Cargo security
OSI Systems, Inc. announced that its Security division received an order from an international customer for approximately $10 million to provide the Company’s Z Backscatter® Van (ZBV®) cargo and vehicle inspection systems including follow-on maintenance, training, and support. These inspection systems are expected to be deployed for border customs applications. Advanced security solutions OSI Systems’ Chairman and CEO, Deepak Chopra, commented, “We look forward to de...
Delkia is launching its Dragonfly program at Farnborough 2024. This is an innovative project to develop uncrewed air systems and advanced air mobility prototypes. This could offer cost-effective and low-carbon solutions to replace some of the tasks currently performed by larger, more costly aircraft. A model of Project Dragonfly Mark 1 experimental aircraft will be on display on Delkia’s stand,1025, at Farnborough. Aerospace and maritime sectors Kurt Canfield, CEO of Delkia, said,...
As versatile as the IDS industrial camera families are, sometimes customer requirements are so particular that a customized development would be desirable. However, this often only makes sense for larger quantities. For this reason, the company has developed the uEye ACP series: its modular design principle allows for a vast range of camera variants. The online configurator helps to assemble unusual models available from stock. True to the philosophy: be uncompromisingly happy instead of making...
FPT Industrial, the Iveco Group brand dedicated to the design, production, and sale of low-environmental impact powertrains, will travel to Hanover to attend IAA TRANSPORTATION 2024. On-road and industrial applications The trade show for logistics, commercial vehicles, buses, and the transportation industry will take place from September 17 to September 22, 2024, at the Deutsche Messe AG venue. As a pioneer in on-road and industrial applications, FPT Industrial wants to harness its participat...
Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based access control solution developed to radically simplify the needs of small and growing businesses. By connecting the Centrios mobile app with Centrios smart readers and locks, owners and managers can quickly and easily manage access for all employees and visitors in one place. Small and growing businesses The first shipme...
Westminster Security Group, a renowned name in private security, announces a strategic investment in Tratix, an innovative technology company based in Tel Aviv. Tratix, founded and led by seasoned entrepreneur - Sharon Rashty, specializes in cutting-edge solutions to help prevent cargo theft. With a distinguished background in Israeli Intelligence services and building early-stage startups, Sharon Rashty brings a wealth of experience to Tratix. Her expertise in tailing detection, counter-survei...
News
Yarden Gross, CEO and Co-founder of maritime technology start-up Orca AI champions the rapid – but responsible – deployment of smart, cost-effective digital tools to tackle climate challenges in the shipping industry. Leveraging machine learning and data insights, AI solutions are a vital front line in reducing fuel consumption and emissions. AI solutions "AI solutions are crucial for squeezing every last drop of efficiency out of the existing fleet amid increasing pressure to decarbonize," said Gross, responding to the 2024 annual disclosure report released on June 13 by the global transparency initiative Sea Cargo Charter (SCC). The SCC, representing 20% of global bulk cargo transport, aims to integrate climate considerations into chartering decisions and enhance transparency on emissions. 2024 report highlights The 2024 report highlights a notable gap between current emissions and the IMO’s net-zero strategyThe 2024 report highlights a significant gap between current emissions and the IMO’s net-zero strategy for 2050, with the shipping industry falling short of its climate target by 17% in 2023, equivalent to 165 million metric tonnes of CO2e. "Currently, dry bulk, general cargo, and tankers account for around 400 million tonnes of CO2 emissions. With global trade predicted to quadruple by 2050, emissions will skyrocket without urgent action," the SCC wrote, stressing the importance of routing optimization and other strategies to improve vessel performance. Situational awareness and real-time alerts "Our figures estimate that global commercial shipping could cut carbon emissions by 47 million tonnes per year by deploying AI for sea navigation," said Gross. Referring to Orca AI's computer-vision solution, he says enhancing situational awareness and providing real-time alerts to support early decision-making by crews can significantly reduce the need for sharp maneuvers and route deviations resulting from close encounters with high-risk marine targets like vessels, buoys, and sea mammals. AI digital watchkeeping "Sharp maneuvers and route deviations markedly increase fuel consumption," Gross said. "And we estimate that reducing them could help ships shave off 38.2 million nautical miles per year off voyages, saving an average of $100,000 in fuel costs per vessel. Additionally, AI digital watchkeeping could reduce close encounters by 33% in open waters." Impact of digital transformation He highlights data captured for MMSL as an example of what customers might achieve; for one bulk carrier equipped with Orca AI, the ship-owning wing of Japan's Marubeni Corp logged a 67% reduction in close encounters and a 42% increase in average minimum distance in open waters over three consecutive quarters, resulting in an estimated annual fuel saving of $86,000. Despite AI being in its early stages, Gross is confident in its potentially massive impact on shipping's digital transformation. "With continued transparency and targeted innovation leveraging AI tools, I fully endorse the SCC's optimism that we can navigate a more sustainable future," he concluded.
OSI Systems, Inc. announced that its Security division was awarded a contract from an international airport for approximately $42 million to provide a range of checkpoint and hold baggage screening solutions. Maintenance, service, and support Among the systems to be included are the RTT® 110 (Real Time Tomography) explosive detection system for screening hold baggage, Orion® 920CT (Computed Tomography) checkpoint screening system integrated with Rapiscan TRS™ (Tray Return System) for inspecting carry-on items, and the 935DX large tunnel systems for screening air cargo and pallets. As part of this contract, OSI Systems is also responsible for comprehensive multi-year maintenance, service, and support. Enhancing safety and security OSI Systems’ Chairman and CEO, Deepak Chopra, commented, "We're pleased to have received this large aviation order and are excited about supplying our long-standing customer with our pioneering security products." "These technologies have been designed to meet critical international airport security standards and enhance safety and security.”
Airport Show is all set for a smooth take-off for its 23rd edition on May 14 at the Dubai World Trade Center (DWTC) with key stakeholders utilizing the annual exhibition dedicated to the Middle East, Africa, and South Asia (MEASA) to explore and embrace new technologies and innovative products to handle the fast rebounding air passengers and cargo traffic. Airport passenger expectations The participants will also have their focus and attention on products and services designed to transform passenger expectations at airports, ease of flying, and enhance safety and security. The trademark annual B2B platform will bring to the Middle East’s vibrant aviation market four co-located events - Air Traffic Control Forum, Airport Security Middle East, the Global Airport Leaders Forum (GALF), and the Women in Aviation (WIA) Middle East Chapter Conference. Three-day trade-only exhibition The exhibition will provide opportunities to explore, experience, and source several advanced airport technologies The three-day trade-only exhibition will provide opportunities to explore, experience, and source several advanced airport technologies, innovations, and solutions along with networking with business pioneers and market movers. Organized by RX, the London-based company that hosts over 400 events in 22 countries across 42 industry sectors, the much-look-forward-to business platform will see over 6,000 decision-makers and professionals making their way to the three massive exhibition halls at a time when airports across the world are packed to their capacities. International passenger traffic The ever-surging passenger movement has prompted the Airports Council International (ACI), the trade association whose members operate 1925 airports in 171 countries including the DXB, the world’s top airport for international passengers, to claim that 2024 will be “a milestone for global passenger traffic recovery as it reaches 9.4 billion passengers, surpassing the all-time high 9.2 billion passengers handled in 2019. International passenger traffic is forecasted to grow to 4.4 billion international passengers in 2026. Aircraft movements are forecast to grow to 111.6 million by 2026. Airports worldwide will see 153.8 million aircraft movements by 2041. Business Connect Programme More than 150 exhibitors from over 20 countries will participate in the exhibition which will feature four country pavilions and over 120 buyers from more than 35 countries. The trade gathering will host 3,500-plus meetings under its popular Business Connect Programme. Attendees in participation Siemens, Honeywell, TLD, Aviramp GSE, ITW GSE, ADB Safegate, and Airport Labs are among the exhibitors Global companies like Smiths Detection, emaratech, Siemens, Honeywell, TLD, Aviramp GSE, ITW GSE, ADB Safegate, and Airport Labs are among the exhibitors. Among the key airport project pioneers participating include Air India SATS Airport Services, Airports of Thailand, Angkasa Pura Airports of Indonesia, Armenia International Airports, Singapore’s BOC Aviation, CAAB of Botswana, Egyptian Airports Company (EAC), Erbil International Airport, Hong Kong International Airport, Mactan- Cebu International Airport Authority, New Delhi Airport, Ntech Aviation of South Africa, Pakistan Civil Aviation Authority, Uganda Civil Aviation Authority, and Yerevan Zvartnots International Airport of Armenia. In-event networking and knowledge enhancement Innovation Trail, GSE Zone, Innovation Hub, and Youth in Aviation will provide in-event networking and knowledge enhancement opportunities. The four co-located events will see 60-plus speakers speaking on diverse topics, including Sustainability at Airports, Passenger Experience, Ground Handling, Airport Security, and Air Traffic Management (ATM). Being held under the patronage of His Highness Sheikh Ahmed bin Saeed Al Maktoum, President of the Dubai Civil Aviation Authority, Chairman of Dubai Airports, Chairman and Chief Executive of Emirates Airline and Group, it is being supported by the Dubai Civil Aviation Authority (DCAA), Dubai Airports, Dubai Aviation Engineering Projects (DAEP), Emirates Airline and Group, Dubai Air Navigation Services (dans) and dnata, one of the world's largest air services providers with services across five continents. DXB expansion The show is taking off as one of the three biggest airports in the world unveiled its ambitious expansion plans. In a fast-forward mode to handle zooming passenger numbers, the expansion of Dubai International Airport (DXB), the world’s busiest airport for international passengers for 10 consecutive years with 87 million passengers in 2023, will require US$2. 7 billion. That will make it stand out among the Middle East airports that will be handling 1.1 billion passengers by 2040. Sheikh Ahmed asserted that Dubai will undoubtedly become ‘The World’s Airport’ and the city will be an expanded global hub for an impressive number of industries including aviation, tourism, technology, and education. Dubai's airport terminal plans The US$35 billion Al Maktoum International Airport is envisaged to have a capacity for 260 million passengers In April-end, Dubai unveiled plans for the construction of the world’s largest airport terminal. The US$35 billion Al Maktoum International Airport is envisaged to have a capacity for 260 million passengers upon completion, five times the size of the current DXB. All operations at DXB will be transferred to the massive facility over the coming years. Once completed, Al Maktoum, which opened in 2010, will be the new home for Emirates Airlines with the airport boasting five parallel runways and 400 aircraft gates. Technology and innovative systems The participation in the Airport Show will provide excellent opportunities for airport security whose global market size will reach US$26 billion by 2030, according to Spherical Insights & Consulting. The participants will be updating their knowledge about technologies that facilitate smooth passenger screening facilitation, checkpoints, and baggage surveillance. Airports have been focusing on acquiring technology and innovative systems that keep glitches and shortcomings at a distance. Their search will also be ways for handling cybercrimes and explosive devices, filling up the gaps, and improving the systems and procedures. IATA-led workshop May Ismail, Event Manager at RX, said, “Along with concentrating on the picked-up pace of passenger and cargo business, the airport industry is focused on massive expansions and phenomenal improvements to be at the cutting edge of the game in the coming decades." "Their search for everything they want stops at the Airport Show. This year, we will have 20+ first-time exhibitors. We will be hosting for the first time an IATA-led workshop as a by-invitation event." Sustainability and Innovation It had been predicted that processes within airports will be fully autonomous by 2050 along with zero-queue terminals Organizers have appropriately chosen this edition’s theme - Sustainability and Innovation – as the industry players' focus has shifted to embracing cutting-edge technology and greener initiatives to drive growth and efficiency while grappling with the complexities of rising passenger volumes, changing governmental regulations changing assessment of potential risks. This is much needed as global consultancy Oliver Wyman predicted more than 19 billion passengers will pass through world airports each year by 2040, and the global commercial aircraft fleet be over 36,000 aircraft seven years earlier. It had been predicted that processes within airports will be fully autonomous by 2050 along with zero-queue terminals. Several companies have expressed their views about their association with the Airport Show. Enhancing efficiency and safety Jaffar Dawood, Senior Vice President, of Airport Operations UAE, and MEA, dnata, said, “We’re pleased to showcase our offering at the Dubai Airport Show during a time of remarkable growth throughout the region." "Our advanced equipment on display demonstrates our commitment to continually investing in our operations to enhance efficiency, safety, and sustainability. We look forward to meeting with our partners and fostering connections at this prestigious industry event.” Alternative fuel solutions B. Tarik Özeler, Export Sales Manager at BMC said, “As the sole manufacturer of Apron Buses in Turkey, we are actively enhancing our product range with various alternative fuel solutions and are in talks with pioneering ground handling service companies across Turkey, Europe, the Middle East, and Africa to expand our offerings." "To boost production and enhance the Apron Bus range, we are engaging with pioneering engineering firms in Europe and manufacturers in the Far East for joint venture collaborations.” Streamlining operations Tamer Samy, Sales Director for Middle East at ADB SAFEGATE said, “Technology and innovation have played crucial roles in transforming airports across the Middle East and South Asia into smart hubs." "These advancements have streamlined operations, enhanced passenger experiences, and improved overall efficiency." Airside 4.0 solutions "Our company is a pioneer in driving airports towards smarter functionalities with comprehensive solutions including airfield lighting, power systems, airport, and tower software, docking automation, apron management systems, and aftermarket services." "Our Airside 4.0 solutions not only enhance operational efficiency and safety standards but also elevate the passenger experience. The Airport Show is a pivotal platform for us to showcase our latest products and connect with industry pioneers, airport operators, and stakeholders.” Flexible digital solutions Bruce Bowman, Strategic Advisor & Project Director at Cairn Consulting, the Aviation Consultancy Partner, said, “A primary challenge for airports is the strict regulatory and infrastructural environments that often delay the adoption of new technologies, preventing them from aligning with the rapid innovations seen in domestic digital commerce." "At Cairn Consulting, we are committed to navigating these challenges, advocating for regulatory reforms while pioneering flexible digital solutions that enhance both efficiency and the consumer journey, ultimately aligning airport experiences more closely with cutting-edge consumer market trends." AR, VR, and LLM applications "We are exploring futuristic applications of AR, VR, and Large Language Models (LLM) to enhance passenger interaction with airport services, foreseeing a future where these technologies make airport stays more enjoyable and interactive, thus redefining what airports can offer beyond the traditional." "As airports refresh, renew, or build new infrastructure, incorporating these technologies from the ground up, will be crucial to creating spaces that are truly futuristic and responsive to the next generation of traveler needs.”
The 23rd edition of the Airport Show was the venue to showcase and introduce new technologies and services in ground handling, cargo movements, and airport operations to foster agility as well as sustainability. More than 30 new innovators joined the Airport Show to introduce their cutting-edge technologies and services. Innovations introduced were a major draw at the Show, which attracted thousands of trade visitors and stakeholders. Helipad Systems Supplies Ground handling service providers and air navigation service providers, participating in the Airport Show received overwhelming response from the industry as well as trade visitors. Global Air Navigation Services (GANS), the only private sector air navigation services provider in the region certified by the UAE’s General Civil Aviation Authority (GCAA), displayed its capabilities in the engineering of Heliport Facilities and Helipad Systems Supplies and Installation. GSE Zone, in partnership with dnata, witnessed the showcasing of innovations presented by ground-handling equipment manufacturers. GSE Zone at Airport Show 2024 Mallaghan trucks This innovative choice aligns seamlessly with Dnata's dedication to environmental responsibility Big players like dnata showcased Mallaghan's cutting-edge trucks for catering operations, highlighting its commitment to sustainability. By opting for Mallaghan trucks equipped with EURO 6 technology, dnata achieves an impressive 80% reduction in emissions compared to EURO 5 standards, along with a 66% reduction in permitted particulate mass. This innovative choice aligns seamlessly with dnata's dedication to environmental responsibility and engineering excellence. Tisabas Operation, Towbarless tractor dnata also showcased ‘Tisabas Operation’, a folding baggage conveyor system for loading and unloading bags, cargo, and mail in aircraft. This system is created to help prevent back injuries caused by working in confined spaces, repetitive lifting, and twisting of loads. It also helps to reduce damage to aircraft and to customer baggage with fewer claims. dnata also displayed the Towbarless tractor, an electric vehicle for towing aircraft at airports. SDX 10060 XDi Smith Detection showcased SDX 10060 XDi, a groundbreaking advancement in security screening technology. The system accurately identifies molecular structures by utilizing X-ray Diffraction (XRD), revolutionizing object detection even among items with similar densities. Smiths Detection Stand at Airport Show 2024 Key features include automated alarm resolution for hold baggage screening, enhancing both security and operational efficiency. Screening accuracy SDX 10060 XDi elevates screening accuracy for narcotics and contraband, bolstering security measures Additionally, in-line automatic air cargo screening is streamlined, improving security and operational speed for small parcels and mail. The SDX 10060 XDi also elevates screening accuracy for narcotics and contraband, bolstering security measures at international checkpoints. Panel discussion The Airport Show 2024 hosted a high-profile panel discussion titled “Elevating Passenger Experience: Investing in Innovation to Capture Traveler Hearts.” At a time when the travel industry is facing unprecedented changes and challenges, the session explored the critical importance of passenger experience in today’s competitive landscape and the pivotal role of innovation in shaping it. Experts and pioneers from the industry shared their insights and strategies for elevating the passenger experience through innovative solutions and technologies. Critical nature of passenger experience The panelists highlighted innovation as the driving force behind enhancing and transforming this experience The session, moderated by Dr. Nikhil Kilpady, Director - Aerospace & Defense, Frost & Sullivan, featured Nagy Abu Zeid, Vice President of Strategy and Planning at Oman Airports, Alpros Mohammad Hamzouq, Quality, Safety and Risk Management Director, Airport International Group (AIG), Anurag Shandilya, Head of Operations, Noida International Airport in India, Ismail Issa, Manager Innovation - Web 3.0, Futures & Innovation at Emirates Group, and Ioana Apintei, Head of Product at AirportLabs. The panelists emphasized the critical nature of passenger experience as a key differentiator in the competitive travel industry. They highlighted innovation as the driving force behind enhancing and transforming this experience. Data-driven insights and feedback mechanisms The speakers discussed the importance of continuously adapting to the evolving expectations and preferences of travelers through innovative approaches, leveraging data-driven insights and feedback mechanisms. They also explored innovative passenger-centric solutions and advanced technologies that have significantly improved passenger experiences across different travel modes, including biometrics, AI, IoT, and seamless travel journey solutions.
OSI Systems, Inc. announced that its Security division received an order from an international customer for approximately $9 million to provide the Company’s Eagle® M60 high-energy mobile cargo and vehicle inspection systems including related service and support. Multi-year framework agreement This order represents the initial fulfillment under a multi-year framework agreement between the company and the customer, setting the stage for future supply of additional solutions. OSI Systems’ Chairman and CEO, Deepak Chopra, commented, "We are proud to receive this award to deploy one of our major cargo and vehicle inspection systems. We are committed to helping our customers in their efforts to enhance border checkpoint safety and security."
The ASIS Foundation announces its findings of a comprehensive research endeavor led by esteemed researchers Ishmael Bhila, Peter Lee, and Alison Wakefield, shedding light on the multifaceted landscape of autonomous vehicles (AVs) within security contexts. The report, titled "Autonomous Vehicles: Threats, Risks & Opportunities," serves as a beacon for security practitioners, offering invaluable insights into the challenges and opportunities presented by the rapid advancement of AV technologies. New challenges and considerations Autonomous vehicles are rapidly proliferating across land, sea, and air domains, revolutionizing various sectors and impacting markets, user behavior, and service attitudes. While uncrewed aerial system (UAS) technologies have matured significantly, there is a surge in investment towards autonomous ground vehicles (AGVs) capable of carrying passengers and cargo. Simultaneously, countries with advanced expertise and infrastructure are actively developing autonomous weapons systems, presenting new challenges and ethical considerations. There is a surge in investment towards AGVs capable of carrying passengers and cargo At the heart of the report lies a meticulous examination of the threats, risks, challenges, and opportunities posed by AVs within security operations. From logistical and operational benefits to the technical prowess they offer, AV technologies promise unprecedented advancements. However, they also introduce a plethora of vulnerabilities and implications that demand careful consideration from security practitioners. Advancement of AV technology "We've witnessed the evolution of autonomous vehicle technology since the 1990s,” said principal researcher Alison Wakefield, Co-Director of the Cybersecurity and Criminology Center at the University of West London. “While these advancements hold immense potential across various sectors, including commercial, military, and security, they also bring a myriad of risks and challenges. Our report aims to provide security practitioners with valuable insights and recommendations to navigate this complex landscape effectively." Governments and global bodies are grappling with regulatory frameworks to balance social The continued advancement of AV technology hinges upon artificial intelligence (AI), which faces intense political, legal, and ethical scrutiny. Governments and international bodies are grappling with regulatory frameworks to balance social, economic, and military benefits against potential risks. However, regulations remain fragmented and evolving, alongside emerging ethical and legal dilemmas. Technical hurdles, coupled with substantial liability costs for system errors, underscore the complex landscape of AV deployment. The report highlights the intricate regulatory landscape surrounding AVs, emphasizing the need for practitioners to navigate national and international regulations, industry frameworks, and emerging standards effectively. Recommendations for security practitioners "Ishmael Bhila, Peter Lee, and Alison Wakefield's research is a testament to their dedication to understanding the complexities of AV technologies within security applications," said Martin Gill, Ph.D., Chair, ASIS Foundation. "Their findings provide invaluable guidance for security practitioners seeking to harness the transformative potential of AVs while safeguarding against potential risks." The report offers useful advice for security practitioners to leverage AV technologies Security practitioners must navigate this intricate environment to effectively harness AV technologies while ensuring responsible and secure utilization. They must comprehend varying regulatory landscapes, public sentiments, and security requirements across jurisdictions, while addressing risks to critical infrastructure from both malicious and unintentional actors. Anticipated trends include heightened security concerns as criminal and terrorist groups adapt commercial AVs, challenges posed by affordable surveillance capabilities, and the interconnectedness of AVs across domains. The report offers practical recommendations for security practitioners to leverage AV technologies effectively while mitigating risks and challenges. From training and regulation compliance to cybersecurity measures, the guidance outlined in the report empowers practitioners to embrace AV technologies responsibly. Territory of AV technologies The report emphasizes the pivotal role of organizations like ASIS International in facilitating collaboration among stakeholders, sharing expertise, and driving best practices to harmonize service provision in alignment with multisectoral needs, national and international guidelines, and public perceptions. Embracing emerging technologies while remaining vigilant to security implications is paramount for security practitioners to adapt and thrive in this dynamic landscape. As the security landscape continues to evolve, the insights offered by Bhila, Lee, and Wakefield's research serve as a compass for navigating the uncharted territory of AV technologies. Their work underscores the importance of staying informed and proactive in harnessing the transformative potential of AVs within security operations.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defenses, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitization of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of Cyber Resilience in Protecting Service Availability Cyber resilience refers to organization's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organization's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimizing the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimized, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organization. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorized individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorized access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organizations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organizations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labeled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organizations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organizations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organization can respond quickly and effectively to a breach, minimizing its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organizations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Case studies
RODE, the acronym for RObotic DEpalletiser, is a pioneering product from AWL in the intralogistics market. The robotic solution can efficiently process packages randomly arranged on a pallet, setting it apart from conventional systems. Need for increased automation According to the German Parcel and Express Logistics Association (Bundesverband Paket und Expresslogistik e. V.), 4.15 billion courier, express, and parcel shipments were sent in Germany alone in 2022. Annual shipment growth to around 4.9 billion is realistic by 2027. Against this backdrop and the generally prevailing shortage of personnel, there is only one solution for shipping and logistics companies to cope with this immense volume of orders: increased automation. RODE The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution. One of the locations where RODE adds value is for DHL eCommerce in Rotterdam. In this machine, two Ensenso 3D cameras from IDS Imaging Development Systems GmbH are implemented to provide the required image data. Application The intelligent robot-supported depalletiser, therefore, automatically destacks any packaged goods such as cartons, bags, or containers from pallets and thus ensures their continuous processing - without delays or downtime. Even "extra shifts" at peak times can be implemented at any time, e.g., to cope with the increased workload during Christmas. This frees up staff for more qualified tasks, such as the subsequent processing of consignments or handling customer inquiries. At the same time, it relieves employees of physically and ergonomically demanding tasks and reduces the risk of injury. Up to 800 packages in continuous operation The particular difficulty here lies in the robot's picking of parcels of different sizes and weights At DHL eCommerce in Rotterdam, RODE processes up to 800 parcels per hour with a maximum weight of 31.5 kg each and places them on the corresponding sorting belt. The particular difficulty here lies in the robot's picking of parcels of different sizes and weights. It must independently recognize the position of the objects in three-dimensional space and decide which package to pick next. It then has to determine the best gripping position and avoid collision with other parcels or the machine. Ensenso X36 3D cameras "This intelligent robotic solution integrates AI image processing and high-tech gripper technology," explains Sander Lensen, R&D Manager at AWL. "The system recognizes products and can flip the items to ensure that the required long side is leading." Two Ensenso X36 3D cameras provide the necessary image data. Integrated image processing system They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm and a maximum height of 2400 mm. The integrated image processing system processes this further and enables the depalletizer to identify each package and determine the corresponding gripping position for robust robot-assisted picking. 3D cameras for future-oriented robotics Each Ensenso X36 3D camera system consists of a projector unit and two GigE cameras with either 1.6 MP or 5 MP CMOS sensors. AWL has opted for the 5 MP variant for its solution. Mounting and adjustment brackets, three lenses as well as sync and patch cables for connecting the cameras to the projector unit are also included in the scope of delivery. The integrated FlexView2 technology ensures an even better spatial resolution as well as a very high robustness of the system with dark or reflective surfaces. Easy to set up It is also easy to integrate into its working environment and aims to give its users a competitive edge The 3D systems are delivered assembled and pre-calibrated. However, focussing and calibration are also easy to set up using the setup wizard integrated into the software. The latter they have in common with the RODE depalletiser - it is also easy to integrate into its working environment and aims to give its users a competitive edge in the world of logistics automation. Outlook "The intralogistics market is a growth market. The number of robot solutions required will increase rapidly in the coming years." "The type of products that need to be recognized will change constantly. This will be a challenge for all components and the demands on the camera," explains Sander Lensen. Camera technology with artificial intelligence However, image processing is also developing rapidly. Smart solutions that combine camera technology with artificial intelligence are on the rise. They hold great potential for tackling both increasingly demanding tasks and the worsening shortage of skilled workers. Carton by carton, parcel by parcel, pallet by pallet.
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers, and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency, and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Center in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics center, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics center, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorized entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics center's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyze alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorized movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimization for example, as well as automated access control using license plate recognition. Networking the site with other CLAAS sites for centralized operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
The airport, named after a notable historical figure, serves as a key transportation hub for both domestic and seasonal international flights in its region. Serving over 11 lakh passengers a year, it ranks as one of the busiest airports in terms of passenger and aircraft movements. The terminal building at this airport is spread over 26,936 square meters and has 14 check-in counters, four immigration counters for departures, and six immigration counters for arrivals. Located near major transportation arteries, it offers convenient access to travelers from various directions. Business scenario They required a robust video surveillance solution that could ensure 24x7 recording capabilities With a growing number of passengers and flights at the airport, a new terminal was recently constructed at this airport. To facilitate the security of passengers and staff at this terminal building, they required a robust video surveillance solution that could ensure 24x7 recording capabilities. Without adequate surveillance coverage, this airport was vulnerable to security threats such as perimeter breaches, theft, vandalism, and terrorist activities. Challenges Ensuring passenger and staff safety: Being one of the busiest airports in the state, the absence of a video surveillance system was risking the safety of passengers and staff from potential threats like theft of personal belongings or other such criminal activities. Continuous monitoring with redundancy: The airport wanted continuous 24x7 monitoring with a dual setup ensuring that surveillance operations continued uninterrupted even in the event of equipment failure or maintenance downtime. Ensuring cargo safety: The airport faced challenges in ensuring the safety and security of cargo pioneering to risks such as theft, tampering, and damage during handling and transportation processes. Regulatory non-compliance risk: Without adequate surveillance systems, the airport was facing the risk of non-compliance with security regulations, which could lead to penalties and legal liabilities. Solution The entire airport terminal was covered with Matrix Project Series Bullet, Dome, and PTZ Cameras to provide extensive coverage. Matrix Project Series Bullet IP Cameras were deployed in/at: Outdoor public spaces such as drop-off zones and walkways: To monitor crowd movements and enhance overall security. Cargo handling areas: To monitor the loading and unloading of cargo and ensure compliance with security protocols. Matrix Project Series Dome IP Cameras were deployed in/at: Main entrances and exits: To monitor the flow of passengers and detect any suspicious behavior. Check-in counters: To oversee passenger interactions and baggage handling. Baggage claim areas: To monitor baggage claim areas and prevent theft or tampering of luggage. Retail areas: Placed in retail shops and duty-free zones to deter shoplifting and ensure security for both customers and staff. Matrix PTZ Cameras were deployed at: Elevated structures overlooking runways and aprons: To provide a panoramic view enabling operators to zoom in on specific aircraft or incidents. These cameras also aided in monitoring critical infrastructure such as control towers, fueling stations, and power substations, providing close-up views for detailed inspection and surveillance. Monitoring and managing video surveillance SATATYA SAMAS - Video Management Software was deployed at two sites within the terminal Matrix SATATYA SAMAS - Video Management Software was deployed at two locations within the terminal. The first location served as a primary control center for monitoring and managing video surveillance feeds, and coordinating security responses. The second location served as a secondary control center. This could be used in case of failures or emergencies at the primary control center, ensuring the continuity of surveillance operations. Also, different users at two different locations could manage and monitor the camera streams, if needed. Products Offered SATATYA SAMAS PLT (1 No.): Enterprise Video Management Software Matrix License Dongle 200 (1 No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM20 (3 Nos.): License for Adding 20 Additional Cameras SATATYA SAMAS CAM5 (2 Nos.): License for Adding five Additional Cameras SATATYA SAMAS USER10 (1 No.): Three Concurrent User Licenses for Smart Client and Mobile Client SATATYA CIDR20MVL12CWP (52 Nos.): 2MP IR Dome Motorized Varifocal 2.8-12 mm with Audio SATATYA CIBR20MVL12CWP (14 Nos.): 2MP IR Bullet Motorized Varifocal 2.8-12 mm with Audio SATATYA PZCR20ML33CWP (9 Nos.): 2MP PTZ Camera 33x Zoom with Audio Benefits The superior image quality enabled security personnel to identify potential threats quickly Matrix IP Cameras provided full coverage at the new terminal building. The superior image quality enabled security personnel to identify potential threats quickly. The motorized varifocal lens in Matrix IP Cameras enabled zooming in for specific details when required. Matrix PTZ IP Cameras provided 360° surveillance and up to 33x zoom, providing perimeter security at the airport. Matrix IP Cameras are cyber-secure, complying with the OWASP ASVS 4.0 L2 norms, certified by STQC, Delhi. This helps in safeguarding sensitive surveillance footage, maintaining network integrity, and complying with stringent cybersecurity regulations. Matrix IP cameras are also NDAA compliant, which helped in meeting the regulatory standard requirements at the Airport. The dual setup of Matrix Video Management Software helped in providing redundancy to the surveillance system, ensuring continuous monitoring and recording even in the event of equipment failures, network disruptions, or other unforeseen circumstances. It also allowed for distributed monitoring and management capabilities, enhancing overall surveillance effectiveness. Features like Day Highlights and Time-lapse in Matrix Video Management Software aided airport security teams in leveraging intelligent search functionalities to conduct thorough investigations quickly.
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travelers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognizing this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritize security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered, and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker, or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
360 Vision Technology, the UK manufacturer of ruggedized HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a historically important English Heritage site, at the Transit Shed, Exeter Quayside. Installed by Select Electrics and specified by Derek Maltby of Global MSC Security, the inclusion of additional CCTV was required to monitor the Exeter Quayside area, covering the canal side, shops, restaurants, bars, and attractions. Security and safety Kevin Tyrrell, CCTV Technical Manager for Select Electrics explains the requirement for an expansion to the current CCTV system, “With accessible funding granted from a successful Safer Streets 2 application, Exeter City Council looked to expand the surveillance coverage of the Quayside area and integrate it into the existing town center CCTV network, for monitoring at the Exeter City Council control room." “Coverage was required to provide safety and security surveillance in an area that is popular with both locals and visitors. Additionally, as the Quayside includes a canal side, should coverage of the canal be required in an emergency, high-definition footage of any incident here would be advantageous.” High-definition images We required a camera that would provide reliable HD images but also one that would withstand high winds" With all these requirements considered and the tender bid successfully accepted by the council, Select Electrics was selected to implement the expansion of surveillance coverage. “To cope with the harsh conditions to be found at Exeter Quayside, we required a camera that would not only provide reliable high-definition images but also one that would withstand high winds and rain, that can combine to make a difficult operational environment for electronic equipment, such as a CCTV camera,” continues Kevin. Camera applications “We’ve enjoyed a long-term technical relationship with 360 Vision Technology for several years, having employed their camera technology in many varied applications, and based on this experience, we were confident in their ability to provide a camera that could satisfy our demanding requirements.” “Additionally, and further complicating matters regarding the installation of cameras, many parts of the Quayside area are historically important, such as the cobbled areas and streets, as well as the English Heritage-protected Transit Shed, which occupies a large part of the area.” Need for an alternative solution The logistical effects of installing traditional CCTV infrastructure were considered too disruptive and expensive" The centerpiece for many music, dance, and street theatre events held in the area, the Transit Shed is an open-plan building set on cast iron uprights, historically, used to store cargo unloaded from ships. “The historically important parts of the area could not be disturbed,” adds Derek Maltby. “The logistical effects of installing traditional CCTV infrastructure, such as fiber cabling under streets and a network of CCTV cameras on poles was considered too disruptive and prohibitively expensive so an alternative solution needed to be found.” Perfect line-of-sight “We have always had a great relationship with the research and development team at 360 Vision and this project was no different." "We had identified the Transit Shed as a possible location for the siting of a single PTZ camera, where it would have a perfect line-of-sight to all of the areas that required coverage on this project, but we knew that any camera mounted on, or near the Transit Shed would have to meet strict English Heritage requirements, including a specific body color, to match the exact heritage hue of the Transit Shed, to blend within the historic architecture." Invictus TX wireless camera Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera" “We outlined the technical requirements and restrictions of the project to the team at 360 Vision and were delighted with their enthusiasm and technical understanding of the demanding requirements of this installation." "Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera but in a one-off specific color, specifically matched to blend with the painted roof of the Transit Shed.” Key features of the camera With a continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus camera can deliver unhindered views to the control room and for night-time vision, is equipped with on-board LED white light technology. Considering camera performance, unlike many other camera products that utilize ‘belt-drive’ PTZ systems, Invictus incorporates ultra-reliable and extremely quiet Direct Drive mechanisms, resulting in consistent pre-set accuracy and long-term reliability for its installation at the Quayside. HD and ultra-low-light camera imaging The camera is designed to provide trouble-free service in harsh Quayside conditions The Invictus TX’s high-performance, ruggedized PTZ camera with full 1080P HD and ultra-low-light camera imaging technology, made it the perfect choice for deployment in this application. Supplied in a specific green Pantone reference, the camera is designed to provide years of trouble-free service in harsh Quayside conditions and provides comprehensive coverage of the area, at a fraction of the cost of multiple traditional units and associated traditional hard-wired transmission infrastructure. Day and night surveillance “In operation, system operators can instantly switch on the LED white light mounted onboard the Invictus camera, to illuminate the scene and inform people at the Quayside that they are being monitored, both for security and safety purposes, for example, if anyone falls into the water at the Quayside at night,” adds Dennis Cavanagh, Control room Operations Manager, Exeter City Council. “Since the 360 Vision Invictus TX camera has been added into the system, we have had many positive comments from residents and local businesses, complementing the non-invasive nature of the color-matched camera in the historical surroundings and confirming the feelings of security the camera coverage now provides to the area both during the day and night.” Increase surveillance coverage The combined Invictus TX camera and integrated LED white light technology make it the perfect choice" The Invictus camera on the Transit Shed is part of a wider project to increase surveillance coverage and improve image quality across the Exeter CCTV network, with over 40 cameras already installed to either replace existing cameras or extend coverage to new areas, as part of a rolling program of improvement made possible by funding from Safer Streets Fund. Jason Wyatt, National Account Manager at 360 Vision Technology says, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the technically demanding environment at the Exeter Quayside." Surveillance upgrade "Invictus’ ultra-low light technology from 1/1.9’’ ULL sensors also delivers brighter, crisper, and more defined color images at night, for the ultimate performance at the Quayside." "We are proud to have delivered a bespoke Invictus camera version in a one-off colour, to enable use on the English Heritage protected Transit Shed, as part of an overall upgrade to the Exeter City Council city-wide CCTV network and its ongoing surveillance upgrade using 360 Vision’s Invictus cameras.”
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?