  • 1. Aviation Security and the Active Shooter Exploring Gunshot Detection Technology
  • 2. Our Business Model: • Service-based provider • Expertise in complex, enterprise-wide solutions • Provide customers’ choice of products & services • Global reach, local service Convergint is a global, service-based systems integrator with more than 75 locations and over 2,500 colleagues Our Goal: To make a daily difference for our customers by being their best service provider Convergint Technologies
  • 3. Electronic Security Fire Alarm & Life Safety Mass Notification Building Automation Healthcare Technologies Communications Services
  • 4. VANCOUVER FT. MCMURRAY EDMONTON CALGARY LLOYDMINSTER OTTAWA REGINALETHBRIDGE LOS ANGELES SAN FRANCISCO PORTLAND SEATTLE DENVER EUGENE AUSTIN HOUSTON DALLAS NEW ORLEANS SAN ANTONIO TULSA OK CITY ST. LOUIS WICHITA MINNEAPOLIS DETROIT ATLANTA JACKSONVILLE NASHVILLE NEWPORT NEWS RICHMOND DC BOSTON CORNING TAMPA MIAMI ORLANDO BAKERSFIELD CHICAGO PHOENIX SIOUX FALLS CONVERGINT OFFICE CONVERGINT CONNECT PARTNER CHARLESTON RALEIGH GREENVILLE CHARLOTTE NEW YORK EDISON SUFFERN PHILADELPHIA DES MOINES TORONTO MISSISSAUGA BRANTFORD WINDSOR PEORIA CLEVELAND COLUMBUS CINCINNATI MOORESVILLE North American Coverage
  • 5. Our Values & Beliefs are not just words on a page, but the very fabric of Convergint culture Consistent Leadership & Direction Culture of Service & Accountability It All Begins With the Right People Continuous Improvement & Giving Back Unchanged Since Our Formation Provide a Business Compass Values & Beliefs
  • 6. Tailored solutions to meet customer needs $7 million per year on colleague training Goal to be the best service provider Dedicated to delivering results Colleagues Culture Choice Certifications Service Excellence
  • 7. Membership in ACI-NA & AAAE, and Safe Skies partner Industry-leading, aviation-centric service software Specializes in complex solutions such as identity management, event management, mass notification, & more Convergint understands the aviation environment in both airports and their airline clients 30 airports 5 air carriers Convergint & Aviation
  • 8. Strategic partner with experience in technology Low false alarm rate means reliability for client Simple integration for standalone or platform-based 1 2 3 Why We Chose Shooter Detection Systems
  • 9. Provide time & information to client Leverage existing systems Create a fully integrated system Address high vulnerability areas that the airport identifies Goals of the Project
  • 10. Deployment Strategy • Use new construction as a starting point • Consider Security Identification Display Area and sterile access to be unsterile Every airport faces different risk Device location planning Open layout for deployment Wheel and spoke deployment
  • 11. • An Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area • In most cases, there is no pattern or method to victim selection • Active shooter situations are unpredictable and evolve quickly • Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims • Because active shooter situations are often over within 10 to 15 minutes, individuals must be prepared both mentally and physically to deal with an active shooter situation. The Active Shooter Profile
  • 12. • Incidents in the U.S. are rising dramatically each year • Threat is to people in everyday environments: At school, at work, in malls, at sporting events, in a night club • Schools and businesses implement Emergency Action Plans specific to the Active Shooter • Average citizens trained in “Run-Hide- Fight” – includes recognizing the sound of gunshots A Rising Threat That Can Happen Anywhere 2014 and 2015 showed the highest Active Shooter Incidents ever in a two- year period, according to a June 2016 update to the FBI’s landmark study findings. These statistics were released following the worst mass shooting in American history at an Orlando night club on June 12, 2016. Statistics: Incidents on the Rise
  • 13. DECREASE RESPONSE TIME DECREASE INCIDENT DURATION DECREASE LOSS OF LIFE In an Active Shooter Incident, Every Second Counts • 4-6 minutes: Average delay to dial 911 • 12.5 Minutes: Average duration of an active shooter incident • 18 Minutes: Average response time of emergency response/law enforcement In Columbine, the first reliable 911 call stating shots were fired occurred 6 minutes after the first shot. In those first 6 minutes 12 students and faculty had already been killed or wounded. SDS Technology is the Missing Piece Response Time
  • 14. INFORMATION: A Critical Component in Active Shooter Response WHAT is it? Loud Noise vs. Gunshot WHEN was the first shot? Timeline WHERE is the shooter? Location/Movement WHO is the shooter? Visual Description • Building occupants need information to make the best decision to help themselves – Do I run, hide or fight? • Law Enforcement needs actionable intelligence to isolate, contain and mitigate the threat Accurate information helps determine the best course of action, for both occupants and First Responders. The Need for Actionable Intelligence
  • 15. • $45 Million of Research and Development Investment • $350 Million in Systems Deployed Worldwide • Lowest False Alarm Rate in the Industry, over 12,000 Systems in Use The Evolution of Superior Gunshot Detection SDS History & Experience
  • 16. Dual Factor Authentication • Microphones listen for weapon muzzle blast • IR sensors look for muzzle flash signatures • The Guardian Sensor validates an Acoustic Bang by also looking for an Infrared Flash The Guardian Sensor validates an Acoustic Bang by also looking for an Infrared Flash. Key Features • Immediate and accurate alerting – <1 second • ZERO False alerts • Provides shot location and tracks history and movement of shots • Easy integration into existing security technologies such as Access Control, Video Surveillance, Mass Notification, Mobile Applications, Alarm Panels, etc. Guardian Indoors Shooter Detection: Guardian Sensor
  • 17. The Guardian Sensor blends easily into any facility design. Sensor Design
  • 18. Major Metro City Major Software Companies & Fortune 500 Corporations Department of Homeland Security Air Force Research Laboratory European Police DepartmentInternational Airports The Guardian system has a 100% detection rate with ZERO FALSE ALERTS in every test and environment. Independent Testing
  • 19. SDS has 14 million hours of installed time in real-world environments with ZERO FALSE ALERTS. Guardian Indoor Shooter Detection Installations
  • 21. • Guardian instantly sends communication alerts via digital floor plan map, text message and e- mail with time and location of each gunshot incident. • With the addition of systems integration, Guardian communicates with additional notification pathways such as access control, alarm panels, video management, mass notification, digital radios, and mobile application technologies. User Interface & Security Systems Integration
  • 23. LIVE FIRE DEMONSTRATION Gunshot Detection and Security Systems Integration Product Demonstration
  • 24.
  • 25. For More Information… Contact Matt Powell matt.powell@convergint.com 404-804-2617