Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Ports: Sea, Land, & Air

Surveillance, Evacuation Solutions Enhance Milan's New Driverless Metro

Italy's longest metro system now combines video surveillance and public-address communication to manage evacuation measures.

The new driverless train in Milan's metro line 5 is supported by surveillance cameras and integrated mass notification for stronger evacuation protocols and security.

The new driverless train in Milan's metro line 5 is supported by surveillance cameras and integrated mass notification for stronger evacuation protocols and security. Image courtesy of Bosch Security Systems.

June 17, 2013
The new driverless train in Milan's metro line 5 is supported by surveillance cameras and integrated mass notification for stronger evacuation protocols and security.
The new driverless train in Milan's metro line 5 is supported by surveillance cameras and integrated mass notification for stronger evacuation protocols and security. Image courtesy of Bosch Security Systems.

The longest metro system in Italy, the Milan metro with a total length of 92 kilometers and 101 stations has a daily ridership of over one million people. To secure this important transport system, Bosch Security Systems is supporting Milan’s new driverless metro line 5, which opened earlier this year, with a security solution that combines video surveillance and public-address communication for managing passenger information and evacuation measures. Due to the peculiarity of the city’s ancient and magnificent architecture and the resultant constraints, lines of communication between the single security components needed to be as minimally invasive as possible. This was why the decision was made to install a wireless LAN network to cover the 13 kilometers of line, along with 19 new stations, where video cameras and a public address system needed to be integrated.

The main tasks of the surveillance and evacuation solution were to provide video monitoring and passenger movement control on trains and in stations. This included providing public information while guaranteeing increased passenger control and safety, as well as the management of any system alarms and diagnostics together with continuous event recording.

Milan's fully-automated M5 line is controlled by a single operations center, which is able to issue all necessary commands to ensure the correction functioning of the line.

Milan’s fully-automated M5 line is controlled by a single operations center, which is able to issue all necessary commands to ensure the correction functioning of the line. Image courtesy of Bosch Security Systems.

Ansaldo STS, who was in charge of designing the video surveillance and public address system, supported by System integrator Tyco, chose to address the challenge with equipment from Bosch Security Systems, whose solutions have been adopted worldwide. This resulted in the installation of 400 vandal resistant FlexiDome cameras, 10-bit digital processing technology, video and audio signal transmission encoders, as well as ten iSCSI storage units. The Praesideo system was selected as the evacuation component and installed in each station, connected via LAN. All sub-systems operate independently, even in the event of a network failure or other outage, providing maximum operability and thus maximum security. Finally, all the systems supplied by Bosch were integrated via a software development kit (SDK) in the control room to form one complete solution.

This means that Milan’s fully automated M5 line can be controlled by a single operations center, which processes all the information centrally. The center is able to issue all the necessary commands to ensure the correct functioning of the line, the safety of the passengers, timely maintenance measures, and the optimum use of operational personnel (mobile agents). As a result, the Italian city can rely on modern, LAN-based security technology for intelligent traffic control coupled with the highest standard of safety.

KEYWORDS: evacuation mass notification mass transit security Milan metro transit security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • city bus

    Cincinnati Metro Introduces New Buses with Surveillance Cameras

    See More
  • train on tracks

    Identifying solutions to enhance security

    See More
  • MetroLink-Safety-WEB

    St. Louis Metro Transit Announces New Public Safety Leadership Team

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing