Since 2008 Herbert Systems has been designing, manufacturing and supplying the Herbert Tray Return System (TRS) to regional, national and international airports. The TRS fleet offers solutions to meet your airport needs. The E Series is designed to provide basic tray handling, Optimised throughput is achievable with the P Series.
The Herbert TRS has undergone intensive testing and development since it's inception in 2008. Our current fleet of lanes offer high reliability, low maintenance & a passenger focused solution for the security checkpoint.
The simple market entry E Series lane can offers a future proof solution by taking advantage of its upgradable design.
Reduces potential security target
Compared to manual lanes
Improved working environment
For operators & passengers
Customer service focused
Calm & less industrial aesthetics
The integration of security systems is key to the success of the security checkpoints. Greater risks caused by new and evolving threats combined with increasing passenger numbers and larger aircraft all put a strain on the smooth running of airports and the security checkpoint is a key pinch point.
That is why the Herbert TRS is designed around the principles of the joint ACI/IATA Smart Security programme, providing passengers with a seamless journey from arrival to embarkation and enabling the allocation of security resources based on risk.
Increased operational efficiency with the Herbert TRS comes with faster throughput, a smaller footprint, leaving more space for retail and other activities, and better utilisation of staff time as well as opportunities for staff reduction.
With the Herbert TRS, queuing is reduced, aesthetics are improved and passengers pass through security checkpoints quickly, simply, easily and without stress, enhancing their experience at the airport and reducing the risk of delayed departures and missed flights.
The Herbert TRS, as an integral part of the security checkpoint, enables the collection of vital data for airports to risk assess passengers accurately and concentrate security resource according to these factors, making the best use of existing and future technologies.