The Need For Improved Access Control

Since the Cruise Vessel Security and Safety Act (CVSSA) of 2010, also known as the Kerry bill, was signed, on-board safety and security has been improved on cruise ships headed to or from American ports. Under the numerous specifications of the act were significant improvement requirements to crew member access and control procedures.

The new requirements meant cruise lines needed to move fast to make upgrades, especially the lines with high demand and around-the-clock travel schedules. This would require a reliable system, along with a smooth implementation process in order to keep goals on track and ships on schedule.

For one of the world's leading luxury liners, the act meant that they would have to establish a new key control system for its four ships. With thousands of weekly passengers and destinations in Europe, Panama, the Caribbean, Alaska, and other transatlantic locations, an updated key management system was an instant priority. The cruise line's previous key system not only lacked individual and time-based access control, but it also required long periods of key collection and distribution.

Automated Key Control With Access Restrictions

"With the new requirements of the CVSSA of 2010, we needed the tools to meet the new key control guidelines. This meant that controlling access to different keys by person and time-frame was necessary, as well as a system to go along with it."

Traka fulfilled this goal by providing intelligent, software-driven key cabinets with automated key issuing to ensure the cruise line exceeded the CVSSA requirements, along with a complimentary system that could be maintained by the existing security staff. For a smooth implementation process, the cruise line required a solution that could be integrated with their existing manual systems. Traka's key cabinets were a clear solution for the four vessels, as they could be quickly integrated with existing systems and exceed the access requirements of the Kerry Bill with their products.

The Roll Out

The implementation of Traka technology made this the first cruise line in the world to adopt the latest in key management in accordance with the CVSSA of 2010. With no complete key management systems in place and only manual processes, critical Traka electronic key cabinets were installed.

Meeting the CVSAA requirements calls for a thorough planning process to go alongside the installation and training, but Traka went above and beyond what was expected with unique, specific processes designed for each ship. In a one to two week period, Traka carefully planned out how keys would be managed for the cruise line, who would have access to them, along with pinpointing when, why and how auditing the system would occur.

An existing Traka security officer with the cruise line is able to manage the Traka systems with little impact on current workload, following a quick turnaround, implementation with the current specs, as well as training.

With Traka, the increase in
accountability and productivity
allowed for average monthly
savings close to $2500, completely
covering the return on investment
in just six months along with a
quick, continuous profit

Accountability And Increased Productivity

"The main benefits of using Traka have been the key accountability and increased productivity, which eliminated approximately 120 personal hours per month that had previously been spent collecting and distributing keys."

Though the Kerry Bill required access changes, the cruise line got much more in return by using the best in key management technology. With Traka, the increase in accountability and productivity allowed for average monthly savings close to $2500, completely covering the return on investment in just six months along with a quick, continuous profit.

Once the new Traka systems were implemented, crew members saw major productivity increases. Now that keys don't have to be issued at the beginning and end of shifts, crew members appreciate the time saved. As a whole, the cruise line immediately recognized an extended list of benefits from implementing Traka, including:

  • Key accountability
  • Increased productivity
  • Lower collection & distribution time
  • Reduced costs
  • Quick, effective implementation process
  • Access control by person & time
  • Return on investment in under six months

After being the first cruise line to adopt key management, they plan on continuing to stay ahead of the pack with compliance and security for their passengers. Moving forward, they plan to purchase 10 more Traka key management systems and standardize based on Traka's complete fleet of key and asset management systems, including expansion with storage lockers to help protect electronic equipment and ignition control systems for vehicles. They also look forward to continued cost saving with Traka systems, along with training the shore side crew, so that they are up-to-speed with the on-board crew members and their grasp of the full range of key management solutions.

Download PDF version

In case you missed it

Has The Gap Closed Between Security Fiction And Security Reality?
Has The Gap Closed Between Security Fiction And Security Reality?

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?

The Five Questions Bank Security And IT Leaders Need To Answer About Cybersecurity
The Five Questions Bank Security And IT Leaders Need To Answer About Cybersecurity

Organizations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organizations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth In Cyber-Attacks Additionally, cyber-threats have taken a front seat in the line-up of primary risks facing financial institutions today. And it is no surprise why: according to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. Cyber-attacks are becoming more prevalent, more complex and harder to address The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, with that also comes an increased risk to dangerous threats. In today’s environment, banks, credit unions, and financial organizations of all types are primary targets for hackers. But it’s not just the monetary loss that these businesses need to be concerned about — there is also a threat to the brand, customer trust, and employee safety. All of these challenges and complexities open the door to new conversations and risks. Here are the top five critical questions today’s bank leaders need to be ready to answer. Should We Collaborate To Mitigate These Threats Effectively? Over the last decade, the emergence of the Internet of Things (IoT) and a demand for more mobile capabilities has changed the way people and businesses connect. But as the need for connectivity increases, so too does the need for increased security for physical assets, networks, and valuable corporate data. As a result, a dialog between IT and physical security is necessary to help leaders gain a greater knowledge of how to best collaborate to ensure complete protection. Leaders must communicate closely to drive strategies that help identify vulnerabilities in a more proactive manner. The result of these conversations: a truly comprehensive approach to security intelligence. It’s not just the monetary loss that banks need to be concerned about – there is also a threat to customer trust and employee safety How Can I Pinpoint The Important Data For Addressing Cyber Threats? To maintain a high level of security and ensure business continuity around the globe, companies seek solutions that help predict and identify threats in real time. But often, there are too many alerts generated by too many systems, and none of this raw data is actionable. Linking cyber and physical security together transforms alerts into actionable intelligence, which helps users connect the pieces of any situation and present a unified risk scenario to the appropriate analysts and operators. By capturing and analyzing data in real time, enterprise organizations gain a visual representation of risks across the business while accessing information related to the most critical events happening at any given time. Not only does this unified process enable a higher and more proactive level of protection, but it also helps facilitate a plan of action based within a common, unified security operations center. How Can I Inform Of The Importance Of Cybersecurity? Security leaders in banks need to feel prepared by staying updated, looking at common vulnerabilities, understanding the malware and challenges, and testing the environment. And collaboration is key to mitigation: Traditional security and fraud teams must work in conjunction with cyber teams to effectively handle all aspects of a cyber-attack. Additionally, CISOs need to “sell” cybersecurity to CEOs and the board by outlining the importance of protection through emphasising the impact of a potential cyber-attack on the business. Ensure you can verbally address the most critical risks to your senior leadership, including recent botnets, scams, and cyber gangs, to receive the support, and budget you need to address these threats head on. Is My System Secure? It is critical that you are knowledgeable about the steps you can take to protect your security and network infrastructure from cyber-attacks. A firewall is useful to prevent hackers from accessing critical data on internal networks and computers Changing default passwords should be a first step, as some scams target devices with hard-coded factory defaults. Ensure software and firmware is up to date because updates often include fixes for potential vulnerabilities. These updates keep your devices and network more secure and increase overall system uptime. A firewall is useful to prevent hackers and unauthorized programs from accessing the critical business information and resources on internal networks and computers. Also, minimize potential risk by closing network ports and disabling services you don’t need. With all of these instances, it is best to work closely with your integrator partner and chosen vendor to ensure that your system is as secure as it can possibly be. What Solutions Are Best To Help Mitigate Risks? Technology is a great force multiplier. Security — both cyber and physical solutions — helps secure an entire branch footprint, alleviates risk, ensures operational compliance, and improves fraud investigations. Video surveillance systems, analytics, threat management platforms and more can provide organizations with intelligence and unprecedented protection from fraud, all while enhancing the customer experience. Overall, there are significant benefits to collaborating to gain comprehensive risk intelligence. By bringing various leaders, departments, technologies and strategies together, we can more effectively identify threats, develop trends and quickly access important data to ensure security and safety goals are realized.

BCDVideo Signs OEM Deal With Dell EMC: Positive Impact For Surveillance Storage
BCDVideo Signs OEM Deal With Dell EMC: Positive Impact For Surveillance Storage

In a significant move for the video security market, BCDVideo has announced that it is set to become Dell EMC’s OEM partner in the video surveillance space. For nearly a decade, the Chicago-based company has been known as a key OEM partner of Hewlett Packard Enterprise (HPE), providing storage and networking technology to security integrators on a global scale. This latest partnership will allow BCDVideo to take their offerings to the next level. BCDVideo Vice President Tom Larson spoke to SecurityInformed.com to discuss the reasoning behind the deal, and how the program will benefit partners, integrators, and end-users alike. Expanding BCDVideo's Product Offering For BCDVideo, the HPE OEM program has been widely acknowledged as a success, allowing the company to leverage a globally recognized brand and provide high-quality, reliable solutions across video networking and access control. Nevertheless, explains Larson, HPE server solutions are primarily suited to large-scale enterprise projects, and are therefore unable to accommodate for the growth in small- and medium-sized surveillance applications. The global collaboration with Dell EMC will allow BCDVideo to open up a broader product offering, building on success in the larger enterprise market to offer tailored solutions to SMEs. Our aim is to look at all best of breed technology to serve the video surveillance marketplace, and that means multiple partnerships” Support For Integrators By leveraging Dell EMC’s sophisticated digital storage platforms, BCDVideo will now be able to offer a more cost-effective solution to integrators, without sacrificing the resilience and IT-level service that BCDVideo is known for. With access to Dell EMC’s expansive global sales and technical teams, the company hopes to expand its reach, all-the-while providing partners with around-the-clock technical support and a five-year on-site warranty. Customers should be reassured that BCDVideo will continue to offer HPE platforms, service, and support. “Our aim is to look at all best-of-breed technology to serve the video surveillance marketplace, and that means multiple partnerships,” says Larson.  “The addition of Dell EMC to our portfolio is a major win for BCDVideo, for Dell EMC, and for our integrators.” The global collaboration with Dell EMC will allow BCDVideo to open up a broader product offering Meeting Surveillance Market Demands At the technology level, assures Larson, Dell EMC’s server offering is well suited to handle the increasing video resolution and growing camera count demanded by the surveillance industry. At the larger end of the spectrum, the company’s Isilon Scale-Out NAS solution can handle tens of petabytes of data, making it ideal for large-scale security applications such as city-wide surveillance and airport security. Dell EMC storage solutions are already proving successful at major international airports including Dubai and Abu Dhabi, each with a camera count in the 1000s.Dell EMC and BCDVideo together are ensuring our customers get the right solutions designed for the surveillance market” For Dell EMC, the new partnership means the ability to expand on this success in the enterprise market, leveraging BCDVideo’s surveillance expertise and high-level customer service to offer tailored solutions for lower-volume applications. Since its inception, BCDVideo has differentiated itself in the security space by providing a high level of IT service to integrators making the transition to IP systems. By combining resources, the partners will be able to service VMS and analytics companies, software vendors, and access control providers, as well as traditional business integrators. Ken Mills, General Manager Dell EMC Surveillance, explains: “Surveillance storage is not just about capacity, it is also about performance and reliability. Dell EMC and BCDVideo together are ensuring our customers get the right solutions designed for the surveillance market.” Accomodating For Growth BCDVideo is well placed to accommodate this anticipated growth. Last year, the company opened a new 51,000-square-foot global headquarters in Illinois, home to 90 separate stations within their Innovation Center where each system is customised according to integrator needs. The new facility allows for expanding business with new and existing partners in the security market.