As an innovator in airport security and one of the most traveled airports in California, Oakland International Airport (OAK) installed the Evolv Edge™ earlier this year as a way to enhance its employee screening program. OAK is committed to applying advanced, innovative solutions to complex security operations. The Transportation Security Administration (TSA) recognized this commitment by selecting OAK as a TSA Innovation Task Force Site, a prestigious distinction that promotes improved efficiency and allows the Airport to test technologies to benefit its growing passenger base.
Month: January 2018
A multi-venue Performing Arts Center keeps visitors safe with seamless security screening
Today, millions of people are vulnerable to attacks as private facilities, the transportation infrastructure and public venues and arenas have become potential targets. These soft targets are more vulnerable to attacks because they are harder to secure, with surging crowds, multiple ingresses and egresses to monitor and often minimally trained staff. Based on physical layout, crowd concentration and location, some venues have become concerned with person-borne explosive threats and others with concealed firearms. Decisions about which security technology should be deployed and what processes to wrap around them are highly dependent on the threats and vulnerabilities of a specific venue.
An iconic and innovative landmark uses Evolv Edge to seamlessly increase safety for thousands of visitors.
An iconic and innovative landmark uses Evolv Edge to seamlessly increase safety for thousands of visitors.
Today’s threat actors are expanding their focus from airports and government buildings to soft targets. Iconic landmarks pose higher risks than other locations. They are high-profile and symbolic, and entrances to most were not designed to support controlled entry and screening. Based on physical layout, crowd concentration and location, venues such as these have become concerned with person-borne explosive threats and with concealed firearms. Decisions about which security technology should be deployed and what processes to wrap around them are highly dependent on the threats and vulnerabilities of a specific attraction.


