Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity NewswireTechnologies & SolutionsCase Studies (Physical)Ports: Sea, Land, & Air

Miami International Airport upgrades incident logging system

Miami Airport

Image courtesy of Miami International Airport

July 28, 2021

The nerve center at Miami International Airport (MIA) is its Airport Operations Center (AOC) which operates around the clock, monitoring activity, responding to safety and security incidents, disseminating information and responding to requests from stakeholders throughout the airport. An essential daily task for the AOC team is incident logging, with approximately 70 detailed logs being created each day, and that number set to rise as a result of internal process changes within the department.

Rupen Philloura is the Director of Terminal Operations & AOC at Miami International Airport and he explains: “The MLS logging system was a 25-year-old custom built application. It was familiar for our operators to use, but it was unwieldy, unreliable, and inefficient. With logging being such a critical and growing aspect of our day-today operations, we needed to upgrade to a state-of-the-art unified platform.”

To upgrade incident logging and create more efficiency among staff, the AOC chose an enterprise incident management system, called Situator from Qognify.

Today, the AOC has six Situator-powered stations from which operators monitor the airports Honeywell/EBI fire alarm and Matrix access control systems, as well as its extensive surveillance camera network.

Philloura describes the process: “When an alert is raised, the operator must follow a strict set of procedures for that specific event, this might simply be resetting an alarm remotely, or the dispatch of maintenance personnel. Incidents and subsequent actions need to be accurately documented for regulatory compliance purposes, but also to help us to learn and improve how we deal with incidents and events.”

Replacing manual entry, the system now automatically populates and logs specific information relating to an incident, saving operators time, and ensuring every log is of a consistently high standard. “Together with the input of the operator we are assured that the logs we generate and store are comprehensive end-to-end accounts, that can be quickly and reliably searched, retrieved and reviewed” adds Philloura.

The improved logging has also had a noticeable impact on business continuity and operational efficiency, as well as providing an additional layer of protection to the airport from a regulatory standpoint. With the AOC operating a three-shift pattern, it is vitally important that changeovers can be completed swiftly and nothing is overlooked. Philloura observes:

“When the next shift logs on to Situator they have instant situational awareness, there is no lag in productivity. They can see what has happened and what requires their immediate attention.” He continues: “During their shift they no longer need to repeatedly log into multiple systems to access information. It is all there on the screen at their station,” Philloura says.

The new platform has also reduced the response time to incidents such as door alarms, as well as access requests from tenants and airport employees, by automating the interaction with the Matrix system. With the old MLS system, both use cases needed to be handled manually. The success of the new solution within the AOC has led the airport to begin exploiting its strength as a powerful platform, with higher levels of task automation, ad-hoc forms and reporting, as well as integration with airport specific and non-specific subsystems (made easier by the API driven Situator), such as its access control system and surveillance cameras. It is also evaluating its ability to support the facilities management team in ensuring the statutory maintenance of its extensive network of elevators and moving walkways.

KEYWORDS: airport security incident management systems operational efficiency security technology video surveilllance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • High Tech Surveillance System at Miami International Airport

    See More
  • Miami international airport implements drone detection technology

    Miami International Airport implements drone detection

    See More
  • Miami Airport

    Fly through security with new screening tech at Miami International Airport

    See More

Related Products

See More Products
  • security book.jpg

    Security Investigations: A Professional’s Guide

  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing