Cargo security
The ASIS Foundation announces its findings of a comprehensive research endeavor led by esteemed researchers Ishmael Bhila, Peter Lee, and Alison Wakefield, shedding light on the multifaceted landscape of autonomous vehicles (AVs) within security contexts. The report, titled "Autonomous Vehicles: Threats, Risks & Opportunities," serves as a beacon for security practitioners, offering invaluable insights into the challenges and opportunities presented by the rapid advancement of AV techn...
OSI Systems announces that its Security division, a premier global provider of security and inspection systems, has secured an international contract award valued at approximately $100 million to provide cargo and vehicle inspection systems, as well as ongoing maintenance services and training. Deepak Chopra, OSI Systems’ Chairman and CEO, commented, "This award is a testament to the trust and confidence that our partners have in our technology expertise and customer service. We are excit...
Decision Sciences, a provider of advanced security and contraband detection systems, has created the new role of CCO to enable DSIC to capitalize on its unique and revolutionary non-intrusive inspection (NII) technology, to penetrate new global markets in port and border security, critical infrastructure protection, as well as many others. Kevin is a recognized expert and commercial pioneer with proven success in the security NII sector; he has held leadership roles in market-pioneering OEM com...
In the fast-paced world of logistics, the demand for efficiency, security, and innovation has never been higher. Logistics companies are constantly seeking ways to streamline operations and protect valuable assets. The era of safety and efficiency Vanma Access Control system has revolutionized the conventional security norms within the logistics industry, ushering in a new era of safety and efficiency. With its advanced features and seamless integration capabilities, Vanma has become an...
nShift, the pioneer in parcel delivery management software, announces the launch of Emissions Tracker. Calculating the CO2 emissions associated with each shipment, the new solution makes it possible for e-commerce and multichannel retailers to comply with sustainability disclosure rules, prove environmental credentials to customers, and see where they can reduce emissions from shipping. Emissions Tracker data helps retailers comply with emissions reporting rules, including the EU Corp...
inter airport Southeast Asia 2023 (IASEA), Asia’s international airport exhibition and conference, concluded on an upbeat note in Singapore. Held from 1-3 March 2023, the event featured a high-level conference and a sold-out exhibition featuring ground support equipment, airport operations & maintenance solutions, airside support services, and many more. A showcase of latest offerings Over the 3-day exhibition, IASEA saw 3,131 trade attendees and 150 exhibitors congregate at t...
News
Businesses must prepare for a double-digit increase in climate change hazards that impact physical security in the next year and could threaten supply chains, people, and finances, according to G4S’s World Security Report. Almost two-fifths (38%) of companies surveyed expect it to impact their company in the next 12 months, an increase of 11% in 2022. The warning comes as the COP28 climate conference continues in the UAE. Security-impacting hazard 1,775 Chief Security Officers (CSOs) in 30 countries at large global companies with total revenue of more than $20 trillion took part in the first-ever World Security Report. Climate change is the third most likely security-impacting hazard to affect companies in the next year after economic unrest (47%) and pandemics (40%). CSOs also anticipate that floods, wildfires, earthquakes, landslides, and tsunamis will all increase. Identifying potential threats Most companies tend to be reactive, addressing security threats only after they've struck" Noah Price, International G4S Academy Director said, “Climate change and natural disasters pose a significant threat to a company's physical security operations." "Most companies tend to be reactive, addressing security threats only after they've struck. It’s business critical that CSOs anticipate potential threats and prepare for them. No action or just reaction is not an option. Need for preemptive security measures “Being reactive often results in significantly higher financial and reputational losses compared to the costs of implementing robust, preemptive security measures." "Planning will ensure businesses are more resilient, safeguarding people and assets.” What do businesses need to do? One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work Contingency planning, investing in technology, and diversifying supply chains from climate change disruptions are three examples of the actions businesses can take. One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work, operational locations, and where employees reside. This should be regularly reviewed and updated. Risk evaluation “In light of the wildfires we witnessed around the world, it's imperative business leaders ask themselves: have we evaluated the risk of such events recurring?" "Have we proactively installed measures like sprinkler systems or perimeter defenses to mitigate future threats? Beyond physical infrastructure, it's crucial to consider the human element, how do such events impact our employees, their families, and their ability to work?" Price emphasized. Infrastructure to withstand environmental risks If supply chains are strategically diversified, threats to one region are less likely to affect production Businesses should invest in infrastructure that can withstand extreme weather events. Buildings that are reinforced, have flood protection systems, and fire-resistant materials will lessen the impact. Companies are facing up to US$120 billion in costs from environmental risks in their supply chains within the next five years. If supply chains are strategically diversified, threats to one region are less likely to affect production, manufacturing, or commerce reducing the overall impact on business productivity. Addressing the fragility of supply chains Mike Maltezakis, G4S Academy Supply Chain Specialist, said, “Recent droughts in the Panama Canal, flash flooding and extreme wildfires have highlighted the fragility of supply chains. The need for them to be resilient and as diverse as possible is increasingly necessary." “If you’re an e-commerce business, a supply chain disruption like the Panama Canal drought has the potential to be not only costly but leaves you and your products vulnerable to theft." Varied supply chain options The biggest security threat with this is that they use violence against staff and crew members to take what they want" "You could have millions of pounds worth of product sat in cargo that an Organized Crime Group (OCG) looks to take advantage of. And with droughts in the canal more likely, so is the likelihood that OCG bases itself nearby because they see a recurring opportunity." "The biggest security threat with this is that they use violence against staff and crew members to take what they want. Having varied supply chain options means companies are less at risk of being over-reliant on certain suppliers.” Predictive and aerial technology Predictive and aerial technology will be key to assessing the risks, and damage and enable key strategic decision-making. Over the next five years, 42% and 39% of World Security Report respondents are planning to use AI machine learning, and IoT devices in their physical security operations, respectively. Almost a quarter (24%) will use drones and unmanned aerial systems (UAS). AI and machine learning Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts AI and machine learning can be used for predictive analytics when looking at climate-related risks. For instance, AI can analyze vast amounts of data from past weather patterns, satellite imagery, and climate models to predict natural disasters with greater accuracy, enabling timely preventive measures. IoT, in real-time, can monitor environmental conditions. Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts flagging abnormal readings, which can indicate impending floods, droughts, or other climate threats. Unmanned Aerial Systems Unmanned Aerial Systems, i.e. drones and satellites, can assess the impact of climate events on infrastructure. Drones can provide aerial views of affected areas, helping businesses assess damage quickly and plan their response effectively. Concluding, Price said, “Businesses have a vital role to play in reducing climate change, but also in keeping their operations running, people and assets safe, and protecting themselves from a wide range of climate threats. ”
OSI Systems, Inc. announces that its Security division was awarded a contract valued at approximately $5 million from a Latin American customer to provide cargo and vehicle inspection solutions, including installation and integration support. Among the solutions to be provided are the Eagle® P60 high-energy, drive-through cargo and vehicle inspection system, Z Portal® high-throughput, drive-through inspection system, and the VM500 drive-through radiation monitoring portal. Vehicle inspection solutions OSI Systems’ Chairman and CEO, Deepak Chopra, stated, “We are pleased to further our ongoing efforts to enhance global security and proud to offer our leading systems, which are designed to deliver efficient and accurate inspection of cargo and vehicles at port and border crossings. Our advanced technologies and leadership in security solutions are key to meeting customers' evolving security needs.”
Often overlooked, storage for valuables, documents, and personal items deserves the same protection as offices, labs, or accommodation. Yet many access solutions leave these important access points poorly secured. Running two systems in parallel Intelligent electronic control often stops at the door, ignoring the critical safety needs of many forgotten openings. One common facilities management solution is to run two systems in parallel: electronic access for doors, and mechanical security for “non-door” openings which many electronic systems cannot accommodate. Challenges with multiple systems Users carry multiple credentials, so there is more chance they lose one However, running two access control workflows based on different technologies increases risk and complexity, and eats up admin time. Users carry multiple credentials, so there is more chance they lose one. Security teams must issue, track, and monitor multiple credentials and credential types. It creates an unnecessary hassle for everyone. A growing need for “non-door” security A cabinet or drawer lock fitted at relevant points, and integrated with the central system, can give many valuable assets the security they require. Once integrated with the system software, this electronic device can deter unauthorized access and reduce workplace theft which in the USA alone may cost businesses $50 billion each year. Enhanced cabinet security In the healthcare sector, enhanced cabinet security can protect medicines and confidential documents. In universities and schools, students and staff experience peace of mind when they can leave belongings in lockers in communal areas or changing rooms that are properly secured. Security concerns Many office users don’t have “their” desks, where confidential or valuable assets are stored safely In today’s more flexible workplaces, many office users don’t have “their” desks, where confidential or valuable assets are stored safely. They just use “a” desk. Unsurprisingly, according to business services provider Clutch, almost a quarter of coworking space users have security concerns. Easy to install, convenient, and economical The right cabinet security does more than just save management time. It also helps building users become relaxed about their belongings’ safety. How, then, can facilities managers identify the best devices, easy to install, convenient, and economical to run and integrate them without expense or hassle? Hardware solutions to integrate overlooked openings ASSA ABLOY offers a choice of security solutions for these forgotten access points. In many cases, multiple non-door locking types may also be integrated with a third-party system and managed together, to maximize the flexibility and efficiency of security admin. Aperio® KL100 Its tiny footprint and wire-free operation ensure quick installation without causing damage The new battery-powered Aperio® KL100, for example, secures lockers, cabinets, cupboards, drawers and more. It makes almost any small opening an integral part of an electronic access control system. Designed for minimal disruption to furniture, its tiny footprint and wire-free operation ensures quick installation without causing damage or making a visual impact. It integrates seamlessly with any new or existing access control system from over 100 different manufacturers and counting. Safe storage of documents Finavia, the operator of Helsinki Airport, must lock all types of openings, from doors and cabinets to fences and cargo. Devices all integrate seamlessly with their Lenel access control system. Check-in desks are fitted with Aperio KL100 locking, to ensure travel documents are stored safely. Audit trail capability simplifies the process of learning who accessed the storage and when. Easy to monitor This is much easier to monitor than mechanical key security, “When employees change, their access is disabled,” explains Kari Mäkinen, the airport’s Senior Access Control Specialist. “Or if the card is lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” SMARTair system SMARTair e-motion Cabinet Locks with integrated RFID readers work with a wide range of credentials At Funway Academic Resort, student accommodation in Madrid, a single SMARTair system provides flexible, reliable electronic protection for bedrooms, common areas, and student safes. No sensitive openings are overlooked. Part of the SMARTair® complete access control solution, SMARTair e-motion Cabinet Locks with integrated RFID readers work with a wide range of credentials. They offer convenient unlocking via smartphone and are easily managed together with wireless door-locking devices and electronic padlocks using SMARTair’s intuitive software. Programmable key-based security ASSA ABLOY also offers programmable key-based security for non-door openings such as gates, lockers, cabinets, and vending machines. With CLIQ® users enjoy the convenience of carrying just one programmable battery-powered smart key which unlocks every door or access point they are authorized to open. Access rights are managed efficiently with a choice of remote or locally installed software.
From 10 to 13 October, the global airport community will gather for the 24th edition of inter airport Europe at the Munich Trade Fair Centre in Germany. The event returns with an impressive line-up of well over 400 airport suppliers from 37 countries, including seven national pavilions and more than 100 new exhibitors. Live exhibits Visitors can look forward to plenty of live exhibits in the halls and Outdoor Area and a new 600 square meter GSE Experience Area. An exciting event program including Technical Seminars, Innovation Awards, and the co-located inter airport FOCUS, The Sustainability Summit provides interesting opportunities to further engage with new technologies and suppliers, all dedicated to improving airport performance while delivering a return on investment. New economic importance inter airport Europe has developed into the most senior gathering of global airport operators, airlines, CAAs, service suppliers The Munich Trade Fair Centre will once again turn into the world’s biggest hub for exploring and sourcing new technology, equipment, and services for better airports. Over nearly 50 years, inter airport Europe has developed into the most senior gathering of global airport operators, airlines, CAAs, service suppliers, investors, and other experts in this sector. The upcoming event marks another milestone for the airport industry which is currently rising to new economic importance with a multitude of opportunities and challenges. Airport professionals Airport professionals from more than 100 countries have already registered as visitors, including key representatives from AENA, Air France, Deutsche Lufthansa, Fraport AG, Heathrow Airport, İGA Istanbul Airport, Oman Airports, Shell Aviation, WISAG, and many more. Over four exhibition days, they can explore an excellent cross-section of technologies and services for the entire airport supply chain, including airside operations, terminal management, passenger services, baggage handling, safety and security, airport IT, air traffic control, airport maintenance, and environmental management. Insights into technology innovations Networking and knowledge platform on how to develop, embed, and integrate sustainability strategies An impressive program of accompanying events offers additional insights into technology innovations about wider market trends. These include Technical Seminars, Innovation Insight Sessions, the prestigious Innovation Awards, and the co-located inter airport FOCUS Sustainability Summit, a two-day, high-profile networking and knowledge platform on how to develop, embed, and integrate sustainability strategies into every aspect of airport life. Roadmap to airport operations “Co-locating exhibition and summit is an exciting opportunity for us to provide more value to the global airport community. Both events naturally complement each other, providing attendees with a great roadmap to future-proof their airport operations,” says Olaf Freier, Portfolio Director Transport of inter airport Europe, on behalf of show organizer RX. “The co-location offers new and encouraging perspectives that will help pave the way for innovation, resilience, and sustainability at future airports.” inter airport Europe at a glance: Indoor and outdoor stands with live equipment Over 30% of exhibitors are newcomers on the inter airport show floor, forming an impressive line-up A large show floor in halls B5, and B6, and the adjacent outdoor area invite visitors to discover more than 400 suppliers who deliver advanced airport equipment, technology, and services across the globe. The top five exhibitor countries are Germany, Italy, the United Kingdom, France, and the Netherlands, with 37 countries represented in total. Over 30% of exhibitors are newcomers on the inter airport show floor, forming an impressive line-up of well-known international brands alongside promising startups and scaleups. A new 600 square meter GSE Experience Area, sponsored by Weihai Guangtai Airport Equipment, will offer visitors the opportunity to see the latest equipment for aprons and runways live and in action. National Pavilions and First-time Exhibitors Several National Pavilions will feature this year – Italy, France, the UK, the Netherlands, Finland, and newcomer Spain, all showcasing some of their countries’ finest tech companies and products. Long-term show partner GATE (The Airport Technology Network) will be hosting a number of its members at their dedicated GATE Pavilion again. In addition, there will be two First-time Exhibitor pavilions specifically dedicated to companies new to inter airport Europe. Opening and Innovations Awards Ceremony The spotlight on best practices, technologies, and partnerships that drive innovation and excellence The inter airport Europe Innovation Awards celebrate the achievements of the many inventors and technical pioneers within the exhibitor community, putting the spotlight on best practices, technologies, and partnerships that drive innovation and excellence for better airports. The winners will be announced at the Opening and Innovation Awards Ceremony on Tuesday, 10th October, 11:00 - 12:00, at the Seminar Theatre in Hall B5. Welcoming presentations include speeches from Nicola Hamann, Managing Director at RX, Kay Bärenfänger, President at GATE Alliance, and Jost Lammers, CEO at Munich Airport. Seminar Programme: Three days of expert talks The free-to-attend inter airport Europe Seminar features a selection of technical talks on pioneering solutions and approaches to pressing airport issues, including the Innovation Insight Sessions featuring participants of the Innovation Awards. The 15-to-30-minute sessions will touch on key aspects of the passenger experience and passenger journey, baggage handling, security systems, as well as ramp and terminal management. The technical seminars will run between 10 - 12 October at the Seminar Theatre in Hall B5, stand B5-1580. Visit the show website for the full seminar agenda. inter airport FOCUS – The Sustainability Summit The Sustainability Summit offers two days of top-tier education, networking, and collaboration opportunities The co-located inter airport FOCUS – The Sustainability Summit offers two days of top-tier education, networking, and collaboration opportunities for aviation stakeholders looking to develop, discuss, or initiate sustainability measures required to reach their net zero commitments, including sustainable airport operations, net-zero infrastructure, and new mobility concepts. inter airport FOCUS takes place on 11 and 12 October at the Press Centre East Entrance (Rooms 1A, 1B, 2). The Summit tickets can be purchased online or on-site and also include free entry to the inter airport Europe exhibition and seminars. For the full summit program, please visit inter airport FOCUS. Visitor tools, Matchmaking Visitors are invited to use the Exhibitor List Tool and Online Show Preview to search for products and companies that are of particular interest to them. Once registered, visitors have access to the inter airport Europe Matchmaking Platform, allowing them to send or receive meeting invitations based on their business requirements. Meetings can be arranged at the exhibitor’s stand or in the dedicated meeting lounge in Hall B6, stand B6-590. Hosted Buyer Programme The Hosted Buyer Programme offers a tailored networking experience with industry pioneers The Hosted Buyer Programme offers a tailored networking experience with industry pioneers from airfield construction, ground handling, ground support equipment, interior design, hardware and software solutions, terminal infrastructure, and operations in the 2023 group. It focuses on growing markets and emerging regions, with buyers from UAE, India, Kenya, South Africa, Saudi Arabia, and Ghana, and it is an excellent opportunity to open up new markets for exhibitors. Venue, tickets, and opening times inter airport Europe 2023, the 24th International Exhibition for Airport Equipment, Technology, Design, and Services, takes place in halls B5, B6, and the adjacent outdoor area at the Munich Trade Fair Centre in Germany. Access to the exhibition halls is via Entrance East. Please visit the Online Travel Hub for further information on transport, accommodation, and visa. Show opening hours are from 9:00 AM to 5:00 PM on Tuesday, Wednesday, and Thursday (10 to 12 October), and from 9:00 AM to 3:00 PM on Friday (13 October). Visitors can register via the Online Ticket Shop and benefit from a reduced price when purchasing their ticket in advance. Day tickets cost €42 online or €52 on-site; season tickets cost €62 online or €72 on-site.
ISS (Intelligent Security Systems), a global provider of video intelligence and data awareness solutions, announced that industry veterans Dennis Connor and Jason Lloyd have joined the company as its new Director of Program Management NA and Regional Business Manager for the Midwest respectively. Dennis Connor's responsibilities Connor, who most recently served as Program/Project Manager for CX (customer experience) Initiatives at ADT, will spearhead the development of new end-user and partner deployment methodologies for ISS. He will simultaneously work with the company’s sales, engineering, manufacturing, and R&D teams to create and foster other customer engagement programs. Work experience Connor has an extensive background in similar initiatives throughout his time in the security industry, beginning in the early 2000s as Program Manager, Returns and Repairs Operations, at Tyco International. He would go on to work at the company in various leadership positions for the next 14 years, overseeing its transition from a Bermuda-domiciled organization with a U.S. headquarters in New Jersey to being a Swiss-based company. AI-powered video analytics ISS is in a tremendous position to take advantage of the third wave of video surveillance innovation" “As the preeminent developer of AI-powered video analytics globally, ISS is in a tremendous position to take advantage of the third wave of video surveillance innovation the industry currently finds itself in,” said Connor. “I have a lot of operational experience to bring to the table and ISS, in a sense, represents just a larger version of what I have gone through in the past establishing program management initiatives at other firms.” Jason Lloyd's responsibilities Lloyd, who most recently served as Regional Sales Manager at Vicon, will be responsible for driving the sales and business development efforts for ISS across the Midwest. Prior to Vicon, Lloyd headed up a low-voltage division at ADT for just over a decade. High-trust video intelligence solutions My goal is to exceed customer expectations and demonstrate how they can leverage our neural network technology" “Being laser-focused on customer service and providing high-trust video intelligence solutions that are solving actual security and business challenges today was one of the factors that most appealed to me about ISS,” said Lloyd. “My goal is to exceed customer expectations and demonstrate how they can leverage our industry-pioneering neural network technology to keep their businesses safe.” Matt comments “ISS is experiencing incredible growth, not only in North America, but globally, and bringing in experienced team members will be critical to our continued growth,” explained Matt Powell, Managing Director for North America at ISS. “With Jason, we gain a well-respected face, and voice of our partners, in the Midwest. And in Dennis, we gain an experienced program manager who will ensure that we speak the language of success to our integration partners and customers alike." Integration in the value chain The experience of both Jason and Dennis shows that we are dedicated to a new approach to the North American market" "Solution creators must strive to do a better job of speaking ‘integration’ to our integrators, pulling them into the value chain instead of pushing them out." "That begins with the relationships we build and our value propositions to our partners and customers. The experience of both Jason and Dennis show that we are dedicated to a new approach to the North American market and continued growth of ISS.” Education Connor, who has a degree in industrial engineering from Virginia Polytechnic Institute and State University and is also Six Sigma/Lean DMAIC Master Black Belt and Scrum Master certified, resides in Orlando. Lloyd, PSP, PMP, who is based in Chicago and holds Lenel Master and Genetec certifications.
Matrix, a prominent provider of Telecom and Security solutions, eagerly anticipates showcasing its range of security and telecom products at IREE 2023. This event is scheduled from 12th to 14th October 2023 and is dedicated to innovative security solutions. The venue is Booth No. 2.120, Pragati Maidan, New Delhi, India. Matrix is the first company to offer RDSO 6.0-compliant cameras for Indian Railways. Matrix cameras are certified by STQC, Delhi lab for following the OWASP ASVS 4.0 mandated by RDSO for cyber security. EN50155 compliant Matrix Cameras are designed to ensure that the data gathered by the cameras is secured against cyber threats both at the time of transmission and storage. Matrix will unveil its cutting-edge IP Video Surveillance solutions at this exhibition, encompassing enterprise-grade VMS, NVRs, and IP cameras with resolutions reaching up to 8 MP. Their latest camera in the range is ruggedized cameras that are EN50155 compliant. The cameras are anti-vibrant and shock-resistant making them ideal for roadways and railways. The comprehensive solution focuses on addressing three key client concerns: managing bandwidth and storage expenses, simplifying centralized video surveillance complexities, and offering proactive security measures. Matrix PTZ series 2MP cameras The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedized Cameras In a recent addition to its diverse range of IP cameras for comprehensive security, Matrix introduces the ruggedized camera. Matrix ruggedized IP cameras cater to transportation's dynamic needs with high-quality video, low-light sensitivity, and versatile features for rail and roadway monitoring. It can capture images of vehicles moving in Zap Speed. The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedized Cameras. Matrix also features PTZ cameras, enabling full 360-degree security coverage by enabling pan-tilt-zoom functions in multiple directions for extensive area monitoring. The Matrix PTZ series 2MP cameras with 25x/33x and 5MP Cameras with 42x optical zoom options enhance image clarity and surveillance efficiency. Project Series 5MP Cameras Furthermore, Matrix will also introduce its existing line of Project Series Cameras, specifically designed for large-scale organizations and project-based scenarios. The Project Series 5MP Cameras come with UL Certification, a globally recognized safety standard, and NEMA Certification, ensuring resilience against environmental threats. These cameras offer high-resolution imagery for enhanced clarity and protection. Advanced surveillance systems demand robust video recording solutions with ample storage capacity and redundancy to ensure continuous 24/7 surveillance with minimal downtime. Matrix addresses this need with its new ENVR line, capable of supporting up to 256 channels and boasting a storage capacity of up to 144 TB. Attendees of the event will have the opportunity to experience this innovation firsthand. SATATYA SAMAS range of solutions Matrix showcases the COSEC PANEL200P-a site controller ruling key operations for buildings To enhance proactive video surveillance capabilities, visitors can explore the SATATYA SAMAS range of solutions by Matrix, featuring features like tripwire, intrusion detection, motion detection, no-motion detection, and more. Within the realm of access control, Matrix will showcase the COSEC PANEL200P-a site controller overseeing access operations for entire buildings. This versatile controller functions in two distinct architectures: acting as a bridge between controllers and servers in network architecture, and operating autonomously without a server in Standalone Architecture. Its user interface can efficiently manage 255 COSEC door controllers and accommodate up to 25,000 users. COSEC ARC DC200P door controller Furthermore, Matrix will introduce the COSEC ARC DC200P door controller, an innovative IP-based access control terminal with several advantages over traditional models. Leveraging Power over Ethernet (PoE) eliminates the need for complex wiring and local power sources. Its compact design, offering both din rail and wall mount options, makes it suitable for even space-constrained environments. Matrix will raise the COSEC ARC DC200P door controller, an inventive IP-based access controlMatrix's display will also feature the robust biometric door controller-VEGA FAX, boasting multiple connectivity options including Wi-Fi, PoE, and ethernet. The company will also present the COSEC ARGO FACE, a sophisticated face-based door controller renowned for its precise, swift, and reliable recognition capabilities, powered by cutting-edge AI-driven deep learning technology. Author's quote Kaushal Kadakia, Marketing Head, states, “IREE will provide an excellent opportunity for exhibitors to demonstrate our innovative security products for various industrial verticals. With a large crowd set to attend, we expect to meet some key decision-makers to advance our creative solutions. We look forward to understanding their organizational needs and showing them how our solutions will help them improve their security experience.” Matrix cordially invites to visit IREE 2023 from 12th to 14th October 2023 at Booth No. 2.120, Pragati Maidan, New Delhi, and get a hands-on experience with its enterprise-grade security solutions.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defenses, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitization of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of Cyber Resilience in Protecting Service Availability Cyber resilience refers to organization's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organization's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimizing the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimized, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organization. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorized individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorized access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organizations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organizations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labeled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organizations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organizations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organization can respond quickly and effectively to a breach, minimizing its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organizations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Case studies
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travelers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognizing this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritize security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered, and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker, or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
360 Vision Technology, the UK manufacturer of ruggedized HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a historically important English Heritage site, at the Transit Shed, Exeter Quayside. Installed by Select Electrics and specified by Derek Maltby of Global MSC Security, the inclusion of additional CCTV was required to monitor the Exeter Quayside area, covering the canal side, shops, restaurants, bars, and attractions. Security and safety Kevin Tyrrell, CCTV Technical Manager for Select Electrics explains the requirement for an expansion to the current CCTV system, “With accessible funding granted from a successful Safer Streets 2 application, Exeter City Council looked to expand the surveillance coverage of the Quayside area and integrate it into the existing town center CCTV network, for monitoring at the Exeter City Council control room." “Coverage was required to provide safety and security surveillance in an area that is popular with both locals and visitors. Additionally, as the Quayside includes a canal side, should coverage of the canal be required in an emergency, high-definition footage of any incident here would be advantageous.” High-definition images We required a camera that would provide reliable HD images but also one that would withstand high winds" With all these requirements considered and the tender bid successfully accepted by the council, Select Electrics was selected to implement the expansion of surveillance coverage. “To cope with the harsh conditions to be found at Exeter Quayside, we required a camera that would not only provide reliable high-definition images but also one that would withstand high winds and rain, that can combine to make a difficult operational environment for electronic equipment, such as a CCTV camera,” continues Kevin. Camera applications “We’ve enjoyed a long-term technical relationship with 360 Vision Technology for several years, having employed their camera technology in many varied applications, and based on this experience, we were confident in their ability to provide a camera that could satisfy our demanding requirements.” “Additionally, and further complicating matters regarding the installation of cameras, many parts of the Quayside area are historically important, such as the cobbled areas and streets, as well as the English Heritage-protected Transit Shed, which occupies a large part of the area.” Need for an alternative solution The logistical effects of installing traditional CCTV infrastructure were considered too disruptive and expensive" The centerpiece for many music, dance, and street theatre events held in the area, the Transit Shed is an open-plan building set on cast iron uprights, historically, used to store cargo unloaded from ships. “The historically important parts of the area could not be disturbed,” adds Derek Maltby. “The logistical effects of installing traditional CCTV infrastructure, such as fiber cabling under streets and a network of CCTV cameras on poles was considered too disruptive and prohibitively expensive so an alternative solution needed to be found.” Perfect line-of-sight “We have always had a great relationship with the research and development team at 360 Vision and this project was no different." "We had identified the Transit Shed as a possible location for the siting of a single PTZ camera, where it would have a perfect line-of-sight to all of the areas that required coverage on this project, but we knew that any camera mounted on, or near the Transit Shed would have to meet strict English Heritage requirements, including a specific body color, to match the exact heritage hue of the Transit Shed, to blend within the historic architecture." Invictus TX wireless camera Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera" “We outlined the technical requirements and restrictions of the project to the team at 360 Vision and were delighted with their enthusiasm and technical understanding of the demanding requirements of this installation." "Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera but in a one-off specific color, specifically matched to blend with the painted roof of the Transit Shed.” Key features of the camera With a continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus camera can deliver unhindered views to the control room and for night-time vision, is equipped with on-board LED white light technology. Considering camera performance, unlike many other camera products that utilize ‘belt-drive’ PTZ systems, Invictus incorporates ultra-reliable and extremely quiet Direct Drive mechanisms, resulting in consistent pre-set accuracy and long-term reliability for its installation at the Quayside. HD and ultra-low-light camera imaging The camera is designed to provide trouble-free service in harsh Quayside conditions The Invictus TX’s high-performance, ruggedized PTZ camera with full 1080P HD and ultra-low-light camera imaging technology, made it the perfect choice for deployment in this application. Supplied in a specific green Pantone reference, the camera is designed to provide years of trouble-free service in harsh Quayside conditions and provides comprehensive coverage of the area, at a fraction of the cost of multiple traditional units and associated traditional hard-wired transmission infrastructure. Day and night surveillance “In operation, system operators can instantly switch on the LED white light mounted onboard the Invictus camera, to illuminate the scene and inform people at the Quayside that they are being monitored, both for security and safety purposes, for example, if anyone falls into the water at the Quayside at night,” adds Dennis Cavanagh, Control room Operations Manager, Exeter City Council. “Since the 360 Vision Invictus TX camera has been added into the system, we have had many positive comments from residents and local businesses, complementing the non-invasive nature of the color-matched camera in the historical surroundings and confirming the feelings of security the camera coverage now provides to the area both during the day and night.” Increase surveillance coverage The combined Invictus TX camera and integrated LED white light technology make it the perfect choice" The Invictus camera on the Transit Shed is part of a wider project to increase surveillance coverage and improve image quality across the Exeter CCTV network, with over 40 cameras already installed to either replace existing cameras or extend coverage to new areas, as part of a rolling program of improvement made possible by funding from Safer Streets Fund. Jason Wyatt, National Account Manager at 360 Vision Technology says, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the technically demanding environment at the Exeter Quayside." Surveillance upgrade "Invictus’ ultra-low light technology from 1/1.9’’ ULL sensors also delivers brighter, crisper, and more defined color images at night, for the ultimate performance at the Quayside." "We are proud to have delivered a bespoke Invictus camera version in a one-off colour, to enable use on the English Heritage protected Transit Shed, as part of an overall upgrade to the Exeter City Council city-wide CCTV network and its ongoing surveillance upgrade using 360 Vision’s Invictus cameras.”
Yalova Terminal is a roll-on roll-off (“ro-ro”) port, meaning it is designed to carry wheeled cargo. It is Turkey’s 63rd border gate and began operations in 2017. It covers 80,000 square meters with a 500-trailer capacity and 16,000 square meters of storage, which includes an ADR warehouse for the storage of hazardous goods. On-site there are X-ray facilities, a laboratory for customs, offices, and break rooms for drivers. All of these facilities require continuous monitoring to protect staff, drivers, and the stock contained within the trailers at the port. Monitoring 24/7 The Yalova Ro-Ro Terminal team was looking for a way to intelligently monitor activities at the port and quickly search footage for investigations if needed. Because of the size of the port, an efficient way to store and deliver video footage back to the control room and server rooms was also sought. AI-enabled cameras reduce false alarms Cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention The team turned to installer Arte Teknoloji and Hanwha Vision to provide a robust and AI-enabled video surveillance solution comprising 48 PNO-A9081R cameras, 17 XNO-C7083Rcameras, and 7 XNP-6400RW cameras. With AI analytics carried out on the device, the cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention. This frees them up to focus on other responsibilities, while the cameras constantly scan for relevant objects or possible incidents that require human input. Potential false alarms from video noise, waving trees, moving clouds, and animals are ignored by the cameras, helping to reduce operator fatigue and frustration. Effective perimeter protection In particular, the XNP-6400RW PTZ Plus camera provides a feature-rich PTZ camera that is designed for perimeter protection. With AI-based object auto-tracking, operators can efficiently monitor the movement of objects while remaining hands-free to control other cameras. This analytics feature is supported by leading AI algorithms unique to Hanwha Vision. The camera captures evidence-grade images of objects up to a distance of 200 meters in all lighting conditions, with the help of adaptive IR technology which adjusts the angle of the camera’s IR LEDs to match the level of zoom. Object detection and classification for accurate responses Object classification based on attributes can also support quick forensic searches for future investigations The PNO-A9081R is a 4K bullet AI camera that can detect people, faces, vehicles, license plates, plus their attributes. This allows operators to understand who, and what vehicles, are entering and exiting the site, particularly around the perimeter or rolling on and off ships docked at the port. They can quickly respond to possible intrusion or unusual behavior, reducing the risk of stock, equipment, or vehicle theft. Object classification based on attributes can also support quick forensic searches for future investigations. BestShot feature The cameras also detect loitering, audio such as shouting or screaming, tampering with the camera itself, and shock detection. The BestShot feature automatically chooses the best images of an object, helping with bandwidth and storage efficiency as well as delivering high-quality, detailed images back to the control room. Robust video system Having the best security, that’s intuitive to use and easy to install, was essential" Eyup Tetik, Corporate Sales Manager at ENTPA ELEKTRONİK A.Ş. explains, “It was important to the Yılport Ro-Ro team that they had a robust video system that improved situational awareness and response times, especially after the devastating earthquake in Kahramanmaraş." "As a busy international Ro-Ro Port with millions of dollars of stock and equipment, having the best security, that’s intuitive to use and easy to install, was essential.” Steering ahead The installation is part of the new port area and the security team looks forward to reaping the benefits of the efficiency gains, greater awareness, more detailed investigations, and faster response times as a result of the AI-powered video system.
At Scheveningen Harbor in the coastal city of The Hague in the Netherlands, an AI-based video security system from Bosch Building Technologies is now ensuring that every single ship or boat entering or leaving the harbor is logged. The customized solution developed by Bosch together with its partner BrainCreators automatically registers and classifies shipping traffic. Intelligent security solution Until now, employees at the port control center had to keep an eye on shipping traffic around the clock from the window of the control center and manually record the 80 or so vessels that pass through the port every day. The city council of The Hague to quickly find a tailor-made solution for the port of Scheveningen The reason for the investment in the intelligent security solution was the fear that criminals would seek alternative routes via smaller ports such as Scheveningen, now that large Dutch or Belgian ports such as Rotterdam and Antwerp have been more secure against smuggled goods for some time. This was reason enough for the city council of The Hague to quickly find a tailor-made solution for the port of Scheveningen. Challenging task in Scheveningen Special conditions require individual solutions Most boats and ships entering the port of Scheveningen are not required to register and, unlike purely commercial ports such as Rotterdam, the port cannot simply be closed off. In addition to cargo ships, there are also fishing boats and private sailing yachts at anchor, with small dinghies and rowing boats cruising between them. Keeping track of the movement of goods in particular is therefore a challenging task in Scheveningen, where the video security system with intelligent video analysis installed by Bosch provides welcome support. Author's quote The requirements for this project were very specific because the shipping traffic not only had to be filmed" "The requirements for this project were very specific because the shipping traffic not only had to be filmed, but also registered and classified. The solution also had to provide information about the speed of travel," says Niels van Doorn, Senior Manager Solutions & Portfolio at Bosch Building Technologies in the Netherlands. "Standard software can't do that. Together with our partner, we have therefore developed an AI that can identify and classify ships of all kinds–from passenger ships and freighters to sailing yachts and inflatable boats." This data aids in identifying suspicious shipping movements. Flexidome IP starlight 8000i cameras No sooner said than done – and in the shortest possible time Development, planning, and implementation only took around 12 months. Two intelligent video cameras at the mouth of the harbor now record the traffic. The specially developed AI classifies the ship types and registers them in a file. Due to the difficult lighting conditions in the port, the Flexidome IP starlight 8000i cameras from Bosch were chosen. They deliver detailed images even in challenging weather and lighting conditions and enable the staff in the control center to see every detail, even in very bright or dark image sections. Ships that are not seen in real-time by the personnel on duty appear as still images on the screen All boat identifiers are recorded, documented, stored and automatically provided with additional information on date and time, direction of travel and speed around the clock using AI. The streams from the cameras are fed directly into a video management system. Ships that are not seen in real-time by the personnel on duty appear as still images on the screen. By analyzing all the data, peak times, ship types, trends and deviations from the norm are determined. New video documentation "The dashboard gives staff an overview of all activities in the port. The software protects the privacy of the people recorded by making their faces unrecognizable. The new video documentation now provides solid evidence and helps to identify suspicious and unusual situations more quickly and effectively," says Ferry Ditewig, Business Development Manager at Bosch Building Technologies in the Netherlands. The video solution is also well equipped for future challenges and can be flexibly expanded as required: for example, additional information from external sources could be integrated, such as meteorological data, tides, or the automatic identification system (AIS) for exchanging ship data.
OSI Systems, Inc. (the ‘Company’ or ‘OSI Systems’) (OSIS) has announced that its Security division was awarded a contract from an international airport for approximately $18 million to provide various checkpoint and hold baggage screening solutions. Among the systems to be provided are the RTT®110 (Real Time Tomography) explosive detection system for screening hold baggage, Metor® Walk-Through Metal Detector, and Itemiser® 5X explosive trace detection system for secondary screening of passengers. OSI Systems' checkpoint and hold baggage screening solutions The Company is also engaged to provide comprehensive multi-year maintenance, service, and support As part of this award, the Company is also engaged to provide comprehensive multi-year maintenance, service, and support. OSI Systems, Inc.’ Chairman and Chief Executive Officer (CEO), Deepak Chopra, commented, “We are delighted to work with this major airport customer and look forward to providing our inspection system platforms with advanced technologies that are designed to achieve the highest airport security standards, enhancing both the safety and the overall experience of air passengers.” OSI Systems, Inc. OSI Systems, Inc. is a vertically integrated designer and manufacturer of specialized electronic systems and components for critical applications in the homeland security, healthcare, defense, and aerospace industries. The Company combines more than 40 years of electronics engineering and manufacturing experience with offices and production facilities in more than a dozen countries, in order to implement a strategy of expansion into selective end product markets.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadArtificial Intelligence
Download