Cargo security
Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based access control solution developed to radically simplify the needs of small and growing businesses. By connecting the Centrios mobile app with Centrios smart readers and locks, owners and managers can quickly and easily manage access for all employees and visitors in one place. Small and growing businesses The first shipme...
Westminster Security Group, a renowned name in private security, announces a strategic investment in Tratix, an innovative technology company based in Tel Aviv. Tratix, founded and led by seasoned entrepreneur - Sharon Rashty, specialises in cutting-edge solutions to help prevent cargo theft. With a distinguished background in Israeli Intelligence services and building early-stage startups, Sharon Rashty brings a wealth of experience to Tratix. Her expertise in tailing detection, counter-survei...
Yarden Gross, CEO and Co-founder of maritime technology start-up Orca AI champions the rapid – but responsible – deployment of smart, cost-effective digital tools to tackle climate challenges in the shipping industry. Leveraging machine learning and data insights, AI solutions are a vital front line in reducing fuel consumption and emissions. AI solutions "AI solutions are crucial for squeezing every last drop of efficiency out of the existing fleet amid increasing pressure to dec...
OSI Systems, Inc. announced that its Security division was awarded a contract from an international airport for approximately $42 million to provide a range of checkpoint and hold baggage screening solutions. Maintenance, service, and support Among the systems to be included are the RTT® 110 (Real Time Tomography) explosive detection system for screening hold baggage, Orion® 920CT (Computed Tomography) checkpoint screening system integrated with Rapiscan TRS™ (Tray Return System)...
Airport Show is all set for a smooth take-off for its 23rd edition on May 14 at the Dubai World Trade Centre (DWTC) with key stakeholders utilising the annual exhibition dedicated to the Middle East, Africa, and South Asia (MEASA) to explore and embrace new technologies and innovative products to handle the fast rebounding air passengers and cargo traffic. Airport passenger expectations The participants will also have their focus and attention on products and services designed t...
The 23rd edition of the Airport Show was the venue to showcase and introduce new technologies and services in ground handling, cargo movements, and airport operations to foster agility as well as sustainability. More than 30 new innovators joined the Airport Show to introduce their cutting-edge technologies and services. Innovations introduced were a major draw at the Show, which attracted thousands of trade visitors and stakeholders. Helipad Systems Supplies Ground handling service providers...
News
OSI Systems, Inc. announced that its Security division received an order from an international customer for approximately $9 million to provide the Company’s Eagle® M60 high-energy mobile cargo and vehicle inspection systems including related service and support. Multi-year framework agreement This order represents the initial fulfillment under a multi-year framework agreement between the company and the customer, setting the stage for future supply of additional solutions. OSI Systems’ Chairman and CEO, Deepak Chopra, commented, "We are proud to receive this award to deploy one of our major cargo and vehicle inspection systems. We are committed to helping our customers in their efforts to enhance border checkpoint safety and security."
The ASIS Foundation announces its findings of a comprehensive research endeavour led by esteemed researchers Ishmael Bhila, Peter Lee, and Alison Wakefield, shedding light on the multifaceted landscape of autonomous vehicles (AVs) within security contexts. The report, titled "Autonomous Vehicles: Threats, Risks & Opportunities," serves as a beacon for security practitioners, offering invaluable insights into the challenges and opportunities presented by the rapid advancement of AV technologies. New challenges and considerations Autonomous vehicles are rapidly proliferating across land, sea, and air domains, revolutionising various sectors and impacting markets, user behaviour, and service attitudes. While uncrewed aerial system (UAS) technologies have matured significantly, there is a surge in investment towards autonomous ground vehicles (AGVs) capable of carrying passengers and cargo. Simultaneously, countries with advanced expertise and infrastructure are actively developing autonomous weapons systems, presenting new challenges and ethical considerations. There is a surge in investment towards AGVs capable of carrying passengers and cargo At the heart of the report lies a meticulous examination of the threats, risks, challenges, and opportunities posed by AVs within security operations. From logistical and operational benefits to the technical prowess they offer, AV technologies promise unprecedented advancements. However, they also introduce a plethora of vulnerabilities and implications that demand careful consideration from security practitioners. Advancement of AV technology "We've witnessed the evolution of autonomous vehicle technology since the 1990s,” said principal researcher Alison Wakefield, Co-Director of the Cybersecurity and Criminology Centre at the University of West London. “While these advancements hold immense potential across various sectors, including commercial, military, and security, they also bring a myriad of risks and challenges. Our report aims to provide security practitioners with valuable insights and recommendations to navigate this complex landscape effectively." Governments and global bodies are grappling with regulatory frameworks to balance social The continued advancement of AV technology hinges upon artificial intelligence (AI), which faces intense political, legal, and ethical scrutiny. Governments and international bodies are grappling with regulatory frameworks to balance social, economic, and military benefits against potential risks. However, regulations remain fragmented and evolving, alongside emerging ethical and legal dilemmas. Technical hurdles, coupled with substantial liability costs for system errors, underscore the complex landscape of AV deployment. The report highlights the intricate regulatory landscape surrounding AVs, emphasising the need for practitioners to navigate national and international regulations, industry frameworks, and emerging standards effectively. Recommendations for security practitioners "Ishmael Bhila, Peter Lee, and Alison Wakefield's research is a testament to their dedication to understanding the complexities of AV technologies within security applications," said Martin Gill, Ph.D., Chair, ASIS Foundation. "Their findings provide invaluable guidance for security practitioners seeking to harness the transformative potential of AVs while safeguarding against potential risks." The report offers useful advice for security practitioners to leverage AV technologies Security practitioners must navigate this intricate environment to effectively harness AV technologies while ensuring responsible and secure utilisation. They must comprehend varying regulatory landscapes, public sentiments, and security requirements across jurisdictions, while addressing risks to critical infrastructure from both malicious and unintentional actors. Anticipated trends include heightened security concerns as criminal and terrorist groups adapt commercial AVs, challenges posed by affordable surveillance capabilities, and the interconnectedness of AVs across domains. The report offers practical recommendations for security practitioners to leverage AV technologies effectively while mitigating risks and challenges. From training and regulation compliance to cybersecurity measures, the guidance outlined in the report empowers practitioners to embrace AV technologies responsibly. Territory of AV technologies The report emphasises the pivotal role of organisations like ASIS International in facilitating collaboration among stakeholders, sharing expertise, and driving best practices to harmonise service provision in alignment with multisectoral needs, national and international guidelines, and public perceptions. Embracing emerging technologies while remaining vigilant to security implications is paramount for security practitioners to adapt and thrive in this dynamic landscape. As the security landscape continues to evolve, the insights offered by Bhila, Lee, and Wakefield's research serve as a compass for navigating the uncharted territory of AV technologies. Their work underscores the importance of staying informed and proactive in harnessing the transformative potential of AVs within security operations.
OSI Systems announces that its Security division, a premier global provider of security and inspection systems, has secured an international contract award valued at approximately $100 million to provide cargo and vehicle inspection systems, as well as ongoing maintenance services and training. Deepak Chopra, OSI Systems’ Chairman and CEO, commented, "This award is a testament to the trust and confidence that our partners have in our technology expertise and customer service. We are excited to further contribute to the safety and security of nations with our advanced inspection systems. We are committed to delivering excellence and innovation in all our projects."
Decision Sciences, a provider of advanced security and contraband detection systems, has created the new role of CCO to enable DSIC to capitalise on its unique and revolutionary non-intrusive inspection (NII) technology, to penetrate new global markets in port and border security, critical infrastructure protection, as well as many others. Kevin is a recognised expert and commercial pioneer with proven success in the security NII sector; he has held leadership roles in market-pioneering OEM companies in the field, such as Rapiscan and Smiths Detection. In addition to these roles, Kevin has been a pioneer in establishing managed service government Build–Operate–Transfer (BOT) concession operations, in Kuwait and Mozambique, which provided innovative and robust ports and border NII security solutions across land, air and seaports. Author's quote “DSIC is extremely fortunate to welcome Kevin,” said Dwight Johnson, President and CEO of Decision Sciences. “With his experience and guidance, Decision Sciences is poised to solidify its leadership role in providing passive Non-Intrusive Inspection (NII) systems across a variety of industries." "Kevin will be an invaluable member of an already exceptional team that will bring value to our customers and to all DSIC stakeholders.” Discovery® system’s unique capabilities Decision Sciences is the pioneering provider of charged particle tomography application" When asked about his appointment Kevin said: “Decision Sciences is the pioneering global provider of charged particle (muon) tomography application engineering products and solutions. Undoubtedly, its Discovery® system’s unique capabilities for security applications for NII, and its potential applications in other sectors with its passive (non-ionising radiation) technology presents an exciting range of opportunities in areas such as cargo/container inspection for customs and border security, infrastructure, industrial engineering, and geological survey inspection as well as exploration to name but a few." "I am very excited to join the outstanding DSIC team as we take advantage of our unique intellectual property (IP) and inherent artificial intelligence (AI) capabilities to deliver invaluable and needed solutions to these sectors with a commercial focus.” Kevin’s quality and experience DSIC’s Chairman, Stuart J. Rabin noted: “The Board of Directors and the entire Decision Sciences team are thrilled to welcome a commercial pioneer of Kevin’s quality and experience, especially at this important inflection point in DSIC’s history. We have no doubt that Kevin will effectively build on the successful field deployments of the company’s Discovery® system, and the many commercial opportunities already underway.” He continued: “Decision Sciences is the only company in the world to offer a passive charged particle NII system and will continue to leverage its real-world experience and its extensive and unique IP portfolio to enhance the ability of its customers to interdict dangerous and illicit contraband and for various other industry applications as well.”
In the fast-paced world of logistics, the demand for efficiency, security, and innovation has never been higher. Logistics companies are constantly seeking ways to streamline operations and protect valuable assets. The era of safety and efficiency Vanma Access Control system has revolutionised the conventional security norms within the logistics industry, ushering in a new era of safety and efficiency. With its advanced features and seamless integration capabilities, Vanma has become an indispensable tool for logistics companies looking to secure their facilities, streamline operations, and adapt to the challenges of the modern logistics landscape. Securing warehouses and distribution centers One of the standout contributions of Vanma Access Control to the logistics industry is its ability to enhance security at warehouses and distribution centers. These facilities are the backbone of logistics operations, storing valuable goods and acting as pivotal points in the supply chain. The Vanma access control system ensures that only authorised employees have access through permission granting and fingerprint recognition authentication. This significantly reduces the risk of theft, minimises losses, and improves overall security. Flexible authorisation: Managers can grant different permissions depending on the function of the employee. All keys can only open the locks under the authority, ensuring security. Remote authorisation: For unexpected situations, managers can authorise employees remotely. This saves time and increases productivity. Fingerprint authentication: Vanma Access Control System keys have fingerprint recognition. Employees need to authenticate their fingerprints before unlocking the door each time, and then authenticate their rights. This ensures that there is no unauthorised access. Ensuring cargo safety on the road It transmits information with the electronic key through metal contacts and uses AES-256 encryption technology The Vanma access control system plays a vital role in ensuring the security of goods in transit. Firstly, the body of the Vanma electronic lock, designed in stainless steel, prevents criminals from cutting the locking beam, thus thwarting theft attempts. Secondly, the Vanma electronic locking system does not have a hole in the lock in the traditional sense. It transmits information with the electronic key through metal contacts and uses AES-256 encryption technology. So, thieves cannot achieve theft by picking the lock. This extra security ensures that goods are always protected during transport, giving logistics companies peace of mind when transporting valuable goods. Ensuring compliance and accountability The logistics industry is heavily regulated, necessitating strict compliance with industry standards and government regulations. Vanma Access Control systems play a vital role in this aspect by providing a clear audit trail of access events. This data helps logistics companies demonstrate compliance with security and safety protocols to regulatory authorities. Furthermore, Vanma's access control systems foster accountability within logistics organisations. Each access event is meticulously logged, creating a transparent record of who accessed specific areas. This accountability encourages responsible behavior among personnel and serves as a deterrent against misconduct. Conclusion In brief, Vanma Access Control has brought about significant improvements in logistics security and efficiency. Its advanced features enhance security in warehouses, secure goods during transportation, and ensure compliance, making it an invaluable tool for the logistics industry's evolving needs.
nShift, the pioneer in parcel delivery management software, announces the launch of Emissions Tracker. Calculating the CO2 emissions associated with each shipment, the new solution makes it possible for e-commerce and multichannel retailers to comply with sustainability disclosure rules, prove environmental credentials to customers, and see where they can reduce emissions from shipping. Emissions Tracker data helps retailers comply with emissions reporting rules, including the EU Corporate Sustainability Reporting Directive (CSRD) coming into force in mid-2024. The new regulation is expected to affect around 50,000 businesses trading in the EU, which will become subject to mandatory sustainability reporting. Customers prefer to shop sustainably Emissions Tracker makes it easy to generate detailed, actionable sustainability reports 81% of shoppers want to buy from brands that demonstrate sustainability. However, as many as 40% of consumers are distrustful of brands' environmental claims. Emissions Tracker provides clear, trustworthy data that helps retailers clearly demonstrate their improvement. Mattias Gredenhag, CTO at nShift said, "Pressure from customers and regulators alike means having a clear picture of their emissions is a necessity for retailers today. Emissions Tracker makes it easy to generate detailed, actionable sustainability reports. This simplifies the compliance burden and saves time for CFOs and other stakeholders doing annual reporting. What is more, retailers can use Emissions Tracker insights to engage customers in their sustainability story and accelerate their progress to net zero." Benefits for retailers and warehouses All carrier data is collated into one reporting tool and built into an easy-to-use template nShift Emissions Tracker has been designed to simplify the process of emissions reporting. All carrier data is collated into one reporting tool and built into an easy-to-use template. Calculations are done at the shipment level, giving retailers the ability to drill into shipping data, compile accurate reports, and identify quick wins for emissions reduction. For retailers already using nShift's delivery management, Emissions Tracker provides access to emissions data for all historical shipments, so they can make comparisons with previous months and years. Additional benefits of Emissions Tracker nShift Emissions Tracker brings the following additional benefits: Efficiency: Quickly and easily report on last-mile and transport emissions at the click of a button with no additional analysis needed Reliability: Emissions data the business can depend on. All collected in one place in a standardised format Credibility: Peace of mind knowing the calculations are accurate and free from mistakes of manual error. The solution uses standard tariffs developed by the Network for Transport Measures (NTM) Accuracy: Emissions data are calculated based on CO2e (carbon dioxide equivalent–a more accurate and comprehensive measure than CO2 alone) Transparency: Increase customer loyalty and brand recognition by becoming trusted and transparent when it comes to emissions GLEC Framework Gredenhag concluded, "We believe greener deliveries drive better business growth. Alongside tracking and managing emissions, we help retailers offer sustainable delivery options, provide offset schemes and charitable giving through deliveries, and clearly badge sustainable delivery options at checkout." nShift Emissions Tracker conforms to internationally recognised standards, including ISO 14083 and the Global Logistics Emissions Council (GLEC) Framework.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organisations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organisation, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organisation’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organisations to check whether drivers are licenced and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organisation is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organisation. This includes fraud, bankruptcy, poor business practices, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licencing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilising software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Case studies
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Centre in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics centre, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics centre, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorised entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics centre's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyse alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorised movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimisation for example, as well as automated access control using licence plate recognition. Networking the site with other CLAAS sites for centralised operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
The airport, named after a notable historical figure, serves as a key transportation hub for both domestic and seasonal international flights in its region. Serving over 11 lakh passengers a year, it ranks as one of the busiest airports in terms of passenger and aircraft movements. The terminal building at this airport is spread over 26,936 square metres and has 14 check-in counters, four immigration counters for departures, and six immigration counters for arrivals. Located near major transportation arteries, it offers convenient access to travellers from various directions. Business scenario They required a robust video surveillance solution that could ensure 24x7 recording capabilities With a growing number of passengers and flights at the airport, a new terminal was recently constructed at this airport. To facilitate the security of passengers and staff at this terminal building, they required a robust video surveillance solution that could ensure 24x7 recording capabilities. Without adequate surveillance coverage, this airport was vulnerable to security threats such as perimeter breaches, theft, vandalism, and terrorist activities. Challenges Ensuring passenger and staff safety: Being one of the busiest airports in the state, the absence of a video surveillance system was risking the safety of passengers and staff from potential threats like theft of personal belongings or other such criminal activities. Continuous monitoring with redundancy: The airport wanted continuous 24x7 monitoring with a dual setup ensuring that surveillance operations continued uninterrupted even in the event of equipment failure or maintenance downtime. Ensuring cargo safety: The airport faced challenges in ensuring the safety and security of cargo pioneering to risks such as theft, tampering, and damage during handling and transportation processes. Regulatory non-compliance risk: Without adequate surveillance systems, the airport was facing the risk of non-compliance with security regulations, which could lead to penalties and legal liabilities. Solution The entire airport terminal was covered with Matrix Project Series Bullet, Dome, and PTZ Cameras to provide extensive coverage. Matrix Project Series Bullet IP Cameras were deployed in/at: Outdoor public spaces such as drop-off zones and walkways: To monitor crowd movements and enhance overall security. Cargo handling areas: To monitor the loading and unloading of cargo and ensure compliance with security protocols. Matrix Project Series Dome IP Cameras were deployed in/at: Main entrances and exits: To monitor the flow of passengers and detect any suspicious behaviour. Check-in counters: To oversee passenger interactions and baggage handling. Baggage claim areas: To monitor baggage claim areas and prevent theft or tampering of luggage. Retail areas: Placed in retail shops and duty-free zones to deter shoplifting and ensure security for both customers and staff. Matrix PTZ Cameras were deployed at: Elevated structures overlooking runways and aprons: To provide a panoramic view enabling operators to zoom in on specific aircraft or incidents. These cameras also aided in monitoring critical infrastructure such as control towers, fuelling stations, and power substations, providing close-up views for detailed inspection and surveillance. Monitoring and managing video surveillance SATATYA SAMAS - Video Management Software was deployed at two sites within the terminal Matrix SATATYA SAMAS - Video Management Software was deployed at two locations within the terminal. The first location served as a primary control centre for monitoring and managing video surveillance feeds, and coordinating security responses. The second location served as a secondary control centre. This could be used in case of failures or emergencies at the primary control centre, ensuring the continuity of surveillance operations. Also, different users at two different locations could manage and monitor the camera streams, if needed. Products offered SATATYA SAMAS PLT (1 No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1 No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM20 (3 Nos.): Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM5 (2 Nos.): Licence for Adding five Additional Cameras SATATYA SAMAS USER10 (1 No.): Three Concurrent User Licence for Smart Client and Mobile Client SATATYA CIDR20MVL12CWP (52 Nos.): 2MP IR Dome Motorised Varifocal 2.8-12 mm with Audio SATATYA CIBR20MVL12CWP (14 Nos.): 2MP IR Bullet Motorised Varifocal 2.8-12 mm with Audio SATATYA PZCR20ML33CWP (9 Nos.): 2MP PTZ Camera 33x Zoom with Audio Benefits The superior image quality enabled security personnel to identify potential threats quickly Matrix IP Cameras provided full coverage at the new terminal building. The superior image quality enabled security personnel to identify potential threats quickly. The motorised varifocal lens in Matrix IP Cameras enabled zooming in for specific details when required. Matrix PTZ IP Cameras provided 360° surveillance and up to 33x zoom, providing perimeter security at the airport. Matrix IP Cameras are cyber-secure, complying with the OWASP ASVS 4.0 L2 norms, certified by STQC, Delhi. This helps in safeguarding sensitive surveillance footage, maintaining network integrity, and complying with stringent cybersecurity regulations. Matrix IP cameras are also NDAA compliant, which helped in meeting the regulatory standard requirements at the Airport. The dual setup of Matrix Video Management Software helped in providing redundancy to the surveillance system, ensuring continuous monitoring and recording even in the event of equipment failures, network disruptions, or other unforeseen circumstances. It also allowed for distributed monitoring and management capabilities, enhancing overall surveillance effectiveness. Features like Day Highlights and Time-lapse in Matrix Video Management Software aided airport security teams in leveraging intelligent search functionalities to conduct thorough investigations quickly.
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travellers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognising this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritise security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a historically important English Heritage site, at the Transit Shed, Exeter Quayside. Installed by Select Electrics and specified by Derek Maltby of Global MSC Security, the inclusion of additional CCTV was required to monitor the Exeter Quayside area, covering the canal side, shops, restaurants, bars, and attractions. Security and safety Kevin Tyrrell, CCTV Technical Manager for Select Electrics explains the requirement for an expansion to the current CCTV system, “With accessible funding granted from a successful Safer Streets 2 application, Exeter City Council looked to expand the surveillance coverage of the Quayside area and integrate it into the existing town centre CCTV network, for monitoring at the Exeter City Council control room." “Coverage was required to provide safety and security surveillance in an area that is popular with both locals and visitors. Additionally, as the Quayside includes a canal side, should coverage of the canal be required in an emergency, high-definition footage of any incident here would be advantageous.” High-definition images We required a camera that would provide reliable HD images but also one that would withstand high winds" With all these requirements considered and the tender bid successfully accepted by the council, Select Electrics was selected to implement the expansion of surveillance coverage. “To cope with the harsh conditions to be found at Exeter Quayside, we required a camera that would not only provide reliable high-definition images but also one that would withstand high winds and rain, that can combine to make a difficult operational environment for electronic equipment, such as a CCTV camera,” continues Kevin. Camera applications “We’ve enjoyed a long-term technical relationship with 360 Vision Technology for several years, having employed their camera technology in many varied applications, and based on this experience, we were confident in their ability to provide a camera that could satisfy our demanding requirements.” “Additionally, and further complicating matters regarding the installation of cameras, many parts of the Quayside area are historically important, such as the cobbled areas and streets, as well as the English Heritage-protected Transit Shed, which occupies a large part of the area.” Need for an alternative solution The logistical effects of installing traditional CCTV infrastructure were considered too disruptive and expensive" The centrepiece for many music, dance, and street theatre events held in the area, the Transit Shed is an open-plan building set on cast iron uprights, historically, used to store cargo unloaded from ships. “The historically important parts of the area could not be disturbed,” adds Derek Maltby. “The logistical effects of installing traditional CCTV infrastructure, such as fibre cabling under streets and a network of CCTV cameras on poles was considered too disruptive and prohibitively expensive so an alternative solution needed to be found.” Perfect line-of-sight “We have always had a great relationship with the research and development team at 360 Vision and this project was no different." "We had identified the Transit Shed as a possible location for the siting of a single PTZ camera, where it would have a perfect line-of-sight to all of the areas that required coverage on this project, but we knew that any camera mounted on, or near the Transit Shed would have to meet strict English Heritage requirements, including a specific body colour, to match the exact heritage hue of the Transit Shed, to blend within the historic architecture." Invictus TX wireless camera Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera" “We outlined the technical requirements and restrictions of the project to the team at 360 Vision and were delighted with their enthusiasm and technical understanding of the demanding requirements of this installation." "Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera but in a one-off specific colour, specifically matched to blend with the painted roof of the Transit Shed.” Key features of the camera With continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus camera can deliver unhindered views to the control room and for night-time vision, is equipped with on-board LED white light technology. Considering camera performance, unlike many other camera products that utilise ‘belt-drive’ PTZ systems, Invictus incorporates ultra-reliable and extremely quiet Direct Drive mechanisms, resulting in consistent pre-set accuracy and long-term reliability for its installation at the Quayside. HD and ultra-low-light camera imaging The camera is designed to provide trouble-free service in harsh Quayside conditions The Invictus TX’s high-performance, ruggedised PTZ camera with full 1080P HD and ultra-low-light camera imaging technology, made it the perfect choice for deployment in this application. Supplied in a specific green Pantone reference, the camera is designed to provide years of trouble-free service in harsh Quayside conditions and provides comprehensive coverage of the area, at a fraction of the cost of multiple traditional units and associated traditional hard-wired transmission infrastructure. Day and night surveillance “In operation, system operators can instantly switch on the LED white light mounted onboard the Invictus camera, to illuminate the scene and inform people at the Quayside that they are being monitored, both for security and safety purposes, for example, if anyone falls into the water at the Quayside at night,” adds Dennis Cavanagh, Control room Operations Manager, Exeter City Council. “Since the 360 Vision Invictus TX camera has been added into the system, we have had many positive comments from residents and local businesses, complementing the non-invasive nature of the colour-matched camera in the historical surroundings and confirming the feelings of security the camera coverage now provides to the area both during the day and night.” Increase surveillance coverage The combined Invictus TX camera and integrated LED white light technology make it the perfect choice" The Invictus camera on the Transit Shed is part of a wider project to increase surveillance coverage and improve image quality across the Exeter CCTV network, with over 40 cameras already installed to either replace existing cameras or extend coverage to new areas, as part of a rolling programme of improvement made possible by funding from Safer Streets Fund. Jason Wyatt, National Account Manager at 360 Vision Technology says, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the technically demanding environment at the Exeter Quayside." Surveillance upgrade "Invictus’ ultra-low light technology from 1/1.9’’ ULL sensors also delivers a brighter, crisper, and more defined colour images at night, for the ultimate performance at the Quayside." "We are proud to have delivered a bespoke Invictus camera version in a one-off colour, to enable use on the English Heritage protected Transit Shed, as part of an overall upgrade to the Exeter City Council city-wide CCTV network and its ongoing surveillance upgrade using 360 Vision’s Invictus cameras.”
Yalova Terminal is a roll-on roll-off (“ro-ro”) port, meaning it is designed to carry wheeled cargo. It is Turkey’s 63rd border gate and began operations in 2017. It covers 80,000 square metres with a 500-trailer capacity and 16,000 square metres of storage, which includes an ADR warehouse for the storage of hazardous goods. On-site there are X-ray facilities, a laboratory for customs, offices, and break rooms for drivers. All of these facilities require continuous monitoring to protect staff, drivers, and the stock contained within the trailers at the port. Monitoring 24/7 The Yalova Ro-Ro Terminal team was looking for a way to intelligently monitor activities at the port and quickly search footage for investigations if needed. Because of the size of the port, an efficient way to store and deliver video footage back to the control room and server rooms was also sought. AI-enabled cameras reduce false alarms Cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention The team turned to installer Arte Teknoloji and Hanwha Vision to provide a robust and AI-enabled video surveillance solution comprising 48 PNO-A9081R cameras, 17 XNO-C7083Rcameras, and 7 XNP-6400RW cameras. With AI analytics carried out on the device, the cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention. This frees them up to focus on other responsibilities, while the cameras constantly scan for relevant objects or possible incidents that require human input. Potential false alarms from video noise, waving trees, moving clouds, and animals are ignored by the cameras, helping to reduce operator fatigue and frustration. Effective perimetre protection In particular, the XNP-6400RW PTZ Plus camera provides a feature-rich PTZ camera that is designed for perimetre protection. With AI-based object auto-tracking, operators can efficiently monitor the movement of objects while remaining hands-free to control other cameras. This analytics feature is supported by leading AI algorithms unique to Hanwha Vision. The camera captures evidence-grade images of objects up to a distance of 200 metres in all lighting conditions, with the help of adaptive IR technology which adjusts the angle of the camera’s IR LEDs to match the level of zoom. Object detection and classification for accurate responses Object classification based on attributes can also support quick forensic searches for future investigations The PNO-A9081R is a 4K bullet AI camera that can detect people, faces, vehicles, licence plates, plus their attributes. This allows operators to understand who, and what vehicles, are entering and exiting the site, particularly around the perimetre or rolling on and off ships docked at the port. They can quickly respond to possible intrusion or unusual behaviour, reducing the risk of stock, equipment, or vehicle theft. Object classification based on attributes can also support quick forensic searches for future investigations. BestShot feature The cameras also detect loitering, audio such as shouting or screaming, tampering with the camera itself, and shock detection. The BestShot feature automatically chooses the best images of an object, helping with bandwidth and storage efficiency as well as delivering high-quality, detailed images back to the control room. Robust video system Having the best security, that’s intuitive to use and easy to install, was essential" Eyup Tetik, Corporate Sales Manager at ENTPA ELEKTRONİK A.Ş. explains, “It was important to the Yılport Ro-Ro team that they had a robust video system that improved situational awareness and response times, especially after the devastating earthquake in Kahramanmaraş." "As a busy international Ro-Ro Port with millions of dollars of stock and equipment, having the best security, that’s intuitive to use and easy to install, was essential.” Steering ahead The installation is part of the new port area and the security team looks forward to reaping the benefits of the efficiency gains, greater awareness, more detailed investigations, and faster response times as a result of the AI-powered video system.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?