Five Factors to Improve Today’s Physical Security Screening Experience

Security screening technology is often measured by three factors – detection, alarm rates and throughput. At the macro level, these three metrics give a broad sense of whether or not a device will improve an overall security process. However, these three pieces don’t tell the whole story. Two other factors, closely tied to throughput, flesh out the overall security trade space. They are “touch rate” and “divestiture.”

  • The traditional factors – detection, alarm rates and throughput.
  • The five “must consider” factors – detection, alarm rates and throughput, along with touch rate and divestiture.

Only when the entire set of factors is considered as a whole, can the effectiveness and efficiency of the device be evaluated. In today’s world where physical security screening has become the “norm” in more and more of the places we gather, the latter two factors become increasingly important — to find a purpose-built device and the right process.

The age-old adage “there are two sides to every coin” speaks volumes. While “throughput” is important to security operators, it’s the combination of throughput, touch rate, and divestiture that matters to your customer.

With this is mind, when the U.S. Department of Homeland Security’s Transportation Security Administration (TSA) created the TSA Precheck Program, the focus was specifically on two things beyond detection: 1) touching people less and 2) letting them leave everyday items on or in their pockets and in bags. While “throughput” wasn’t the central tenant of the program, it was believed that doing the first two things for a growing population of travelers would ultimately speed up throughput for all travelers.

When the program was created its authors wondered whether these two things would be material enough to make a difference in the physical screening experience. More than half a decade later, there is a clear differentiation between the highly customer-focused TSA Precheck practice and “regular” screening, underscoring the point that customers place high value on an improved experience.

Customer experience matters.

Not all customer environments will be the same; each will have slightly different objectives. Some will be in high threat locations; others will not. Regardless of the customer or their venue, the following things will always ring true. First, your physical screening system must detect threats at a high level and with limited alarms. Second, your physical screening system must do this in a way that keeps people moving, minimizes physical touching and allows them to walk at their pace without losing control of their belongings. Finally, in a world of limited or shrinking budgets, your system must be able to deliver efficiencies – either in terms of hard budget savings or repurposed security resources.

If you’re reading this blog, it’s possible that you’re implementing a comprehensive security screening solution for the first time. Or, perhaps, you’ve already implemented something in response to growing threats over the past decade. In either case, I encourage you not to start at square one. Why not learn from the organization that has been the face of post 9-11 security for almost two decades? Certainly, the TSA has made mistakes. And, thankfully, they have also made significant advances. You can learn from both, and you don’t have to spend a decade to do it.

Consider the five factors discussed above and evaluate your overall security process through a customer lens. Is the technology in your current process, or the one you are considering, purpose built to meet today’s security concerns while also preserving the culture, look, and feel of your venue? If it isn’t, you have options. There will always be two sides to this coin, but there are ways to ensure that both shine for decades to come. Contact us to find out how.

Note: To underscore the importance of the customer experience, I highlighted the tangible changes to TSA Precheck screening. It’s important to acknowledge the foundation of the program is built on the concepts of trust and access, and the public’s willingness to share personal information for the benefit of this streamlined screening experience.

Shining a Spotlight on Better Event Security

Mass shootings like the one that occurred this past weekend at The Jacksonville Landing entertainment complex and last year at the Route 91 Harvest Music Festival in Las Vegas shake us to our core. They make us feel vulnerable in moments when we should instead feel excited. Large performance spaces have been cultural cornerstones for thousands of years because they uniquely bring together people regardless of race, creed or gender over a shared love for the arts. Attacks like these exploit one of the most powerful uniting forces in our society.

The challenge for security professionals is that these venues take a number of different forms. For example, in the Boston area you could see Moulin Rouge at the Emerson Colonial theatre, the Eagles at TD Garden arena and Cirque du Soleil’s LUZIA under a big top at the grounds of Suffolk Downs – all within the same month. As adversaries shift their focus to public places and become increasingly innovative in their strategies, we need a new approach to venue security.

A New Focus for Attackers

Since adversaries have moved on from hard targets such as airplanes, government facilities and military bases, there has been a significant shift to soft targets such as performing arts centers, sporting venues and arenas. While this is widely known – our CEO tells the story often of the anxious conversations he recently witnessed fellow parents having as he picked up his son’s friends to take them to an Imagine Dragons concert at a stadium – not enough is being done to address this new focus of keeping loved ones safe.

Further, the attack method and the perpetrator have changed. The rise of crowd-sourced terrorism has led to readily accessible means for an attack. Firearms, vehicles and home-made explosives are within reach as adversaries shift their focus from high-profile locations to anywhere people gather.

Raising the Current on New Security Technology

While attackers have focused in on specific venues, security screening technology has been largely unchanged. Today when you go to a see a show at a theatre, you’ll likely wait in line for sometimes 30-45 minutes before approaching a metal detector for which you have to empty your pockets or divest personal items before walking through. Many stadium and arena operators no longer even allow visitors to bring backpacks or other bags into their venues to improve the efficiency of screening.

Advancements in technology are changing this status quo, providing higher throughput and improved threat detection with less disruption. Some combine personnel and bag screening to help minimize removal of personal items and speed up the process. These technologies are using the latest sensors, software and user experience design principles to provide an improved level of security with a better visitor experience.

While technology is an important component to an effective security plan for a performing arts center, it’s just one piece of the puzzle. When building a security plan, facility managers should work to understand their threat vectors, vulnerabilities, and mitigation plans. They should incorporate the following components into a comprehensive security plan.

  • Intelligence: Understand and identify the threats to the area, building, and people in it. Work with various federal, state, and local enforcement agencies and leverage the facility team’s network of contacts. Threats are constantly changing; therefore, intelligence must be ongoing.
  • People and Training: Guards and officers serve as the frontline, they know the facility and the people in it. They should be trained on an ongoing basis in security protocols as well as identifying suspicious behavior.
  • Processes and Protocols: Facility managers can no longer use a “one-size-fits-all” approach to security. They need tailored systems and well thought out processes and protocols – like risk-based security – to ensure security layers are properly deployed throughout a venue.
  • Technology: As mentioned above, new technologies can provide threat prevention beyond the capabilities of guards to significantly improve screening operations. CCTV and access control expand the reach of the team on the ground. Further, facial recognition technology can be employed to recognize and authorize employees in an employee screening application or to adjust screening for VIPs.
  • Visitor Experience: With new technology and processes, it’s important that customer experience is not a secondary consideration – especially at a performing arts center. A security experience can maintain a level of calm and unobtrusiveness.

By employing a holistic approach, security guards and facility managers at performing arts centers can be armed with the information they need to quickly and confidently assure a safe environment for their visitors. With the right technology, they can effectively screen and adjust layers of security in response to changing threat levels without impacting visitors and their normal pace of life. In fact, when selecting new technologies, facility managers should look for solutions that provide a balance between improved security and a better visitor experience.

While related issues like the gun control debate may divide us, cultural experiences like seeing a show or going to a concert unite us. We can all agree that we deserve to feel safe in all the places we gather. At Evolv, we will continue to innovate to bring intelligence and security at the perimeter of soft targets to keep people safe – at performing arts centers and beyond.

Read more here about safeguarding against soft target attacks.

Risk-Based Security Gets in the Game

If you’re coaching a soccer team in the World Cup this summer, you’re going to want to adapt your defensive strategies for each opponent. To stop an aggressive, high-scoring offense, you’ll keep your defenders back and play cautiously. To beat a cagey, clever foe, you’ll apply some pressure to try to force turnovers.

Successful strategists in the security arena face the same kind of tactical issues. The stakes are much higher, of course, but security pros need to deal with their own group of “attackers” who are skillful, resourceful, and motivated to succeed. Soccer coaches can’t deploy a “one-size-fits-all” strategy, and neither can today’s security strategists.

In security, this strategy has a name. It’s called “Risk-Based Security,” RBS for short. If this sounds like a simple, common-sense approach to a serious, complicated issue, it is – sort of. At its core, RBS defines a commitment to flexibility and adaptability to deal with ever-changing threats. It also values the use of “tailored” systems that are designed to mitigate risk, evoke a sense of safety for users, and not present an undue burden on the user population.

The traditional, one-size-fits-all approach to security is cumbersome. It usually involves having security officers physically inspect every person entering a facility, relying heavily on the limited capability of metal detection. This approach provides a service, deflecting obvious traditional threats. But it is costly and slow, and often ineffective without additional capabilities to screen more aggressively.

Security systems that implement a risk-based approach to screening, for example, tend to be more accepted by the public than those that don’t provide any differentiation. A good example of this practice is the TSA PreCheck program. TSA PreCheck leverages a preliminary vetting process that separates “low-risk” passengers from those who are unknown or may require additional screening. By extending the process beyond the airport, TSA has significantly increased the throughput of its PreCheck screening lanes for passengers while mitigating risks and reducing staffing and equipment costs.

A risk-based approach recognizes that while there are no perfect security solutions, those that strategically balance security, access, usability, and cost can ultimately provide the best long- term protection against an evolving adversary.

An effective RBS strategy considers changes in the environment over time, and changes in the risk profile of different groups of people – employees, visitors, and dignitaries – over time. It also puts equal emphasis on technology solutions and more people-focused factors like organizational, managerial, and operational capabilities.

It relies primarily on a short list of components: gauging threats; understanding vulnerabilities; vetting users; identifying users and attaching risk assessments to them and their belongings; routing high-, low- and unknown-risk users through the appropriate security channels; and using equipment to screen personnel and belongings.

A successful risk-based security strategy is reliant on an enterprise approach that not only provides excellent technology to perform physical screening but also ensures that the personnel performing the screening are using the technology appropriately, that people presenting themselves for screening have already been assessed, and those vetted to a higher standard are provided a screening process that is not unduly burdensome.

There is no “silver bullet” or “cookie cutter” enterprise approach. What might work particularly well in office buildings and places of worship, where it is possible to learn more about the regular user, will be different than in public venues where most people presenting themselves may be unknown, and this may present a different threat.

As attackers have expanded their focus, major sporting and public events have become more of a target. The challenge commercial entities have in implementing a risk-based program is two-fold. First, a “known patron” program must be established along with a quick way to validate membership in that program at the entry to the screening system of a facility. Second, a program must tailor the screening process to account for the different risk levels of those entering the venue.

The potential benefits to implementing a risk-based screening program are significant. This approach can create a better experience for known, repeat customers. A risk-based screening program can also improve overall brand perception of a venue by implementing “smart” security solutions. These risk-based solutions help make entering a venue easier while maintaining a level of safety, allowing faster throughput, and thereby mitigating the risk of long queues. Overall security costs can potentially be decreased since people can be screened at a faster rate, requiring less security staff.

Further, while people want the safety that screening systems provide, they do not want to lose the culture, openness, and sense of welcome that make their venue, stadium, or house of worship special. Implementing a risk-based security program provides the best option and allows an organization to tailor a program that fits their culture, so they do not have to sacrifice what they represent for safety.

“One-size-fits-all” security can work in specific, limited situations. But it’s no match for today’s attackers. Successful security strategists, like World Cup contending soccer coaches, make sure they’re prepared. They have their tools, their plans, and their training intact, and they’re ready to defend.

Learn more here about the value of balance, improved security and a better customer experience.

Six Ways to Prevent Soft Targets from Terrorist Attacks

We bet five years ago that soft-target attacks would become the favored tactic of terrorists, particularly if ISIS began to lose ground on the battlefield. Unfortunately, we were right.

Many stadium and arena operators no longer allow visitors to bring backpacks or other bags into their venues. Policies like these were instituted to ensure that the venue can balance the need for effective screening with the need to avoid miserably long security lines.

But there’s no getting around it: for anyone wanting to pack an extra sweater, a snack for the baby or raincoat just in case, this is a big deal–a serious degradation of the customer experience. Unfortunately, such are the compromises security professionals have had to make in this post-ISIS era. Soft-target attacks–everything from sophisticated assaults on iconic arenas to lethal “lone wolf” attacks on unsuspecting neighborhood nightclubs—are on the rise, forcing operators of public venues of all sizes to rethink their security strategies. All too often, venues have had to resort to the oldest, bluntest response: hire more security guards and request more police support and do more thorough physical searches.

We all know that’s not a sustainable response. Throwing labor at the problem is costly in the short-term and economically unsustainable in the long-term. It’s not sure to dissuade a determined terrorist, but may impact your brand. After all, your business is to provide a carefree, entertaining experience for your customer—not to turn a night out into what feels like a visit to a hardened military installation. And when customers complain, we all know who will bear the brunt of the pressure. You will.

Therefore, here are six ways that screening technology can protect soft targets from terrorist attacks:

1: Create an Enhanced Visitor Experience – Deliver security at the pace of life. Visitors are not asked to “pause and pose”. Because it uses high-speed millimeter imaging, the system can screen people at walking speed. Since we need to search for mass casualty weapons, there’s no need to empty one’s pockets and purses into “dog bowls”.

2: Don’t Treat All Threats Equal – Our industry responded impressively after 911, with powerful systems designed to find anything a highly trained terrorist could use to attempt a repeat of that infamous day. The unsophisticated lone wolves who carried out most of the more recent soft-target attacks needed powerful weapons and explosives to cause mass casualties. We’ll look for those—not screwdrivers, razor blades, or other everyday objects with minimal potential for terror.

3: Don’t Deploy Security That is All or Nothing. It’s Complicated.  – In the past, the main question for many organizations was whether to deploy screening technology. Like it or not, ISIS has changed that calculation. Now, almost any place where crowds gather can be a target. Look into technology that improves your defenses at all your facilities – whether it is adding another layer of protection to a sports stadium or introducing one to a previously unprotected nightclub or corporate office.

4: Know that Flow Matters – Living in a free society means accepting some risks. Security cannot come at the cost of freedom of movement, freedom from intrusive searches and freedom from inconvenience.

5: Understand that Customer Experience Matters – Minimizing the unpleasantness of screening is not a secondary consideration—not for your customers and visitors, and not for your boss. Our working assumption is that if our technology hurts your ability to retain and attract business, you won’t use it for long. You need to protect your customers and help your business.

6: Consider Future-Proofing Through Software – Powerful software platforms help you easily adjust as new threats emerge. This is crucial to keep you prepared for today’s sophisticated terrorist networks, who use social networks and other tools to quickly share instructions for building more lethal bombs or executing new types of attacks.

It’s time the security industry stepped up with solutions for the reality of today’s world. Our technology is specifically designed to expose the threats behind mass casualty attacks that have become all too common to help your front-line personnel take quick action without inconveniencing your customers.

To learn more, read the three questions security directors need to ask before the next soft target event here.

Security content kit for stadiums and arenas

Three Questions Security Directors Need to Ask Before the Next Soft-Target Event

It’s been more than a year since a suicide bomb was detonated in the foyer of the Manchester Arena. The blast killed twenty-two concert-goers and injured hundreds more. Since then, I have met with security directors from concert halls, stadiums, arenas, sports teams, and convention centers around the world. These security directors are typically asked three questions by their venue owners and managers:

1. How vulnerable are we to this type of attack?

2. What are other venues doing to prevent this type of attack?

3. How can we prevent this type of attack from happening in our venue?

The short answer is, there’s still more to be done.

A typical reaction after the Manchester event was for security directors to reach out to the security consulting industry to help them address these questions. This often included a new or refreshed threat assessment and vulnerability analysis that resulted in identification of security gaps. People, processes, and technology were then evaluated in various combinations to close those gaps.

An initial focus on upskilling people typically includes training to make guards and employees more vigilant and aware of the signs of trouble. This is a quick way to reinforce important skills. Venues will conduct formal internal training, either by bringing in an outside firm or working closely with law enforcement through various programs they offer. Having trained staff is an important part of the overall security plan.

Next, many of these venues step up contact with various sources of intelligence to help them understand and identify the threats to their area, their building, and, if applicable, the people performing at their site. These sources stream in from various federal, state, and local agencies or fusion centers, through a range of companies providing intelligence-as-a-service, and through the venue’s own network of individual contacts. For example, the Joint Terrorism Task Forces in more than 100 U.S. cities and similar international intelligence bodies are a critical component in this fight against terrorism.

The third key piece involves making changes to processes and technology. These may include fortifying the perimeter with bollards, adding “eyes on” such as CCTV cameras, or improving visitor screening operations. Process and technology changes, implemented effectively, can multiply the available forces, enabling significant improvements to both the effectiveness and efficiency of the overall security operation.

Decisions about which security technology should be deployed and what processes to wrap around them are highly dependent on the threats and vulnerabilities of a specific venue. There are some key considerations in this decision:

How vulnerable are we to this type of attack?
A key question is: what threats are we most concerned about? Based on physical layout, crowd concentration, and location, some venues are most concerned with person-borne threats and others are concerned with vehicles used as weapons. The threat of an individual bringing a firearm or explosive device to do harm to a crowd of people is high on most lists. Typically, threats are identified and prioritized within a logical framework including the probability of a given type of event, the impact on the venue and its visitors, and the vulnerability based on current security measures.

What are our operational realities?
One comment we consistently hear loud and clear is that a traditional airport or courthouse “mag and bag” checkpoint security process isn’t a viable solution. Security leaders do not want to create an environment where visitors or fans are required to remove all the items from their pockets and place them into a small white bowl, walk through a screening device, and then re-collect their items and go on their way. A manual search of every bag also significantly slows down the screening process and is intrusive to visitors.

What are the gaps in our security plan?
Firearms and explosive devices concealed on an individual are two concerns high on the list of most security directors. There are thousands of people converging on these venues in a short period of time, often just before the start of a show or beginning of a game. To effectively and efficiently screen each visitor for these types of threats is impractical, if not impossible, using traditional technologies – often a mix of walk through metal detectors, manual bag checks and guards trained to identify known trouble makers. For some venues, it’s canines for explosive detection. Evolv has combined all three of these capabilities into a single high-speed device.

Our formula is simple:

  • Find the threats we care most about: explosive devices and firearms
  • Make the visitor experience as unobtrusive as possible
  • Ensure throughput between 500 to 1,000 people per hour (per security lane)
  • Make it easy for guards or officers to use
  • Ensure it is flexible so that it can be used at multiple locations and in different operational configurations to screen different groups of people

Arenas, performance centers, and stadiums have begun deploying new security screening technologies such as the Evolv Edge, and even more are conducting pilots to understand how best to deploy them. However, too few have taken proactive steps to effectively protect their visitors and fans from today’s threats. Let’s focus on detecting the threats we know are out there.

Whitepaper: Balancing Security, Visitor Experience, Operational Efficiency and Cost Considerations

Summary

All security systems are designed to keep people safe. The challenge is balance. Does the security present an undue burden, either to the provider or to the customer, does it evoke a sense of safety, and does it operate within the cultural bounds of the venue? And of course, how much does it cost? Security experts generally agree the use of a venue specific risk-based security (RBS) approach is preferable to “one-size fits all” solutions. Flexibility and adaptability are key factors in RBS solutions, allowing “tailored” systems designed to mitigate risk while maximizing customer movement or throughput with minimal disruption.

Evolv Edge was designed and built to aid an organization’s move toward a risk-based security approach and provide balanced detection across a range of threats in a changing environment.

Download this whitepaper to learn how Evolv Technology’s Edge system provides the best RBS solution to detect metallic and non-metallic threats that cause mass casualties.

Download Now

Fill out the form to download this whitepaper to learn about balancing security, visitor experience, operational efficiency, and cost considerations

For some of us at Evolv, the mission of keeping people safe is personal

Fifteen years ago my college roommate perished as the north tower of the World Trade Center came down. Parents lost their child. A man lost his brother. A wife lost her husband. A son lost his father.

Twenty seven years ago I started my career, working two blocks from the World Trade Center. I lived and played in the shadows of those towers. A close friend and colleague from those banking days escaped the tragedy of September 11 and has spent the past fifteen years rebuilding his firm, honoring the sixty six lives that were lost, and helping the firm’s families.

September 11, 2001 has had a profound impact on how I look at the world and my contributions to it each day.

After a career helping companies use technology to address their business challenges, I am fortunate to be the co-founder of a company who is helping society address one of its biggest problems. I am working with a talented team of people that shares this passion and we’re dedicated to applying technology to help solve this difficult challenge in every place people live their daily lives.

As a team, we have worked in, looked at, and experimented with technology that has become pervasive in many other industries. There are so many different technologies: imaging sensors, human augmented machines, miniaturized compute platforms, artificial intelligence models, microservices-based architectures and augmented reality, to name just a few, that can be applied to making this world a safer place. These technologies can be combined in interesting ways using concepts such as a modular design, internet of things, software as a service, user-centric models and crowd sourcing to deliver compelling solutions.

Our team has spent the past three years together developing an architecture, a set of technologies, and our first product to address the persistent problem of ‘known wolves’ perpetrating harm on members of our global community. To address the continuously changing, pervasive threat, we have developed a system that, we hope, can be dynamic, intelligent, and effective in preventing these types of people from committing those types of acts.

I wake up each day driven by our mission. I don’t want another Steve to be taken from his family. I don’t want another Jon to have to comfort the families of lost colleagues. I don’t want my children to be concerned if they should go to a ball game or ride the train or enter an office building. I don’t want them to live that kind of life.

Why the Rio Olympic Security team faces the most complex threat set ever

The narrative leading up to the Rio Olympics to date has been troubling. From Zika to corruption, safety and security have now emerged as one of most concerning areas. The same games that are meant to celebrate the world, united by Olympism are happening at a time when mass casualty attacks like those in Brussels, Orlando, and Nice are becoming the new normal. We refuse to accept that and wanted to share some thoughts on the unique challenges we see for the dedicated security team committed to protecting the athletes, volunteers and fans who will spend the next fourteen days in Brazil.

How difficult is it to keep 600,000 people safe over 19 days?
These 2016 Summer Olympics will be secured by 85,000 personnel protecting 10,500 athletes, 70,000 volunteers and about 500,000 fans watching 306 events over 19 days across 32 different venues in four different geographic areas with football matches in five additional cities. These people will enter an array of venues from large stadiums to small arenas, outdoor ranges, beaches and the open water. This is where the challenge begins.

So how can you efficiently and effectively screen this volume of people coming in and out of the games?
Let’s use the largest single location to illustrate the security challenge.

Rio Olympic Stadium

The Barra Olympic Park (picture above) spans almost 300 acres, and is home to nine stadium venues hosting thirteen different sports, with an aggregate capacity of 95,000 fans.

On the fifth day of competition at Barra, 329,000 fans will attend 21 different events starting at 8:30am and ending after midnight. This is the equivalent of having sold out games at Fenway Park (Red Sox), TD Garden (Bruins/Celtics), Citi Field (Mets), Yankee Stadium, Madison Square Garden (Rangers/Knicks) and Met Life Stadium (Jets/Giants) on one consolidated campus, all in the same day.

Fans, athletes, volunteers and employees will be coming and going all day long. They will be arriving on buses, via subway, private vehicles, by bicycle and on foot. The Barra Olympic Park peninsula borders water on two sides and a very busy traffic area on the third. This is one tough perimeter to secure. Checkpoints will be set up around the perimeter to screen people and their bags. Given the volume of people throughout the day and the breadth of belongings they will have with them, this poses an enormous security challenge for any guard force. Add visitors speaking many different languages who may be new to Olympic-style security screening and the lines are likely to be very slow. One more variable: people will be bringing all sorts of personal items that local guards have not experienced before in their training. Imagine their thinking is this a threat or not? Is this on the prohibited list?

Let’s consider the security challenge faced by the Rio Olympics security organization. First and foremost, these games are once in a lifetime for Brazil (and is the case for many Olympic hosts). Therefore, there is no ‘permanent’ security force that secures all of those venues with those crowds on a regular basis. Second, looking for ‘abnormal behavior’ in a sea of chaos is virtually impossible. Thousands of people from hundreds of countries, moving around day and night over nearly three weeks creates a constantly changing environment. There is nothing normal about it that can provide a baseline for security personnel to assess unusual behavior against. Techniques to gather intelligence, identify suspicious behavior, and employ counter surveillance strategies are exponentially more complex.

In addition to its athletes, each nation brings trainers, coaches and other support staff. Is it time to think about each nation contributing large numbers of security personnel to the games? Should we have a transnational security organization that moves from one international sporting event to the next? Or can we use technology to reduce the complexity and be a force multiplier?

Given today’s threat landscape and the complexity of the modern Olympics, do we need to fundamentally rethink how we secure the games?

The world is full of soft targets and we’re defining a new approach to protecting them

We are focused on the mission of keeping people safe. Here’s a quick look at how we see our challenge, our opportunity and our vision for the future of screening at soft targets around the globe.

A dynamic adversary

Another mass casualty event at yet another soft target. Riyadh, Bangladesh, Istanbul, Orlando, Brussels, Paris and San Bernardino.

Questions emerge: Were the terrorists lone wolves or known wolves? Were they inspired or directed? How can we improve protection? Should we push the perimeter out? Are we creating new soft targets with new checkpoints?.

We’ve spent the past three years talking with hundreds of professionals about securing their people and their facilities from active shooters and suicide bombers. These professionals provide protection to stadiums, transportation hubs, subways and rail, office buildings, special events, hotels and entertainment venues, military facilities, critical infrastructure such as chemical and nuclear facilities, and landmarks. They do this in the U.S., Canada, Europe, Asia, and the Middle East. The needs may differ among them, but their mission is the same: keep their people and places safe.

Defining a new approach

We have accumulated, synthesized and prioritized the needs of this global group of security professionals to define an entirely new approach to physical security. We have researched, evaluated, built and tested a wide range of sensors, software, and analytical approaches to detect the physical security threat. We have studied and analyzed the operational realities of keeping soft targets safe. We’ve looked outside the physical security industry for innovative approaches and technologies to bring to bear on the physical security mission.

Enter Evolv

One thing is crystal clear: We need to provide better security without disrupting people’s everyday pace of life.

This should be accomplished with the latest sensors, software, and analytics, combined to provide a seamless screening experience, letting the public easily pass through while trapping those intending to do us harm. Our product is emerging from development, none too soon to help protect the next set of soft targets.

Our Products

The most effective security processes incorporate means to adjust sensitivity based on risk level. Our products enable risk-based adjustment as a core capability built into the technology. These adjustments can be made for a specific individual, location or time of day. Settings allow for different detection sensitivity and threat sets, based on intelligence, site-specific factors or a randomness protocol.

Our technology is designed to enhance the look of your location, not detract from it. Products are easily deployed at access points, lobbies, and entrance ways with little to no infrastructure modifications. Our design approach is to minimize the impact on your location by carefully designing the product and the ways it can be used.

Randomness is an important component in an effective security protocol to counter surveillance activities or to disrupt planned operations. Our screening products can be rapidly relocated and set-up to enable unpredictable screening at different locations throughout your facility.

Today’s security environment demands multiple layers, both visible and discreet. Results are typically fused at a command center, providing a more complete picture of the security situation. Our products improve situational awareness by inserting real-time multi-sensor data into the overall picture. In addition to providing screening results at the unit and to the command center, real-time information can be served to mobile security officers or others connected to the operation.

– Real-time video surveillance
– Facial recognition and known wolf matching
– Firearm and explosive detection

We have designed our products from the ground up to detect and prevent threats that can cause mass causalities. From sensors to software to networking, they are focused on keeping your people safe while allowing free flow and movement. We use a combination of sensors, built on active millimeter wave, that inform automated detection algorithms to provide a fully automated ‘red light’ or ‘green light’ decision. Detection settings can be adjusted based on the latest threat level. Evolv products are designed for high detection rates with minimal false alarms, to focus on the threats and minimize the impact on your visitors.