Cargo security
Smiths Detection, a pioneer in threat detection and security screening technologies, and a business of Smiths Group plc, announces it is to supply SDX 6040 X-ray inspection systems to a number of major cruise lines. With thousands of people and large quantities of cargo coming onboard, screening systems are vital in helping detect weapons, explosives, drugs, and other prohibited items hidden in luggage or supplies. SDX 6040’s portable and flexible design SDX 6040’s portable and fl...
Trusted Connectivity Alliance (TCA) has released Version 3.4 of its eUICC Profile Package: Interoperable Format Technical Specification (Interoperable Profile Package Specification). The latest version includes major updates to support full alignment with 3GPP Release 18 to enable advanced 5G functionality and secure authentication in 5G network slicing, as well as enabling the remote management of eSIM profiles on low-power and network-constrained devices. Interoperable connectivity...
Sabio Group announced the expansion of its acclaimed ‘Disrupt’ programme across Europe for 2025, taking its digital customer experience (CX) transformation event to three major European cities. The expansion of its flagship event comes at a critical time for the CX industry, with artificial intelligence rapidly evolving, cost of living pressures continuing, and volatile energy prices creating significant challenges for contact centres and frontline customer service staff. Expanding...
iDenfy, a Lithuania-based RegTech solution provider best known for its fraud prevention tools, announced a new milestone established by recognition from G2. A pioneer B2B review platform, which has named iDenfy as one of the Best Software Products of 2025. This marks iDenfy’s debut on the top 100 list, with the company securing 44th place in the Financial Services Products category and 48th place in the Data Privacy Products section. Trusted security solutions G2’s rankings...
The much-anticipated Inter Airport Southeast Asia (IASEA) 2025 has officially opened now at Marina Bay Sands, Singapore, bringing together key airport industry stakeholders, global solution providers, and pioneering experts to shape the future of airport operations and passenger experience. Themed “Airport Operations for Tomorrow,” conversations surrounding these topics are especially crucial as the aviation industry is witnessing rapid transformation and projected global passe...
FLIR will be showcasing its K-Series thermal imaging cameras with enhanced image quality at FDIC International 2025 in Indianapolis. FDIC International offers thousands of Fire & Rescue professionals from around the world, quality world-class instructors, classrooms, workshops, H.O.T. Evolutions and the most innovative products and services. Discover K-Series Innovations FLIR’s solutions interact with experts to showcase FLIR K-Series, which feature enhanced image qualityAt ex...
News
OSI Systems, Inc. announced that its Security division received an international award valued at approximately $12 million to provide multiple units of the Eagle® M60 ZBx multi-energy, mobile cargo, and vehicle inspection system with combinational imaging, including follow-on maintenance and support. These inspection systems are expected to be used for international border and security requirements. Eagle® M60 ZBx Ajay Mehra, President and CEO of OSI Systems, commented, "We are pleased to receive this award and are committed to supporting our customer's critical mission." "The Eagle® M60 ZBx utilises high-quality transmission X-ray technology with material discrimination for powerful imaging of dense cargo, alongside Z Backscatter® technology for enhanced detection of organic threats and contraband, providing photo-like imaging for easier interpretation. These features enhance inspection capabilities to help identify various threats to infrastructure safety and security."
OSI Systems, Inc. announced that its Security division received an order from an international customer valued at approximately $81 million to provide multiple units of the Eagle® M60 mobile high-energy cargo and vehicle inspection system. The inspection systems are expected to be used for securing borders and critical infrastructure. OSI Systems’ President and CEO, Ajay Mehra, stated, “We are pleased to receive this significant award from an existing customer. The Eagle® M60's rugged design has demonstrated its effectiveness in meeting the most stringent security demands, while its mobility enables swift adjustments to security checkpoint locations, enhancing overall protection.”
OSI Systems, Inc. (the “Company” or “OSI Systems”) announced that its Security division received an order for approximately $27 million to provide a range of checkpoint and hold baggage screening solutions to an international customer. Aviation security products Among the systems to be delivered are the RTT® 110 (Real Time Tomography) explosive detection system for screening hold baggage, Orion® 920CT (Computed Tomography) checkpoint screening system integrated with Rapiscan® TRS™ (Tray Return System) for inspecting carry-on items, Orion 928DX for screening air cargo and pallets, and Itemiser® 5X for detecting trace amounts of explosives and narcotics. OSI Systems’ President and CEO, Ajay Mehra, commented, "We are excited to receive this award. Our broad portfolio of aviation security products gives customers tremendous flexibility to optimise their security infrastructure and meet critical international airport security standards utilising our latest technologies.”
Allied Universal® today announced that Taylor Carr has joined its Technology Services business unit as senior vice president of operations. In this role, Carr will oversee operations and drive growth across all revenue segments of the business. Experienced industry leader Carr has more than 25 years of experience in the technology and security industriesCarr has more than 25 years of experience in the technology and security industries. Most recently he served as president for Vision Technologies, a national systems integrator specializing in security, audio-visual, wireless, networking, and structured cabling solutions. In his professional past, he held leadership and management positions at a wide range of national and global technology companies. Expertise driving excellence "We are pleased to welcome Taylor to Allied Universal’s Technology Services business unit," said Carey Boethel, president Allied Universal Technology Services. "With his extensive experience in technology and security, he brings a strong track record of leadership and operational excellence.” “His expertise will be instrumental in driving growth, enhancing service delivery and advancing our commitment to providing innovative security solutions to our clients." Industry affiliations Carr earned a bachelor’s degree in criminology and criminal justice from the University of Maryland and is a member of SIA (Security Industry Association) and ASIS International.
Themed “Airport Operations for Tomorrow”, inter airport Southeast Asia 2025 (IASEA) curated a lineup of conference sessions and the latest innovations to drive conversations on what a sustainable tomorrow looks like for Asia’s airport operations and ground handling industry. From 25-27 March 2025, the 8th edition of IASEA is expected to gather over 4,000 attendees, 150 notable global brands and some 50 industry experts as speakers at the iconic Marina Bay Sands, Singapore. IASEA 2025 Conference–Mastermind keynotes The session will discuss keys that improve operational efficiencies and lay the foundation for resilient Setting the stage for this conference on day 1 (25 March) is the fireside chat titled Reshaping Global Airport Operations by Patrick Ky, CEO, International Centre for Aviation Innovation (ICAI), an industry pioneer with nearly three decades worth of aviation experience. Moderated by Glory Wee, Senior Director, Aviation Development Group, Civil Aviation Authority Singapore (CAAS), the session will discuss solutions that improve operational efficiencies and lay the foundation for resilient and future-proof airports. Next-generation air navigation services “Globally, Asia Pacific takes the lead as the region with 60% of the total number of airport projects, and the region’s carriers handled 31 million international passengers, which was a 19.8% increase in November 2024 compared to November 2023. Recognising the need to address ground and airspace capacity constraints and manpower shortages, while keeping up with increasing passenger footfall in the region, the International Centre for Aviation Innovation was established in Singapore,” said Patrick Ky, CEO, International Centre for Aviation Innovation (ICAI). “ICAI focuses on research and development projects for next-generation air navigation services, automated and smart airports, and unmanned aviation systems and sustainable aviation. At the upcoming IASEA 2025, I’m excited to share insights into new innovations that will be tested in Singapore before being deployed globally.” Skytrax’s World Top Airport List 2024 Keynote sessions led by two of the top 5 airports according to Skytrax’s World Top Airport List 2024 This will be followed by keynote sessions led by two of the top 5 airports according to Skytrax’s World Top Airport List 2024. The first keynote, Airports of The Next Decade & Beyond with Shinichiro Motomiya, General Manager, Narita International Airport Corporation, will provide insights into the master plan of Narita International Airport – a case study of the airport of the future, and Airport in Brief: Incheon Airport with Soonil Hwang, Deputy Director of Fast Travel Team, Incheon International Airport Corporation, will cover a deep dive into the airport’s Digital Transformation Project. New Narita Airport expansion project Shinichiro Motomiya, General Manager, Narita International Airport Corporation, shared, “To ensure that airports can keep up with this surging demand in air traffic today, it’s become paramount for the industry to accelerate conversations on what will make airports sustainable, improve operational resilience and passenger experience. Take the ‘New Narita Airport’ expansion project as a case in point, which we will share about during the keynote session." "The airport development project for the 2030s is looking at consolidating terminals and building a new cargo area to allow for the expected increase of passenger capacity from 57 to 75 million and cargo capacity from 2.4 to 3.5 million tons at Narita International Airport.” Use of Artificial Intelligence technologies Soonil Hwang, Deputy Director of the Fast Travel Team, Incheon International Airport Corporation commented, “We should not shun away from the use of Artificial Intelligence technologies, especially in the aviation industry. At Incheon International Airport, we believe that technology will strike a fine balance between passenger experience and operational efficiency." "Hence, we’ve analysed customer demands and drawn a Persona Journey Map to design solutions around it. As we complete Phase 4 of the transformation of Incheon International Airport, it is my pleasure to share at the upcoming IASEA how we’ve identified values such as ‘Convenient Journey’ or ‘Time’ and utilised them to elevate the customer experience.” Challenges in ground management Minh will cover the solutions needed to address challenges in ground management The morning of the opening day will also see Nguyen Dang Minh, Head of Airport Operations Department, Airports Corporation of Vietnam (ACV) spearhead the next keynote, Vietnam Airport Development Masterplan 2030. Vietnam stands as a pioneer in the aviation landscape, aiming to expand its airport network to 30 airports by 2030 and a long-term vision extending to 2050 that includes upgrades to increase annual passenger capacity by over 80%. As new airports are being built and existing ones upgraded, Minh will cover the solutions needed to address challenges in ground management, security, and resource allocation that will enable airport operations to evolve alongside Vietnam’s expanding aviation network. How transformative technology, greener practices Day 2 of the conference will open with the keynote Global Action Plan for the Prevention of Runway Incursion. With safety as a top priority for the aviation industry, and runway incursions as one of the top five high-risk categories of aviation risks, the session will be led by Mitch Fox, Director, Asia Pacific Centre for Aviation Safety, Flight Safety Foundation, who will cover recommendations from the Global Action Plan for the Prevention of Runway Incursions (GAPRI) that go beyond simple regulatory compliance. Aside from safety, efficiency and sustainability are the next priorities to drive airports of tomorrow. Brad Moore, CEO, APAC, Swissport International AG, will lead the next keynote Redefining Ground Support Excellence in Asia Pacific to examine how transformative technology, greener practices, and strategic innovation are unlocking new opportunities for ground handling – a critical backbone of the aviation system. Aside from these mastermind keynotes, other industry experts and thought pioneers from the airport industry will join the conference, sharing their groundbreaking strategies for transforming terminal and ramp operations to address the challenges of today's demanding and rapidly changing aviation landscape. Some of the conference highlights Using Data Analytics to Optimise Airport Operations Rethinking Passenger Flow: Unravelling the Knot of Terminal Congestion Transforming Baggage Handling: Best Practices for Modern Airports Future-Proofing Airport Security: Balancing Safety, Technology & Passenger Experience Boosting Operational Resilience: Preparing for the Unexpected State-of-the-art solutions at inter airport Southeast Asia 2025 As the reference point for the future of airports, IASEA 2025 will stand as a platform to unveil the latest aviation technologies aimed at streamlining workflows, improving sustainability and elevating operational capabilities. Automation will continue to play a pivotal role in ever-growing passenger expectations. SITA’s 2024 Baggage IT Insights reveal that 80% of airports and 66% of airlines have put touchless self-service baggage handling in place, and more investments will continue in 2025. Award-winning airport management software Aligned with this change, industry expert Smith Detection will introduce to the Asia market the SDX 10060 XDi Aligned with this transformation, industry expert Smith Detection will introduce to the Asia market the SDX 10060 XDi, a ground-breaking X-ray scanner, offering highly accurate material discrimination and substance identification based on an object’s molecular structure. Separately, biometrics and digital identity pioneer NEC will showcase its facial recognition technology, ranked the world’s most accurate in a benchmark test conducted by the U.S. National Institute of Standards and Technology in 2024. ADB Safegate Singapore, who recently clinched awards for Environmental Initiatives, Innovation, Safety, and Business Expansion at the Airport Technology Excellence Awards 2024, will present their award-winning airport management software. Other notable brands to expect on the exhibition floor Aviaco GSE, CIAS, Colibri Energy, Cobus Industries, Datalogic, ewo, FAAC, Fastcharge, FibreFENCE by Fibre Net Spa, FLEX Industries, GRP Iluminacion, Honeywell, ITW GSE, Japan Radio Co., LEONARDO, Mallaghan, Mototok, NEC, OCEM Airfield, Oshkosh AeroTech, Poltrona Frau, Roypow Technology GmbH, SICK AG, ShinMaywa, Thales, TCR, TLD Asia, Toyota Industries Corporation, TREPEL and Weihai Guangtai. All registered professionals for inter airport Southeast Asia 2025 will be granted free access to the exhibition and conference floors. For the latest information on inter airport Southeast Asia, please visit the event website, LinkedIn, or Facebook pages.
The International Maritime Cyber Security Organisation (IMCSO), an independent maritime standards organisation, has released its cybersecurity testing methodology for those maritime vessels looking to assess their risk and join the Cyber Risk Registry, a risk register database maintained by the IMCSO. The methodology aims to provide IMCSO-accredited cyber consultants and the senior maritime personnel they will be assessing with standardised testing by outlining test scope and the language to be used to ensure tests are planned, executed and reported effectively. Quality of cyber risk assessments “Currently there is no standard in the maritime sector for governing the quality of cyber risk assessments. This methodology will set a precedent by providing a set of criteria that assessors must observe when on engagement and against which maritime security can be measured." "It is a very big step forward in normalising both expectations and requirements in the maritime space,” said Campbell Murray, CEO at the IMCSO. Guide for cybersecurity practitioners The methodology stipulates the needs under which the cybersecurity checks will be carried out The methodology stipulates the conditions under which the cybersecurity assessments will be carried out. It acts as a legal and practical guide for cybersecurity practitioners who must adhere to the standards as a condition of their inclusion on the approved suppliers list, otherwise known as the Certified Supplier Registry, held by the IMCSO. The Captain and crew undergoing the assessment will also be required to abide by the methodology and undergo pre-assessment training to become cyber-ready in order to better understand the process and its findings. Operational technology standards Testing will assess security across ten categories under the umbrella term of Operational Technology (OT), i.e., the hardware and software needed to monitor and control the physical processes of the ship. These include navigation, propulsion, electrical systems, communication, safety systems, cargo handling, environmental systems, and maintenance systems, human factors, and regulatory and compliance issues. The assessment may be carried out at sea, onshore or a combination of the two. Currently, the only OT standards available to the sector are those associated with the manufacturing industry and very few directly assess OT. Cybersecurity posture In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers, as Murray explains: “Third parties and the shipping companies share a dependency, with joint goals and integrated operations." "Yet, with supply chain attacks on the rise, they represent a real risk to operations. This can strain the relationship but by applying a systematic approach through a standardised risk assessment, the company can rely upon the process to vet the cybersecurity posture of their suppliers for them.” Key components of the IMCSO security testing methodology Pre-Requisites: Rules of engagement, authorisation, scope of work, objectives, zones of testing. Scope of Work: Outlines the project details and goals, signed by both parties. Rules of Engagement: Guidelines for testing, including permitted hours and restrictions. Authorisation and Legal Considerations: Compliance with laws and written stakeholder approval. Testing Methodology: The approach used (e.g., black-box, white-box). Deliverables: Expected outputs, such as reports and recommendations. Timelines: Start and end dates, with key milestones. Communication Plan: Points of contact and reporting protocols. Risk Management and Contingency Planning: Plans to mitigate potential risks like downtime or data loss. Confidentiality and Data Handling: Protecting sensitive data and results Testing Activity: Performed by qualified personnel, with prompt reporting of critical issues. Reporting: Clear and categorised reporting of security findings, including solutions. Report Delivery: Secure and confidential delivery of the final report. Cyber risk of the vessel Reports will take a practical method with clear advice made in response to any security issues Reports will take a practical approach with clear recommendations made in response to any of security issues or vulnerabilities. Outputs will be standardised under the methodology using qualitative metrics and this consistency will ensure the results for each vessel are comparable. The results will be used to profile the cyber risk of the vessel, the status of which will be recorded in the Cyber Risk Registry. Cyber risk trends within the maritime sector Shipowners are sensitive about sharing their vessel's data. The Cyber Risk Registry will serve as a valuable resource for stakeholders and relevant parties, including port authorities, insurance companies, and association partners, by providing insights into cyber risk trends within the maritime sector. Additionally, it will support the broader industry—including the IMO, shipbuilders, management companies, and industry associations—by offering a trusted registry of vendors, qualified practitioners, and service providers to help vessels strengthen their cyber resilience and mitigate risks effectively.
OSI Systems, Inc. announced that its Security division received an international award valued at approximately $12 million to provide multiple units of the Eagle® M60 ZBx multi-energy, mobile cargo, and vehicle inspection system with combinational imaging, including follow-on maintenance and support. These inspection systems are expected to be used for international border and security requirements. Eagle® M60 ZBx Ajay Mehra, President and CEO of OSI Systems, commented, "We are pleased to receive this award and are committed to supporting our customer's critical mission." "The Eagle® M60 ZBx utilises high-quality transmission X-ray technology with material discrimination for powerful imaging of dense cargo, alongside Z Backscatter® technology for enhanced detection of organic threats and contraband, providing photo-like imaging for easier interpretation. These features enhance inspection capabilities to help identify various threats to infrastructure safety and security."
OSI Systems, Inc. announced that its Security division received an order from an international customer valued at approximately $81 million to provide multiple units of the Eagle® M60 mobile high-energy cargo and vehicle inspection system. The inspection systems are expected to be used for securing borders and critical infrastructure. OSI Systems’ President and CEO, Ajay Mehra, stated, “We are pleased to receive this significant award from an existing customer. The Eagle® M60's rugged design has demonstrated its effectiveness in meeting the most stringent security demands, while its mobility enables swift adjustments to security checkpoint locations, enhancing overall protection.”
OSI Systems, Inc. (the “Company” or “OSI Systems”) announced that its Security division received an order for approximately $27 million to provide a range of checkpoint and hold baggage screening solutions to an international customer. Aviation security products Among the systems to be delivered are the RTT® 110 (Real Time Tomography) explosive detection system for screening hold baggage, Orion® 920CT (Computed Tomography) checkpoint screening system integrated with Rapiscan® TRS™ (Tray Return System) for inspecting carry-on items, Orion 928DX for screening air cargo and pallets, and Itemiser® 5X for detecting trace amounts of explosives and narcotics. OSI Systems’ President and CEO, Ajay Mehra, commented, "We are excited to receive this award. Our broad portfolio of aviation security products gives customers tremendous flexibility to optimise their security infrastructure and meet critical international airport security standards utilising our latest technologies.”
Allied Universal® today announced that Taylor Carr has joined its Technology Services business unit as senior vice president of operations. In this role, Carr will oversee operations and drive growth across all revenue segments of the business. Experienced industry leader Carr has more than 25 years of experience in the technology and security industriesCarr has more than 25 years of experience in the technology and security industries. Most recently he served as president for Vision Technologies, a national systems integrator specializing in security, audio-visual, wireless, networking, and structured cabling solutions. In his professional past, he held leadership and management positions at a wide range of national and global technology companies. Expertise driving excellence "We are pleased to welcome Taylor to Allied Universal’s Technology Services business unit," said Carey Boethel, president Allied Universal Technology Services. "With his extensive experience in technology and security, he brings a strong track record of leadership and operational excellence.” “His expertise will be instrumental in driving growth, enhancing service delivery and advancing our commitment to providing innovative security solutions to our clients." Industry affiliations Carr earned a bachelor’s degree in criminology and criminal justice from the University of Maryland and is a member of SIA (Security Industry Association) and ASIS International.
Themed “Airport Operations for Tomorrow”, inter airport Southeast Asia 2025 (IASEA) curated a lineup of conference sessions and the latest innovations to drive conversations on what a sustainable tomorrow looks like for Asia’s airport operations and ground handling industry. From 25-27 March 2025, the 8th edition of IASEA is expected to gather over 4,000 attendees, 150 notable global brands and some 50 industry experts as speakers at the iconic Marina Bay Sands, Singapore. IASEA 2025 Conference–Mastermind keynotes The session will discuss keys that improve operational efficiencies and lay the foundation for resilient Setting the stage for this conference on day 1 (25 March) is the fireside chat titled Reshaping Global Airport Operations by Patrick Ky, CEO, International Centre for Aviation Innovation (ICAI), an industry pioneer with nearly three decades worth of aviation experience. Moderated by Glory Wee, Senior Director, Aviation Development Group, Civil Aviation Authority Singapore (CAAS), the session will discuss solutions that improve operational efficiencies and lay the foundation for resilient and future-proof airports. Next-generation air navigation services “Globally, Asia Pacific takes the lead as the region with 60% of the total number of airport projects, and the region’s carriers handled 31 million international passengers, which was a 19.8% increase in November 2024 compared to November 2023. Recognising the need to address ground and airspace capacity constraints and manpower shortages, while keeping up with increasing passenger footfall in the region, the International Centre for Aviation Innovation was established in Singapore,” said Patrick Ky, CEO, International Centre for Aviation Innovation (ICAI). “ICAI focuses on research and development projects for next-generation air navigation services, automated and smart airports, and unmanned aviation systems and sustainable aviation. At the upcoming IASEA 2025, I’m excited to share insights into new innovations that will be tested in Singapore before being deployed globally.” Skytrax’s World Top Airport List 2024 Keynote sessions led by two of the top 5 airports according to Skytrax’s World Top Airport List 2024 This will be followed by keynote sessions led by two of the top 5 airports according to Skytrax’s World Top Airport List 2024. The first keynote, Airports of The Next Decade & Beyond with Shinichiro Motomiya, General Manager, Narita International Airport Corporation, will provide insights into the master plan of Narita International Airport – a case study of the airport of the future, and Airport in Brief: Incheon Airport with Soonil Hwang, Deputy Director of Fast Travel Team, Incheon International Airport Corporation, will cover a deep dive into the airport’s Digital Transformation Project. New Narita Airport expansion project Shinichiro Motomiya, General Manager, Narita International Airport Corporation, shared, “To ensure that airports can keep up with this surging demand in air traffic today, it’s become paramount for the industry to accelerate conversations on what will make airports sustainable, improve operational resilience and passenger experience. Take the ‘New Narita Airport’ expansion project as a case in point, which we will share about during the keynote session." "The airport development project for the 2030s is looking at consolidating terminals and building a new cargo area to allow for the expected increase of passenger capacity from 57 to 75 million and cargo capacity from 2.4 to 3.5 million tons at Narita International Airport.” Use of Artificial Intelligence technologies Soonil Hwang, Deputy Director of the Fast Travel Team, Incheon International Airport Corporation commented, “We should not shun away from the use of Artificial Intelligence technologies, especially in the aviation industry. At Incheon International Airport, we believe that technology will strike a fine balance between passenger experience and operational efficiency." "Hence, we’ve analysed customer demands and drawn a Persona Journey Map to design solutions around it. As we complete Phase 4 of the transformation of Incheon International Airport, it is my pleasure to share at the upcoming IASEA how we’ve identified values such as ‘Convenient Journey’ or ‘Time’ and utilised them to elevate the customer experience.” Challenges in ground management Minh will cover the solutions needed to address challenges in ground management The morning of the opening day will also see Nguyen Dang Minh, Head of Airport Operations Department, Airports Corporation of Vietnam (ACV) spearhead the next keynote, Vietnam Airport Development Masterplan 2030. Vietnam stands as a pioneer in the aviation landscape, aiming to expand its airport network to 30 airports by 2030 and a long-term vision extending to 2050 that includes upgrades to increase annual passenger capacity by over 80%. As new airports are being built and existing ones upgraded, Minh will cover the solutions needed to address challenges in ground management, security, and resource allocation that will enable airport operations to evolve alongside Vietnam’s expanding aviation network. How transformative technology, greener practices Day 2 of the conference will open with the keynote Global Action Plan for the Prevention of Runway Incursion. With safety as a top priority for the aviation industry, and runway incursions as one of the top five high-risk categories of aviation risks, the session will be led by Mitch Fox, Director, Asia Pacific Centre for Aviation Safety, Flight Safety Foundation, who will cover recommendations from the Global Action Plan for the Prevention of Runway Incursions (GAPRI) that go beyond simple regulatory compliance. Aside from safety, efficiency and sustainability are the next priorities to drive airports of tomorrow. Brad Moore, CEO, APAC, Swissport International AG, will lead the next keynote Redefining Ground Support Excellence in Asia Pacific to examine how transformative technology, greener practices, and strategic innovation are unlocking new opportunities for ground handling – a critical backbone of the aviation system. Aside from these mastermind keynotes, other industry experts and thought pioneers from the airport industry will join the conference, sharing their groundbreaking strategies for transforming terminal and ramp operations to address the challenges of today's demanding and rapidly changing aviation landscape. Some of the conference highlights Using Data Analytics to Optimise Airport Operations Rethinking Passenger Flow: Unravelling the Knot of Terminal Congestion Transforming Baggage Handling: Best Practices for Modern Airports Future-Proofing Airport Security: Balancing Safety, Technology & Passenger Experience Boosting Operational Resilience: Preparing for the Unexpected State-of-the-art solutions at inter airport Southeast Asia 2025 As the reference point for the future of airports, IASEA 2025 will stand as a platform to unveil the latest aviation technologies aimed at streamlining workflows, improving sustainability and elevating operational capabilities. Automation will continue to play a pivotal role in ever-growing passenger expectations. SITA’s 2024 Baggage IT Insights reveal that 80% of airports and 66% of airlines have put touchless self-service baggage handling in place, and more investments will continue in 2025. Award-winning airport management software Aligned with this change, industry expert Smith Detection will introduce to the Asia market the SDX 10060 XDi Aligned with this transformation, industry expert Smith Detection will introduce to the Asia market the SDX 10060 XDi, a ground-breaking X-ray scanner, offering highly accurate material discrimination and substance identification based on an object’s molecular structure. Separately, biometrics and digital identity pioneer NEC will showcase its facial recognition technology, ranked the world’s most accurate in a benchmark test conducted by the U.S. National Institute of Standards and Technology in 2024. ADB Safegate Singapore, who recently clinched awards for Environmental Initiatives, Innovation, Safety, and Business Expansion at the Airport Technology Excellence Awards 2024, will present their award-winning airport management software. Other notable brands to expect on the exhibition floor Aviaco GSE, CIAS, Colibri Energy, Cobus Industries, Datalogic, ewo, FAAC, Fastcharge, FibreFENCE by Fibre Net Spa, FLEX Industries, GRP Iluminacion, Honeywell, ITW GSE, Japan Radio Co., LEONARDO, Mallaghan, Mototok, NEC, OCEM Airfield, Oshkosh AeroTech, Poltrona Frau, Roypow Technology GmbH, SICK AG, ShinMaywa, Thales, TCR, TLD Asia, Toyota Industries Corporation, TREPEL and Weihai Guangtai. All registered professionals for inter airport Southeast Asia 2025 will be granted free access to the exhibition and conference floors. For the latest information on inter airport Southeast Asia, please visit the event website, LinkedIn, or Facebook pages.
The International Maritime Cyber Security Organisation (IMCSO), an independent maritime standards organisation, has released its cybersecurity testing methodology for those maritime vessels looking to assess their risk and join the Cyber Risk Registry, a risk register database maintained by the IMCSO. The methodology aims to provide IMCSO-accredited cyber consultants and the senior maritime personnel they will be assessing with standardised testing by outlining test scope and the language to be used to ensure tests are planned, executed and reported effectively. Quality of cyber risk assessments “Currently there is no standard in the maritime sector for governing the quality of cyber risk assessments. This methodology will set a precedent by providing a set of criteria that assessors must observe when on engagement and against which maritime security can be measured." "It is a very big step forward in normalising both expectations and requirements in the maritime space,” said Campbell Murray, CEO at the IMCSO. Guide for cybersecurity practitioners The methodology stipulates the needs under which the cybersecurity checks will be carried out The methodology stipulates the conditions under which the cybersecurity assessments will be carried out. It acts as a legal and practical guide for cybersecurity practitioners who must adhere to the standards as a condition of their inclusion on the approved suppliers list, otherwise known as the Certified Supplier Registry, held by the IMCSO. The Captain and crew undergoing the assessment will also be required to abide by the methodology and undergo pre-assessment training to become cyber-ready in order to better understand the process and its findings. Operational technology standards Testing will assess security across ten categories under the umbrella term of Operational Technology (OT), i.e., the hardware and software needed to monitor and control the physical processes of the ship. These include navigation, propulsion, electrical systems, communication, safety systems, cargo handling, environmental systems, and maintenance systems, human factors, and regulatory and compliance issues. The assessment may be carried out at sea, onshore or a combination of the two. Currently, the only OT standards available to the sector are those associated with the manufacturing industry and very few directly assess OT. Cybersecurity posture In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers, as Murray explains: “Third parties and the shipping companies share a dependency, with joint goals and integrated operations." "Yet, with supply chain attacks on the rise, they represent a real risk to operations. This can strain the relationship but by applying a systematic approach through a standardised risk assessment, the company can rely upon the process to vet the cybersecurity posture of their suppliers for them.” Key components of the IMCSO security testing methodology Pre-Requisites: Rules of engagement, authorisation, scope of work, objectives, zones of testing. Scope of Work: Outlines the project details and goals, signed by both parties. Rules of Engagement: Guidelines for testing, including permitted hours and restrictions. Authorisation and Legal Considerations: Compliance with laws and written stakeholder approval. Testing Methodology: The approach used (e.g., black-box, white-box). Deliverables: Expected outputs, such as reports and recommendations. Timelines: Start and end dates, with key milestones. Communication Plan: Points of contact and reporting protocols. Risk Management and Contingency Planning: Plans to mitigate potential risks like downtime or data loss. Confidentiality and Data Handling: Protecting sensitive data and results Testing Activity: Performed by qualified personnel, with prompt reporting of critical issues. Reporting: Clear and categorised reporting of security findings, including solutions. Report Delivery: Secure and confidential delivery of the final report. Cyber risk of the vessel Reports will take a practical method with clear advice made in response to any security issues Reports will take a practical approach with clear recommendations made in response to any of security issues or vulnerabilities. Outputs will be standardised under the methodology using qualitative metrics and this consistency will ensure the results for each vessel are comparable. The results will be used to profile the cyber risk of the vessel, the status of which will be recorded in the Cyber Risk Registry. Cyber risk trends within the maritime sector Shipowners are sensitive about sharing their vessel's data. The Cyber Risk Registry will serve as a valuable resource for stakeholders and relevant parties, including port authorities, insurance companies, and association partners, by providing insights into cyber risk trends within the maritime sector. Additionally, it will support the broader industry—including the IMO, shipbuilders, management companies, and industry associations—by offering a trusted registry of vendors, qualified practitioners, and service providers to help vessels strengthen their cyber resilience and mitigate risks effectively.


Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse future trends. Or you could try statistical or economic modelling. Or you could develop multiple scenarios based on various assumptions to explore potential outcomes. Or you could just check your email. At this time of year, my email is full of industry folks looking to predict what the future holds in 2025. Ranging from artificial intelligence (AI) to privacy, the retail market to drones, here is a sampling of forecasts for 2025 provided by various players in the security market, courtesy of my email messages. What’s Ahead for AI? From Faisal Pandit, VP & GM, Global Security Products, Johnson Controls (JCI): “The future of security operations includes customisable, scalable solutions where users can control if, when, and how they use AI to improve efficiency depending on the size and function of their organisation.” Says Kevin Woodworth, Vice President, Global Product Management, Intrusion, JCI: “Next year will see a growing focus from product developers on designing systems that streamline setup and configuration through increased AI integration. This reflects a broader trend of leveraging AI to simplify use and enhance adaptability as solutions evolve, rather simply employing it because it’s popular.” From Peter Evans, CEO of Xtract One Technologies: “AI algorithms will significantly advance in distinguishing between harmless, everyday items and potential threats. With this, we will see false alerts become even more rare.” Says JP Castellanos, Director of Threat Intelligence, Binary Defense: “Machine learning (ML)-powered anomaly detection will move beyond proof-of-concept to become mission-critical, enabling teams to uncover unknown threats and behavioural anomalies in real time – well before they escalate.” Evans of Xtract: “As AI becomes more advanced in threat detection, it will lead to more sophisticated protection of individual privacy. We can expect to see more AI techniques utilised for threat identification that do not capture personal data and are privacy-first.” Predictions on interoperability and compliance Woodworth of JCI: “New products added to singular systems must be interoperable. In 2025, organisations will need to embrace interoperability. AI will progress past reactive measures to achieve predictive capabilities.” Pandit of JCI: “With organisations increasing their focus on the regulatory environment, there will be an uptick in specialised certification programs to meet these needs. New security roles will emerge that will be focused on tracking and applying relevant regulatory changes.” Expanding capabilities for video cameras Woodworth of JCI: “Beyond capturing images, cameras will be able to detect potential threats and also mitigate them instantly, issuing vocal warnings, controlling access, or escalating issues without human intervention.” Looking ahead to retail developments Hansel Oh, Director of Product Marketing at Brivo: “Centralized, cloud-based security platforms will enhance credential management and monitor logistical operations to enable retailers to battle cargo theft.” Stephen Burd, Vice President, Essence Security: “With an increase in police response times, sophisticated crime, and smash and grabs, 2025 will see a huge demand for security solutions that go beyond simply notifying the police and will look to actively intervene and prevent damage or loss from occurring.” The role of drones and training Mary-Lou Smulders, CMO, Dedrone by Axon: “Drones will transition from being viewed as supplementary tools to becoming essential components of public safety operations. As departments recognise their effectiveness in various scenarios, the perception of drones will shift, and they will be integrated into core operational frameworks alongside traditional assets like patrol cars while replacing helicopters as a cost-effective and versatile alternative.” Erik Hohengasser, Electrical Technical Lead at NFPA: “As the skilled trades evolve, there will be an increasing demand for specialised and technical training. Predictive analytics, virtual simulations and hands-on experiential learning will become especially valuable due to allowing employees to gain real-world expertise in safe and controlled environments.”
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organisations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organisation, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organisation’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organisations to check whether drivers are licenced and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organisation is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organisation. This includes fraud, bankruptcy, poor business practices, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licencing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilising software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Case studies
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to expand to major cities across the United States in the coming year. Adopter of new technology Francisco recognised the value that an integrated physical security system President & Founder Francisco Garcia started the company with a 15-year background in product design and mechanical engineering. An early adopter of new technology, Francisco recognised the value that an integrated physical security system could bring to the organisation, improving efficiency while going above and beyond in protecting cargo. "Once clients see our facilities, they are assured. We don't cut corners on cargo security.” The challenge Safety and security are critical for LYNX, which differentiates itself in the market with the real-time visibility it provides clients over their cargo. To meet industry requirements, the company must also provide accurate compliance documentation and assurance of timely deliveries. To maintain client satisfaction, the team proactively works to prevent and mitigate the risk of errors, defects, damages, and delays. “At one point, I considered implementing container recognition software that could read container IDs. Today, AI-powered search solves this problem.” Team proactively works to prevent and mitigate the risk of errors, defects, damages. Why Verkada? Verkada cameras, intercom, and air quality sensors are integrated behind the Command platform Verkada cameras, intercom, air quality sensors, alarms, and access control security solutions are seamlessly integrated behind the centralised Command platform, giving teams an all-in-one view of security operations – including cargo and containers. "The container ID numbers are the heartbeat of logistics. Everything moves in them, and there's often a need to review camera footage to pinpoint exactly when a container arrived and left the facility.” AI-powered search AI-powered search empowers LYNX to search for people and vehicles using freeform text within the Command platform. By typing in unique container IDs and vehicle information, teams can swiftly find and track a container's precise location and status. This reduces the risk of potential holding charges and administrative tasks, enabling the team to submit real-time data on the spot. “Using AI-powered search, we can quickly locate each container by its unique ID and know exactly where cargo is in the facility, as well as which employee unloaded each container, at which dock door, and for how long." AI-powered search empowers LYNX to search for people and vehicles. Efficient tracking and dispatch Instead of manually sifting through hours of footage, the dispatch team can retrieve the footage they need by typing in container IDs and vehicle descriptions. In the Command search bar, they can enter terms like "(container ID) red truck between April 15th and May 1st” and specify a camera or location to narrow the search even more. "Tracking down a container in our yard now takes a fraction of the time. Instead of scrolling through hours of footage, we can easily find the exact footage we need in seconds. We can filter results via the entrance camera and see when certain crates arrived based on their container ID.” Dispatch team can retrieve the footage they need by typing in container IDs. Real-time cargo monitoring Francisco can remotely check the camera feed from the Command web browser or mobile app Every corner of the facilities is closely monitored by hybrid cloud cameras that oversee cargo from its arrival to its final storage location. Through a web link, vendors can see the whereabouts of cargo as it’s unloaded, transported, and warehoused within facilities. At any point in time, Francisco can remotely check the camera feed from the Command web browser or mobile app. He has set up motion alerts for unusual after-hours activity, to which he can take action and even automate responses with professional monitoring. "We're proud to offer live monitoring to our customers, who can see as their cargo is unloaded and stored securely.” Proactive safety and risk mitigation AI-powered search helps verify that safety standards, protocols, and policies are maintained. By detecting and addressing issues quickly, the team swiftly takes action to prevent accidents and equipment damage, proactively upholding a safer work environment. “We can check for employees wearing safety vests while working, or certain forklifts only being used inside and not outside.” AI-powered search helps verify safety standards, protocols, and policies. Automating visitor management with driver check-in portal By U.S. Customs and TAPA certification standards, every driver must sign in upon entering the premises. Instead of relying on a pen-and-paper logbook, Francisco has turned Verkada Guest into a driver check-in portal. This digital record helps maintain compliance by facilitating the driver check-in process. “Now, drivers can check in through the Guest iPad, take a photo, and upload their licence. This process helps us comply with customs in a streamlined way.” Francisco has turned Verkada Guest into a driver check-in portal. Streamlined audits to support certifications Meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification Checks and check-ins extend to cargo as well. With AI-powered search, the team can search for specific items, such as medical device crates, to ensure items are properly labelled and container IDs are verified as they arrive and leave. This meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification standards. "We're dually ISO-certified, TAPA-certified, and U.S. Customs-certified. All organisations were thoroughly impressed with our video security. When we present this package to high-level customers, they're mind-blown.” Medical device and environmental monitoring A core value at LYNX is providing their clientele with customised solutions that exceed expectations. Air quality sensors help show that ISO certification standards are met for their medical device clients. LYNX goes above and beyond – tracking temperature, humidity, and carbon dioxide levels to maintain optimal conditions. "The integrity of the sensors is important to us. What a lot of people do is put a sensor in the coolest spot in the facility, then manipulate the data to show consistent results," Francisco explains. "But we track everything honestly and transparently. We show our vendors the functionality behind Verkada’s sensor technology: temperature, humidity, CO2, indoor air quality, and beyond.” A core value at LYNX is providing their clientele with customised solutions. Intrusion detection, response, and alerts Verkada’s professional monitoring service includes intrusion response from trained agents LYNX recently transitioned its legacy alarm system to Verkada to bring all physical security management under one umbrella. "It just makes sense logistically to have our team manage everything through one interface.” Wired alarm sensors protect facilities at every access point, with the ability to alert staff of incidents like Door Held/Forced Open (DHO/DFO) and tailgating. Beyond real-time intrusion detection, Verkada’s professional monitoring service includes intrusion response from trained agents who can take action immediately to potential threats. Visibility and control over doors LYNX has over 20 access-controlled doors, a requirement for certain certifications. By efficiently controlling access points and implementing real-time compliance checks, LYNX provides a protected environment for high-value cargo. "We can track every single door, along with every person who accesses or tries to access them.” LYNX provides a protected environment for high-value cargo. Gated entry with intercom Upon arrival, visitors of all types buzz into the building using the Verkada Intercom Upon arrival, visitors of all types buzz into the building using Verkada Intercom. Dedicated LYNX staff members can verify the visitor’s identity, answer the call, choose to grant them entry, and even unlock doors remotely with integrated access control. Entrance security is further enhanced with context cameras and real-time alerts for people or vehicles of interest. "It's not just about letting people in; it's about ensuring that everyone who enters our facility is verified and authorised. This technology offers peace of mind to both our team and our clients." Multi-layered perimeter security Beyond the buildings, parking lots and perimeters are protected with Licence Plate Recognition (LPR) technology, cameras, and alarms. The main entrance is followed by two buffer zones, each with its own gate, and includes Licence Plate Recognition (LPR) cameras that track vehicles entering the premises. "We have a main entrance and multiple gates – all controlled through Verkada. The cameras are strategically placed, so we could even deploy tailgate detection if needed.” Parking lots and perimeters are protected with LPR technology. Quality and client assurance Francisco shows them their guest log and footage of everywhere they have been in the facility Auditors sign in via Verkada Guest before walking through the facility. At the end of their visit, Francisco shows them their guest log and footage of everywhere they have been in the facility. Once clients see the facilities firsthand, their decision becomes clear. "I truly believe that all we have to do is get people in here. The facility does the rest.” AI-powered search capabilities further distinguish LYNX in the logistics industry, offering exceptional protection for high-value cargo. "Our AI-powered capabilities set us apart in the market. This technological edge is why clients trust us with high-value items like medical devices." Looking ahead Francisco’s passion for new technology brings innovation to the forefront, setting the company apart in the competitive logistics industry. He has even built a special mount, which can peer into containers and trailers while suspended from the loading dock. "We believe in investing in cutting-edge technology to provide the highest level of service and quality for our customers. I love to hear, ‘Nobody else is doing this.’ It means our clients are doing their homework and we're doing something right.” Francisco’s passion for new technology brings innovation to the forefront. Their proactive security measures have built trust with customers and struck a chord with prospects. So much so that expansion plans are underway to open new facilities in major cities across the United States. “We can continue to bring our security to the next level, from AI-powered search to future feature releases. We’re excited to try it all.”
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
The Swiss Federal Railways (SBB) is the largest rail and transport company in Switzerland with 1.2 million passengers and 180,000 tonnes of freight transported every day. SBB is a pioneering rail system in Europe due to its quality of service, safety, and reliability. It operates passenger, cargo, and freight services, with large real estate holdings across Switzerland that it needs to keep secure and protect from crime, anti-social behaviour, and trespassing. High-performance cameras SBB video team needed to replace an existing video surveillance system across its rail network The SBB video team needed to replace an existing video surveillance system across its rail network. Hanwha Vision cameras were chosen due to their high performance, intelligent analytics, and attractive pricing. Hanwha Vision cameras from its X and P series, including a vandal-resistant network dome camera, plus PTZ cameras and network boxes, have been installed and used continuously since 2021. Video analytics for greater awareness The cameras have a wide range of beneficial functions and analytics such as audio detection, automatic lens distortion correction and WDR (Wide Dynamic Range). If an event occurs, the dome cameras can switch to PTZ cameras. The cameras also feature tamper detection, fog detection and day and night functions. Cost optimisation in the project and in operation SBB is using dome and multi-directional cameras from the X and P series SBB is increasingly using dome and multi-directional cameras from the X and P series with the option of remote lens alignment. These help to optimise costs in the project and during operation, as the alignment and the lens can be adjusted and corrected remotely at any time, eliminating the need for on-site adjustment. Securing perimeters With intelligent video analytics, such as loitering detection and virtual line-crossing and area detection, carried out on the device, the cameras deliver accurate motion detection, allowing operators to quickly understand if there is unauthorised entry to any restricted areas. The integrated AI supports the differentiation between people and different vehicles, increasing the accuracy of the analysis and minimising false alarms. "We are very satisfied with the performance of the Hanwha Vision cameras. They help us to secure our stations and buildings, optimise processes in rail operations, improve public safety and ensure that our trains run on time,” said Chei Seung-Kyoo, responsible for Technology Video at SBB.
Richard Thorp has been fascinated with aviation since childhood. A self-described “aviation geek,” Thorp is now the Chief Technology Officer at Swissport International AG, where he leads IT infrastructure strategy for the world’s largest ground-handling company, ensuring seamless operations across 276 airports in 45 countries, handling approximately 247 million airline passengers per year, as of the end of 2024. “If we were an airline, we’d actually be the biggest airline in the world in terms of a number of passengers we support and handle,” he says. Security challenges Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel. “If the things we do get people to their destinations safely and on time, then magically, we become more successful and profitable as an organisation,” he says. But casting that spell had been challenging for Swissport. Three years ago, legacy IT leadership at Swissport had overcome network challenges with Cato, but more work was needed to address their security challenges, particularly in securing endpoints. Thorp and Swissport CISO, Giles Ashton-Roberts, joined Swissport in the middle of the Cato deployment. Having deep experience with a legacy zero trust provider, they were skeptical that Cato could meet Swissport’s requirements. Cato platform Over the next 10 months of meetings, investigation, and testing Thorp and Ashton-Roberts challenged Cato, ultimately changing their perspective. “IT is no longer seen as a blocker; it just works,” says Thorp. “I relax a bit more with the Cato platform around. It’s given us holistic way of protecting ourselves today, and a secure foundation for everything we want to do in the future.” The challenges of a global, always-on operation Swissport’s network helps millions of passengers, cargo shipments, and lounges worldwide Swissport’s network supports millions of passengers, cargo shipments, and lounges worldwide. Three years ago, scale was an enormous challenge—ensuring reliable connectivity for operations spanning locations and time zones. The company relied on a mix of MPLS and regional SD-WAN solutions across its now 320+ sites and airport locations. But bandwidth limitations and performance variability impacted many applications, including cloud-based, mission-critical applications. As a result of that complicated network, expanding to new locations was resource-intensive, requiring manual setup and multiple vendor dependencies. Differences between networking tools made troubleshooting inconsistent and time-consuming. The IT team in turn had to maintain expertise in multiple networking technologies, increasing operational overhead. What security inspection existed for unencrypted traffic Visibility was an enormous challenge. With multiple network platforms in place, Swissport’s IT team lacked a centralised view of network performance and security threats. “In the past, working with multiple systems meant inconsistency,” says Thorp. “Different platforms required different configurations, which complicated troubleshooting and made security enforcement a challenge.” Swissport relied on a patchwork of security appliances, including firewalls and web gateways. Remote users are connected through different VPN servers deployed across different regions. The complex appliance stack required manual maintenance and lacked centralised visibility and control. Security patching was manual and error-prone and implementing consistent security policies was practically impossible, weakening Swissport’s security posture. What security inspection existed was relegated to unencrypted traffic due to the well-founded concern that inspecting encrypted traffic could break the application experience that in this case were airline partners’ systems. Finally, the lack of consistent, advanced threat detection worldwide limited Swissport’s ability to detect and stop threats. Visibility differentiates the Cato SASE cloud platform Thorp and the IT team had initially leaned away towards deploying that architecture Recognising these inefficiencies, Swissport’s legacy IT team initiated the Cato relationship, connecting many of the now 320+ sites and instances in AWS and Azure to the Cato SASE Cloud Platform. When Thorp and the new IT leadership joined Swissport, about two-thirds of the connections had been deployed. Having been familiar with a legacy cybersecurity provider, Thorp and the IT team had initially leaned away towards deploying that architecture. Hearing about the value of Cato they decided to have a closer look. “What really drew me to Cato is the visibility the platform provides. It’s incredibly easy to pinpoint connectivity issues, analyse traffic patterns, and secure our network from a single interface,” says Thorp. Cato uniquely stores the metadata of all enterprise traffic crossing the Cato SASE Cloud Platform — whether to the Internet or another location — from all endpoints — in the office and outside of it — in a single data store. This incredible resource provides Cato customers with deep, end-to-end insight into their complete network. Much improved security and a better network With a platform that is resilient, secure, and easy to manage, Swissport has been able to take a more proactive approach to security, streamline IT processes, and ensure a seamless digital experience for employees across the globe. Advanced threat prevention now operates globally and protects against malware and ransomware even in encrypted traffic. “Cato’s TLS Inspection gives us the ability to inspect encrypted traffic while avoiding unintended service disruptions,” says Ashton-Roberts. “It’s been a major improvement to our security posture.” Fine-grained access control through the always-on Cato Client connects remote users to Cato, granting access only to permitted resources. The Cato Client fully implements zero trust principles and operates outside and inside the office under one common policy set. “With Cato, every device—whether in a Swissport office or in an airport lounge—operates under the same set of security policies. That level of consistency wasn’t possible before,” says Ashton-Roberts. Deploying new network sites Cato not only delivers optimised network version worldwide but also makes deploying new networks Access is across the Cato Global Private Backbone built into the Cato SASE Cloud Platform, delivering an exceptional, secure user experience anywhere in the world. Cato not only delivers optimised network performance worldwide but also makes deploying new network sites effortless. “Connecting new airlines or contracts now takes just a few clicks,” says Thorp. Thorp’s team has also dramatically reduced network resolution times. “We recently identified and solved a performance issue in a South African location that would have taken us days before Cato,” says Thorp. “Within 15 minutes, our team identified excessive database traffic, blocked the device, and restored normal operations.” Transforming IT by transforming the infrastructure The transformative impact of the Cato SASE Cloud Platform on the IT team has been profound. Previously, managing multiple networking platforms required maintaining expertise in diverse technologies, creating an operational burden. The IT staff was constantly troubleshooting connectivity issues, manually configuring security appliances, and dealing with inconsistent policies across different locations. The shift to Cato not only simplified management but also allowed the IT team to focus on higher-value strategic initiatives. “Before Cato, we had to maintain different skill sets for different platforms, which spread the team thin. Now, we have one standardised system that allows us to be much more efficient,” Thorp says. Newfound network visibility Swissport has been able to optimise resource allocation and improve overall productivity By consolidating security and networking into a single platform, Swissport has been able to optimise resource allocation and improve overall productivity. The newfound network visibility has also brought a shift from reactive to a proactive IT strategy that has helped the company ensure consistent service delivery across its global operations. “For me, Cato future proofs Swissport’s IT infrastructure,” says Thorp. “The platform constantly evolves, adapts to new technologies, and provides the visibility and security we need to support our business today and tomorrow.” Partnership with Cato proved unique The success of Swissport’s IT transformation was built on more than just technology—it was about forming a strong, collaborative relationship with Cato Networks. From the start, Cato worked closely with Swissport to understand its unique challenges and deliver tailored solutions that addressed its global security and networking needs. “We worked directly with Cato’s product team to enhance capabilities—not just for us, but for all customers,” says Thorp. The success of Swissport’s IT transformation was built on more than just technology Features requested by Swissport were implemented on schedule, unlike other vendors who provided only lip service. Thorp says, “Many vendors say they listen, but Cato actually delivers on what they promise.” This close partnership has given Swissport confidence that its evolving needs will continue to be met as Cato refines its platform. “With Cato, we’re not just another customer; we’re part of a continuous innovation cycle that ensures our IT infrastructure remains future-ready,” says Thorp. “It’s rare to find a vendor so responsive and committed to delivering what they promise.” Looking ahead to the future Swissport IT requirements continue to evolve with Cato remaining a key pillar. “With Cato in place, we know that our network is not the limiting factor in our growth,” Thorp explains. The ongoing partnership between Swissport and Cato ensures that as technology continues to evolve, Swissport’s IT infrastructure remains secure, scalable, and adaptable to the demands of a fast-paced aviation industry. On a personal level, Cato has given Thorp peace of mind. “I relax a bit more with the Cato platform around. It’s given us a holistic way of protecting ourselves today and a secure foundation for everything we want to do in the future. Swissport’s IT leadership now can focus on innovation rather than crisis management.”
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to expand to major cities across the United States in the coming year. Adopter of new technology Francisco recognised the value that an integrated physical security system President & Founder Francisco Garcia started the company with a 15-year background in product design and mechanical engineering. An early adopter of new technology, Francisco recognised the value that an integrated physical security system could bring to the organisation, improving efficiency while going above and beyond in protecting cargo. "Once clients see our facilities, they are assured. We don't cut corners on cargo security.” The challenge Safety and security are critical for LYNX, which differentiates itself in the market with the real-time visibility it provides clients over their cargo. To meet industry requirements, the company must also provide accurate compliance documentation and assurance of timely deliveries. To maintain client satisfaction, the team proactively works to prevent and mitigate the risk of errors, defects, damages, and delays. “At one point, I considered implementing container recognition software that could read container IDs. Today, AI-powered search solves this problem.” Team proactively works to prevent and mitigate the risk of errors, defects, damages. Why Verkada? Verkada cameras, intercom, and air quality sensors are integrated behind the Command platform Verkada cameras, intercom, air quality sensors, alarms, and access control security solutions are seamlessly integrated behind the centralised Command platform, giving teams an all-in-one view of security operations – including cargo and containers. "The container ID numbers are the heartbeat of logistics. Everything moves in them, and there's often a need to review camera footage to pinpoint exactly when a container arrived and left the facility.” AI-powered search AI-powered search empowers LYNX to search for people and vehicles using freeform text within the Command platform. By typing in unique container IDs and vehicle information, teams can swiftly find and track a container's precise location and status. This reduces the risk of potential holding charges and administrative tasks, enabling the team to submit real-time data on the spot. “Using AI-powered search, we can quickly locate each container by its unique ID and know exactly where cargo is in the facility, as well as which employee unloaded each container, at which dock door, and for how long." AI-powered search empowers LYNX to search for people and vehicles. Efficient tracking and dispatch Instead of manually sifting through hours of footage, the dispatch team can retrieve the footage they need by typing in container IDs and vehicle descriptions. In the Command search bar, they can enter terms like "(container ID) red truck between April 15th and May 1st” and specify a camera or location to narrow the search even more. "Tracking down a container in our yard now takes a fraction of the time. Instead of scrolling through hours of footage, we can easily find the exact footage we need in seconds. We can filter results via the entrance camera and see when certain crates arrived based on their container ID.” Dispatch team can retrieve the footage they need by typing in container IDs. Real-time cargo monitoring Francisco can remotely check the camera feed from the Command web browser or mobile app Every corner of the facilities is closely monitored by hybrid cloud cameras that oversee cargo from its arrival to its final storage location. Through a web link, vendors can see the whereabouts of cargo as it’s unloaded, transported, and warehoused within facilities. At any point in time, Francisco can remotely check the camera feed from the Command web browser or mobile app. He has set up motion alerts for unusual after-hours activity, to which he can take action and even automate responses with professional monitoring. "We're proud to offer live monitoring to our customers, who can see as their cargo is unloaded and stored securely.” Proactive safety and risk mitigation AI-powered search helps verify that safety standards, protocols, and policies are maintained. By detecting and addressing issues quickly, the team swiftly takes action to prevent accidents and equipment damage, proactively upholding a safer work environment. “We can check for employees wearing safety vests while working, or certain forklifts only being used inside and not outside.” AI-powered search helps verify safety standards, protocols, and policies. Automating visitor management with driver check-in portal By U.S. Customs and TAPA certification standards, every driver must sign in upon entering the premises. Instead of relying on a pen-and-paper logbook, Francisco has turned Verkada Guest into a driver check-in portal. This digital record helps maintain compliance by facilitating the driver check-in process. “Now, drivers can check in through the Guest iPad, take a photo, and upload their licence. This process helps us comply with customs in a streamlined way.” Francisco has turned Verkada Guest into a driver check-in portal. Streamlined audits to support certifications Meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification Checks and check-ins extend to cargo as well. With AI-powered search, the team can search for specific items, such as medical device crates, to ensure items are properly labelled and container IDs are verified as they arrive and leave. This meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification standards. "We're dually ISO-certified, TAPA-certified, and U.S. Customs-certified. All organisations were thoroughly impressed with our video security. When we present this package to high-level customers, they're mind-blown.” Medical device and environmental monitoring A core value at LYNX is providing their clientele with customised solutions that exceed expectations. Air quality sensors help show that ISO certification standards are met for their medical device clients. LYNX goes above and beyond – tracking temperature, humidity, and carbon dioxide levels to maintain optimal conditions. "The integrity of the sensors is important to us. What a lot of people do is put a sensor in the coolest spot in the facility, then manipulate the data to show consistent results," Francisco explains. "But we track everything honestly and transparently. We show our vendors the functionality behind Verkada’s sensor technology: temperature, humidity, CO2, indoor air quality, and beyond.” A core value at LYNX is providing their clientele with customised solutions. Intrusion detection, response, and alerts Verkada’s professional monitoring service includes intrusion response from trained agents LYNX recently transitioned its legacy alarm system to Verkada to bring all physical security management under one umbrella. "It just makes sense logistically to have our team manage everything through one interface.” Wired alarm sensors protect facilities at every access point, with the ability to alert staff of incidents like Door Held/Forced Open (DHO/DFO) and tailgating. Beyond real-time intrusion detection, Verkada’s professional monitoring service includes intrusion response from trained agents who can take action immediately to potential threats. Visibility and control over doors LYNX has over 20 access-controlled doors, a requirement for certain certifications. By efficiently controlling access points and implementing real-time compliance checks, LYNX provides a protected environment for high-value cargo. "We can track every single door, along with every person who accesses or tries to access them.” LYNX provides a protected environment for high-value cargo. Gated entry with intercom Upon arrival, visitors of all types buzz into the building using the Verkada Intercom Upon arrival, visitors of all types buzz into the building using Verkada Intercom. Dedicated LYNX staff members can verify the visitor’s identity, answer the call, choose to grant them entry, and even unlock doors remotely with integrated access control. Entrance security is further enhanced with context cameras and real-time alerts for people or vehicles of interest. "It's not just about letting people in; it's about ensuring that everyone who enters our facility is verified and authorised. This technology offers peace of mind to both our team and our clients." Multi-layered perimeter security Beyond the buildings, parking lots and perimeters are protected with Licence Plate Recognition (LPR) technology, cameras, and alarms. The main entrance is followed by two buffer zones, each with its own gate, and includes Licence Plate Recognition (LPR) cameras that track vehicles entering the premises. "We have a main entrance and multiple gates – all controlled through Verkada. The cameras are strategically placed, so we could even deploy tailgate detection if needed.” Parking lots and perimeters are protected with LPR technology. Quality and client assurance Francisco shows them their guest log and footage of everywhere they have been in the facility Auditors sign in via Verkada Guest before walking through the facility. At the end of their visit, Francisco shows them their guest log and footage of everywhere they have been in the facility. Once clients see the facilities firsthand, their decision becomes clear. "I truly believe that all we have to do is get people in here. The facility does the rest.” AI-powered search capabilities further distinguish LYNX in the logistics industry, offering exceptional protection for high-value cargo. "Our AI-powered capabilities set us apart in the market. This technological edge is why clients trust us with high-value items like medical devices." Looking ahead Francisco’s passion for new technology brings innovation to the forefront, setting the company apart in the competitive logistics industry. He has even built a special mount, which can peer into containers and trailers while suspended from the loading dock. "We believe in investing in cutting-edge technology to provide the highest level of service and quality for our customers. I love to hear, ‘Nobody else is doing this.’ It means our clients are doing their homework and we're doing something right.” Francisco’s passion for new technology brings innovation to the forefront. Their proactive security measures have built trust with customers and struck a chord with prospects. So much so that expansion plans are underway to open new facilities in major cities across the United States. “We can continue to bring our security to the next level, from AI-powered search to future feature releases. We’re excited to try it all.”
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
The Swiss Federal Railways (SBB) is the largest rail and transport company in Switzerland with 1.2 million passengers and 180,000 tonnes of freight transported every day. SBB is a pioneering rail system in Europe due to its quality of service, safety, and reliability. It operates passenger, cargo, and freight services, with large real estate holdings across Switzerland that it needs to keep secure and protect from crime, anti-social behaviour, and trespassing. High-performance cameras SBB video team needed to replace an existing video surveillance system across its rail network The SBB video team needed to replace an existing video surveillance system across its rail network. Hanwha Vision cameras were chosen due to their high performance, intelligent analytics, and attractive pricing. Hanwha Vision cameras from its X and P series, including a vandal-resistant network dome camera, plus PTZ cameras and network boxes, have been installed and used continuously since 2021. Video analytics for greater awareness The cameras have a wide range of beneficial functions and analytics such as audio detection, automatic lens distortion correction and WDR (Wide Dynamic Range). If an event occurs, the dome cameras can switch to PTZ cameras. The cameras also feature tamper detection, fog detection and day and night functions. Cost optimisation in the project and in operation SBB is using dome and multi-directional cameras from the X and P series SBB is increasingly using dome and multi-directional cameras from the X and P series with the option of remote lens alignment. These help to optimise costs in the project and during operation, as the alignment and the lens can be adjusted and corrected remotely at any time, eliminating the need for on-site adjustment. Securing perimeters With intelligent video analytics, such as loitering detection and virtual line-crossing and area detection, carried out on the device, the cameras deliver accurate motion detection, allowing operators to quickly understand if there is unauthorised entry to any restricted areas. The integrated AI supports the differentiation between people and different vehicles, increasing the accuracy of the analysis and minimising false alarms. "We are very satisfied with the performance of the Hanwha Vision cameras. They help us to secure our stations and buildings, optimise processes in rail operations, improve public safety and ensure that our trains run on time,” said Chei Seung-Kyoo, responsible for Technology Video at SBB.
Richard Thorp has been fascinated with aviation since childhood. A self-described “aviation geek,” Thorp is now the Chief Technology Officer at Swissport International AG, where he leads IT infrastructure strategy for the world’s largest ground-handling company, ensuring seamless operations across 276 airports in 45 countries, handling approximately 247 million airline passengers per year, as of the end of 2024. “If we were an airline, we’d actually be the biggest airline in the world in terms of a number of passengers we support and handle,” he says. Security challenges Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel. “If the things we do get people to their destinations safely and on time, then magically, we become more successful and profitable as an organisation,” he says. But casting that spell had been challenging for Swissport. Three years ago, legacy IT leadership at Swissport had overcome network challenges with Cato, but more work was needed to address their security challenges, particularly in securing endpoints. Thorp and Swissport CISO, Giles Ashton-Roberts, joined Swissport in the middle of the Cato deployment. Having deep experience with a legacy zero trust provider, they were skeptical that Cato could meet Swissport’s requirements. Cato platform Over the next 10 months of meetings, investigation, and testing Thorp and Ashton-Roberts challenged Cato, ultimately changing their perspective. “IT is no longer seen as a blocker; it just works,” says Thorp. “I relax a bit more with the Cato platform around. It’s given us holistic way of protecting ourselves today, and a secure foundation for everything we want to do in the future.” The challenges of a global, always-on operation Swissport’s network helps millions of passengers, cargo shipments, and lounges worldwide Swissport’s network supports millions of passengers, cargo shipments, and lounges worldwide. Three years ago, scale was an enormous challenge—ensuring reliable connectivity for operations spanning locations and time zones. The company relied on a mix of MPLS and regional SD-WAN solutions across its now 320+ sites and airport locations. But bandwidth limitations and performance variability impacted many applications, including cloud-based, mission-critical applications. As a result of that complicated network, expanding to new locations was resource-intensive, requiring manual setup and multiple vendor dependencies. Differences between networking tools made troubleshooting inconsistent and time-consuming. The IT team in turn had to maintain expertise in multiple networking technologies, increasing operational overhead. What security inspection existed for unencrypted traffic Visibility was an enormous challenge. With multiple network platforms in place, Swissport’s IT team lacked a centralised view of network performance and security threats. “In the past, working with multiple systems meant inconsistency,” says Thorp. “Different platforms required different configurations, which complicated troubleshooting and made security enforcement a challenge.” Swissport relied on a patchwork of security appliances, including firewalls and web gateways. Remote users are connected through different VPN servers deployed across different regions. The complex appliance stack required manual maintenance and lacked centralised visibility and control. Security patching was manual and error-prone and implementing consistent security policies was practically impossible, weakening Swissport’s security posture. What security inspection existed was relegated to unencrypted traffic due to the well-founded concern that inspecting encrypted traffic could break the application experience that in this case were airline partners’ systems. Finally, the lack of consistent, advanced threat detection worldwide limited Swissport’s ability to detect and stop threats. Visibility differentiates the Cato SASE cloud platform Thorp and the IT team had initially leaned away towards deploying that architecture Recognising these inefficiencies, Swissport’s legacy IT team initiated the Cato relationship, connecting many of the now 320+ sites and instances in AWS and Azure to the Cato SASE Cloud Platform. When Thorp and the new IT leadership joined Swissport, about two-thirds of the connections had been deployed. Having been familiar with a legacy cybersecurity provider, Thorp and the IT team had initially leaned away towards deploying that architecture. Hearing about the value of Cato they decided to have a closer look. “What really drew me to Cato is the visibility the platform provides. It’s incredibly easy to pinpoint connectivity issues, analyse traffic patterns, and secure our network from a single interface,” says Thorp. Cato uniquely stores the metadata of all enterprise traffic crossing the Cato SASE Cloud Platform — whether to the Internet or another location — from all endpoints — in the office and outside of it — in a single data store. This incredible resource provides Cato customers with deep, end-to-end insight into their complete network. Much improved security and a better network With a platform that is resilient, secure, and easy to manage, Swissport has been able to take a more proactive approach to security, streamline IT processes, and ensure a seamless digital experience for employees across the globe. Advanced threat prevention now operates globally and protects against malware and ransomware even in encrypted traffic. “Cato’s TLS Inspection gives us the ability to inspect encrypted traffic while avoiding unintended service disruptions,” says Ashton-Roberts. “It’s been a major improvement to our security posture.” Fine-grained access control through the always-on Cato Client connects remote users to Cato, granting access only to permitted resources. The Cato Client fully implements zero trust principles and operates outside and inside the office under one common policy set. “With Cato, every device—whether in a Swissport office or in an airport lounge—operates under the same set of security policies. That level of consistency wasn’t possible before,” says Ashton-Roberts. Deploying new network sites Cato not only delivers optimised network version worldwide but also makes deploying new networks Access is across the Cato Global Private Backbone built into the Cato SASE Cloud Platform, delivering an exceptional, secure user experience anywhere in the world. Cato not only delivers optimised network performance worldwide but also makes deploying new network sites effortless. “Connecting new airlines or contracts now takes just a few clicks,” says Thorp. Thorp’s team has also dramatically reduced network resolution times. “We recently identified and solved a performance issue in a South African location that would have taken us days before Cato,” says Thorp. “Within 15 minutes, our team identified excessive database traffic, blocked the device, and restored normal operations.” Transforming IT by transforming the infrastructure The transformative impact of the Cato SASE Cloud Platform on the IT team has been profound. Previously, managing multiple networking platforms required maintaining expertise in diverse technologies, creating an operational burden. The IT staff was constantly troubleshooting connectivity issues, manually configuring security appliances, and dealing with inconsistent policies across different locations. The shift to Cato not only simplified management but also allowed the IT team to focus on higher-value strategic initiatives. “Before Cato, we had to maintain different skill sets for different platforms, which spread the team thin. Now, we have one standardised system that allows us to be much more efficient,” Thorp says. Newfound network visibility Swissport has been able to optimise resource allocation and improve overall productivity By consolidating security and networking into a single platform, Swissport has been able to optimise resource allocation and improve overall productivity. The newfound network visibility has also brought a shift from reactive to a proactive IT strategy that has helped the company ensure consistent service delivery across its global operations. “For me, Cato future proofs Swissport’s IT infrastructure,” says Thorp. “The platform constantly evolves, adapts to new technologies, and provides the visibility and security we need to support our business today and tomorrow.” Partnership with Cato proved unique The success of Swissport’s IT transformation was built on more than just technology—it was about forming a strong, collaborative relationship with Cato Networks. From the start, Cato worked closely with Swissport to understand its unique challenges and deliver tailored solutions that addressed its global security and networking needs. “We worked directly with Cato’s product team to enhance capabilities—not just for us, but for all customers,” says Thorp. The success of Swissport’s IT transformation was built on more than just technology Features requested by Swissport were implemented on schedule, unlike other vendors who provided only lip service. Thorp says, “Many vendors say they listen, but Cato actually delivers on what they promise.” This close partnership has given Swissport confidence that its evolving needs will continue to be met as Cato refines its platform. “With Cato, we’re not just another customer; we’re part of a continuous innovation cycle that ensures our IT infrastructure remains future-ready,” says Thorp. “It’s rare to find a vendor so responsive and committed to delivering what they promise.” Looking ahead to the future Swissport IT requirements continue to evolve with Cato remaining a key pillar. “With Cato in place, we know that our network is not the limiting factor in our growth,” Thorp explains. The ongoing partnership between Swissport and Cato ensures that as technology continues to evolve, Swissport’s IT infrastructure remains secure, scalable, and adaptable to the demands of a fast-paced aviation industry. On a personal level, Cato has given Thorp peace of mind. “I relax a bit more with the Cato platform around. It’s given us a holistic way of protecting ourselves today and a secure foundation for everything we want to do in the future. Swissport’s IT leadership now can focus on innovation rather than crisis management.”
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”


Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download