Cargo security
MacGregor has secured an order from Hapag-Lloyd for its fully automatic twistlocks (ACV-1) “Hippo”, designed to improve cargo handling efficiency. Twistlocks are used to secure containers on ships, ensuring stability and safety during transport. This order will support Hapag-Lloyd’s A19-series ships, which include six 19,900 TEU vessels: Al Nefud, Al Dahna Express, Barzan, Al Muraykh, Al Zubara, and Tihama. The order was booked in the first quarter of 2025. The first set of H...
Durite, a pioneer in vehicle safety, lighting and auto electrical parts, will be showcasing its new AI Low Bridge Detection System at this year’s RTX show in Stoneleigh, on 24th-26th June. The Durite Low Bridge Detection System utilises Smart AI-powered camera technology to detect and alert over-height vehicles to the presence of low bridges and also reads safety height signage. Durite’s range of vehicle safety The system is compatible with Durite’s range of vehicle safety c...
New research suggests that the global security screening market is anticipated to grow from USD 9.92 billion in 2025 to USD 13.80 billion in 2030, at a compound annual growth rate (CAGR) of 6.8%. Report authors, Marketsandmarkets, say that the accelerated expansion in this sector is primarily fuelled by an increase in global security threats, a surge in terrorism-related risks, and a growing need for enhanced public safety measures at key infrastructure points such as transportation hubs, gover...
In the old days, hopping onto the platform from a not-yet-stopped train was a commonplace stunt for daily commuters in a hurry. It was a thrilling, but dangerous part of railway travel. Today, rail travel is generally much safer, but thrill and fame seekers are finding new, creative ways to use the railway to court notoriety online. Earlier this month, a young man filmed himself laying on the tracks and allowing a train to pass over him. In another instance, two people were seen misusing...
Logistics companies face immense pressure to optimise their operations, enhance security, reduce losses, and become more cost-efficient. Advanced AI-powered video surveillance solutions provide essential support, including robust stock monitoring, access and perimeter control and proactive security - all while improving operational insights and automating tasks such as barcode scanning. Investing in tailored and innovative surveillance solutions has a tangible and lasting impact across th...
A new, specialist taskforce has been launched to significantly enhance the UK’s border security by strengthening police efforts to tackle organised immigration crime gangs operating within the country and facilitating people smuggling across the Channel. The Organised Immigration Crime Domestic Taskforce will be led by Deputy Chief Constable Wendy Gunney, National Lead for Serious Organised Crime at the National Police Chiefs’ Council (NPCC). The creation of this taskforce follows...
News
Detection Technology, a pioneer in X‑ray detector solutions, unveils X-Cargo—an advanced multirow detector family purpose-built to set a new benchmark in high-speed, high-energy X-ray imaging performance. Built on a novel detector technology, X-Cargo is tailored for cargo scanning and other demanding MeV-level applications, combining speed, resolution, and sustainability in a single modular platform. Modern cargo inspection X-Cargo also serves growing industrial applications like dense metal waste sorting X-Cargo meets the demanding needs of modern cargo inspection in critical security environments such as ports, border crossings, and customs checkpoints. It enables fast, non-intrusive scanning without manual inspections, ensuring efficient control over goods moving through high-risk infrastructures. Primarily used for truck and train cargo scanning, X-Cargo also serves growing industrial applications like dense metal waste sorting and advanced non-destructive testing (NDT) of assembled automotive parts and battery systems. X-Cargo photodiode configurations With support for scanning speeds up to 70 km/h in single-energy Linac systems and 36 km/h in dual-energy setups, X-Cargo offers unmatched performance in its class. This is made possible by its upgraded architecture featuring up to eight rows of photodiodes, a leap from the previous standard of one, significantly enhancing resolution and post-processing potential. This positions X-Cargo well above conventional solutions, which are limited to single- or double-row photodiode configurations and a maximum scanning speed of 8 km/h. Software-configurable flexibility and faster servicing The newly designed high-speed, optical 10 Gbps control board is another key innovation The newly designed high-speed, optical 10 Gbps control board is another key innovation, capable of managing up to 80 detectors with a single board. This opens the door to building larger system designs and multi-view configurations, crucial for high-throughput environments and more comprehensive inspections. This scalable, platform-based approach separates the sensor and data acquisition board, offering software-configurable flexibility and faster servicing—only necessary components need replacing, which reduces downtime and contributes to environmental sustainability. Detection Technology’s values Traditionally, hazardous materials such as cadmium have been used in high-energy detectors under certain exemptions. These are now being replaced with more sustainable alternatives. True to Detection Technology’s values, X-Cargo supports a responsible product lifecycle, reflecting the company's commitment to delivering high-performance, safe, and future-proof technologies. CT cargo system Traditionally, hazardous materials such as cadmium have been used in high-energy detectors “With this release, we aim to position ourselves as a market pioneer in cargo inspection. We have introduced to the market standard cargo detectors since 2005, and now are stregthening our position as a pioneer in the field,” stated Carlos Castillo, Product Manager at Detection Technology. “We participated in an EU project, MultiScan 3D, which developed a static CT cargo system using brand-new technology based on laser-driven X-ray sources." Detection Technology’s legacy of innovation Castillo added: "There was a market need to increase scanning speeds in conventional X-ray cargo systems. Thanks to our new matrix detector concept and control board, the system can now be built larger, making it easier to implement a multi-view setup.” The launch of X-Cargo reinforces Detection Technology’s legacy of innovation in X-ray detectors. It delivers a competitive edge to OEMs (original equipment manufacturers) in both the security and industrial sectors by enabling faster inspections, greater system flexibility, and superior image quality—all while supporting environmental and regulatory compliance.
Smiths Detection, a pioneer in threat detection and security screening technologies, and a business of Smiths Group plc, announces it is to supply SDX 6040 X-ray inspection systems to a number of major cruise lines. With thousands of people and large quantities of cargo coming onboard, screening systems are vital in helping detect weapons, explosives, drugs, and other prohibited items hidden in luggage or supplies. SDX 6040’s portable and flexible design SDX 6040’s portable and flexible design makes it the perfect solution for cruise line operators The SDX 6040 offers the best image quality on the market, with unmatched clarity in detection that enables operators to quickly screen bags, ensuring that boarding the ship is safe and seamless for passengers. The SDX 6040’s portable and flexible design makes it the perfect solution for cruise line operators seeking a mobile X-ray inspection system that delivers high protection and operational efficiency. Its compact footprint means it can be easily manoeuvred onboard and conveniently stored within the vessel. Complicated installations and concerns It can also fit through a standard door, eliminating the need for complicated installations and concerns about fitting into tight spaces. The system’s smart image display features, including organic stripping and enhancement modes, provide superior discrimination between organic and inorganic materials, critical for the precise detection of explosives, drugs, and other contraband -- while its high throughput capability ensures that large volumes of luggage can be screened quickly and efficiently, minimising delays and maintaining smooth operations. SDX 6040’s advanced detection system SDX 6040’s advanced detection system provides a full 100% view of every item, eliminating blind spots The SDX 6040’s advanced detection system provides a complete 100% view of every item, eliminating blind spots and significantly enhancing security. Additionally, the scanner integrates seamlessly with iCMORE AI technology, offering automated threat detection for a wide array of prohibited items, including currency, weapons, lithium batteries, and other hazardous goods. The system's algorithms can be updated as new threats emerge, ensuring it meets the evolving needs of the cruise industry. Levels of safety and assurance Matthias Springer, VP of Sales at Smiths Detection Inc., said of the sales: “At Smiths Detection, we serve customers in a wide range of market sectors, with a significant focus on cruise lines. The SDX 6040 is revolutionising maritime security, providing our customers with the highest levels of safety and assurance while maintaining efficient throughput of passengers." He adds, "With superior image quality, portability, and flexibility, it is an ideal solution for the dynamic environments of cruise ships."
Trusted Connectivity Alliance (TCA) has released Version 3.4 of its eUICC Profile Package: Interoperable Format Technical Specification (Interoperable Profile Package Specification). The latest version includes major updates to support full alignment with 3GPP Release 18 to enable advanced 5G functionality and secure authentication in 5G network slicing, as well as enabling the remote management of eSIM profiles on low-power and network-constrained devices. Interoperable connectivity profiles Mobile operators to load interoperable connectivity profiles in an eSIM Additional updates and clarifications to promote security and interoperability have also been made. TCA’s Interoperable Profile Package Specification – which is used in every eSIM deployed in the field – standardises the format used for the remote loading of subscriptions onto eSIMs across deployed devices. This enables mobile operators to load interoperable connectivity profiles in an eSIM, regardless of the SIM vendor. Key updates in Version 3.4 Full alignment with 3GPP Release 18 – this includes support of Slice SIM (SSIM), allowing operators to utilise the proven security capabilities of eUICC / eSIM to authenticate subscribers and enable secure access to 5G network slices. This will help to enhance the security of 5G networks and protect subscriber privacy. Support for GlobalPlatform’s standardised Secure Channel Protocol Amendment M– which enables remote application and file management on constrained IoT devices that could not previously be updated or patched due to the absence of SMS support. This addresses an immediate interoperability challenge by making it easier to remotely provision and manage eSIM profiles on constrained NarrowBand IoT (NB-IoT) devices. Benefits of eSIM technology TCA also estimates that the total available market for eSIM was 514 million units Denis Praca, Chair of the TCA eUICC Working Group, comments: “Since it was first published 10 years ago, TCA’s Interoperable Profile Package Specification has played a foundational role in promoting trust, consistency and reliability across the eSIM ecosystem." "These latest enhancements stand to further extend the capabilities and benefits of eSIM technology, bringing seamless connectivity and advanced security to new and established use-cases.” Latest TCA eSIM market data The publication of the new specification follows the release of the latest TCA eSIM market data, which revealed that 2024 was a landmark year of growth across the eSIM ecosystem. eSIM shipment volumes collectively reported by TCA members in 2024 surpassed half a billion units, increasing 35% year-on-year to reach 503 million. TCA also estimates that the total available market for eSIM was 514 million units. The growing availability of eSIM-enabled devices was matched by increasing consumer adoption, with consumer eSIM profile downloads rising by 56%. Enhancement of eSIM technology TCA published Version 3.3.1.2 of eUICC Profile Package: Interoperable Format Test Specification Bertrand Moussel, Chair of the TCA Board, adds: “As the eSIM ecosystem continues to expand, TCA is committed to shaping the continued standardisation and enhancement of eSIM technology in close collaboration with pioneering industry stakeholders.” TCA has also published Version 3.3.1.2 of eUICC Profile Package: Interoperable Format Test Specification, which provides a globally standardised means of testing products to ensure the eSIM profile is correctly loaded. GSMA’s eSIM Test Specifications Version 3.3.1.2 is a GlobalPlatform-approved test suite, which is part of the GSMA Consumer and IoT eSIM compliance programmes and referenced in GSMA’s eSIM Test Specifications (SGP.23 and SGP.33) – the dedicated, globally-backed remote SIM test specifications for Consumer and IoT. Work is currently ongoing in TCA to develop the test specification for Interoperable Profile Package Technical Specification v3.4.
Sabio Group announced the expansion of its acclaimed ‘Disrupt’ programme across Europe for 2025, taking its digital customer experience (CX) transformation event to three major European cities. The expansion of its flagship event comes at a critical time for the CX industry, with artificial intelligence rapidly evolving, cost of living pressures continuing, and volatile energy prices creating significant challenges for contact centres and frontline customer service staff. Expanding disrupt across Europe Sabio is now extending Disrupt’s reach, and will host events across three major European capitalsSince launching in 2017, Disrupt has become the must-attend event for CX innovators, consistently attracting around 1000 decision-makers to its annual London event and its sister event in Madrid. This year, Sabio is now extending Disrupt’s reach, and will host events across three major European capitals as the need for CX expert services has never been higher on the continent, adding Paris to its locations. The wider 2025 programme, themed 'Delivering on the Promise', will showcase how global brands are leveraging cutting-edge AI, automation, and data solutions through real-world case studies and live demonstrations. Transforming the CX Landscape “Today's CX professionals are navigating the most profound technological shift we've seen in decades, while simultaneously managing heightened customer expectations and economic pressures,” said Stuart Dorman, Chief Innovation Officer at Sabio Group. “There has never been a greater need for expert services in CX technology than there has today and Disrupt creates an essential forum where industry leaders can exchange practical strategies and witness transformative solutions first-hand. From real-time translation technology to emotional wellbeing programmes for frontline staff, we're showcasing innovations that deliver immediate impact.” Innovation takes center stage Sabio’s Disrupt 2025 programme launches in Madrid, Abanca, Renfe and Securitas Sabio’s Disrupt 2025 programme launches in Madrid on April 3rd featuring industry pioneers including Abanca, Renfe and Securitas Direct sharing their transformation journeys. The flagship UK event follows at London's Tobacco Dock on May 20th, before Disrupt makes its French debut in Paris on June 3rd. Sabio is also looking at extending its programme even further with more European locations currently being assessed. AI-powered CX evolution Daniel Seaborne, Managing Director for UK & South Africa at Sabio Group said, “Our London event has set the benchmark for CX excellence since 2017. For 2025, we're bringing together our strongest speaker lineup yet, showcasing organisations that are redefining customer service through strategic AI implementation and innovative agent support systems.” Gabriel Rodriguez, Managing Director for Sabio Spain, added: “Spanish enterprises are embracing digital transformation at remarkable speed. Our Madrid event will demonstrate how leading Spanish brands are balancing technological innovation with the human touch that remains fundamental to meaningful customer relationships.” Highlighting Paris debut Hervé Racine, Managing Director for Sabio France, Italy and Morocco, stated: “The French market has distinctive customer experience expectations, particularly around personalisation and service efficiency. Our Paris event will address regional and global CX challenges while connecting French CX leaders with global innovations that are setting new benchmarks of excellence.” Explore CX solutions together Attendees at all of Sabio’s Disrupt events can expect exclusive insights into how major brands are tackling today's most pressing CX challenges through a combination of keynotes, interactive workshops, live demonstrations and strategic networking opportunities.
iDenfy, a Lithuania-based RegTech solution provider best known for its fraud prevention tools, announced a new milestone established by recognition from G2. A pioneer B2B review platform, which has named iDenfy as one of the Best Software Products of 2025. This marks iDenfy’s debut on the top 100 list, with the company securing 44th place in the Financial Services Products category and 48th place in the Data Privacy Products section. Trusted security solutions G2’s rankings are based on a combination of user reviews and market presenceG2’s rankings are based on a combination of user reviews and market presence, making them a reliable indicator of a company’s credibility and impact. Besides positioning rewards, iDenfy has also earned multiple High Performer badges for Europe and the EMEA region, along with rewards as the Best Support for Small Businesses in Europe. These accomplishments highlight iDenfy’s commitment to delivering innovative, secure, and customer-centric solutions in the rapidly evolving regulation and technology industry. iDenfy earns G2 recognition iDenfy’s identity verification and fraud prevention products featured in G2’s Leader badge are recognised for their high user satisfaction and strong adoption rates, while the Highest Quality of Support badge underscores iDenfy’s dedication to helping businesses navigate complex challenges in fraud prevention, compliance, and identity verification. At first, when iDenfy joined the G2 platform a few years back, it quickly gained popularity in the ID verification on solution category, however, due to positive reviews regarding its other solutions, including Anti-Money Laundering (AML) screening, iDenfy’s team has proved to listen to what its partner and users want, which is to consistently improve its end-to-end RegTech product hub. Corporate compliance standards “We’re quickly adapting to new regulatory requirements and, naturally, more complex fraudulent schemes that bad actors might use. Our software now combats more deepfakes than ever, which, due to the mainstream use of AI, are getting harder to spot with the naked eye,” explained Domantas Ciulde, the CEO of iDenfy. “Additionally, we want our solution to be fully customisable, which means providing the needed building blocks for all compliance needs, not just standard user verification.” In the near future, iDenfy’s team is working on improving its Know Your Business (KYB) platform, which is designed to help companies optimise business verifications. Different from iDenfy’s other older AI-powered solutions, such as ID verification for individuals and AML screening, KYB verification hasn’t won the top software badge in G2 yet. Compliance Tools for Businesses According to Viktor Vostrikov, iDenfy’s CMO, this will most likely change in the next year, as both regulations and the market are dictating stricter requirements for corporate compliance, which is more complex and riskier if done incorrectly. “We’re improving our KYB software to match different regulatory requirements. For example, our team just added a new built-in tool for EIN verification in the KYB dashboard, perfect for US-based clients that need to review the entity’s EIN status and save time since they don’t need any additional tools or third-party providers for this sort of check,” added Viktor Vostrikov, the CMO of iDenfy. Smart fraud solutions iDenfy was founded in 2017 with a vision to combat the rising issues of online fraudiDenfy was founded in 2017 with a vision to combat the rising issues of online fraud. The founder recognised the need for a robust, technology-driven solution to address the growing challenges of identity theft, financial fraud, and regulatory compliance. Today, iDenfy has grown into a global RegTech powerhouse, offering an end-to-end fraud prevention ecosystem that combines AI and ML advancements, such as liveness detection or biometrics, combining all technologies with an extra layer of security and accuracy, which can be amplified with the help of its in-house KYC team. Global identity verification solutions The company’s solutions are trusted by businesses of all sizes, from startups to large enterprises, across industries such as fintech, e-commerce, healthcare, blockchain, and many more. iDenfy’s identity verification suite supports over 3000 types of identity documents across 200+ countries and territories, together with the real-time fraud detection tools that help to identify and mitigate risks instantly while helping businesses meet KYC, AML, and KYB regulations and security standards. Empowering a safer future At the heart of iDenfy’s success is a team of 50+ passionate professionals who are united by a shared mission: to build a safer digital future. “Our team is our greatest asset. Their dedication and expertise have been instrumental in our journey to becoming a trusted name in RegTech. As we continue to grow, we remain committed to empowering businesses with the tools they need to stay ahead of evolving threats," added Domantas Ciulde.
The much-anticipated Inter Airport Southeast Asia (IASEA) 2025 has officially opened now at Marina Bay Sands, Singapore, bringing together key airport industry stakeholders, global solution providers, and pioneering experts to shape the future of airport operations and passenger experience. Themed “Airport Operations for Tomorrow,” conversations surrounding these topics are especially crucial as the aviation industry is witnessing rapid transformation and projected global passenger traffic to reach 19.5 billion by 2042. Day 1 morning highlights: Keynotes and insights The opening day of IASEA 2025 set an exciting tone with thought-provoking discussions and visionary insights from industry pioneers. IASEA 2025 set an exciting tone with thought-provoking discussions and visionary insights The fireside chat on 'Reshaping Global Airport Operations,' led by Patrick Ky, CEO, International Centre for Aviation Innovation (ICAI) and moderated by Glory Wee, Senior Director, Aviation Development Group, Civil Aviation Authority Singapore (CAAS), discussed the fundamental shift they anticipate airport operations will face and how airports must evolve to balance the imperatives of efficiency, resilience, and sustainability. When asked to share one game-changing technology that will redefine the industry, Patrick Ky shared that “innovation that drives data sharing will be key,” but that would require many regulatory aspects and willingness from airports to share with each other. This would take time, but it is key to building a stronger future. Technological integrations and growth strategies “It is clear from our discussion that in order to reshape airport operations, it is not just about technological advancements but also about setting standards, data integrity, collaborations, and sharing best practices. Above all, the industry needs to work towards building trust with partners and eco-system players,” said Glory Wee, Senior Director, Aviation Development Group, Civil Aviation Authority Singapore (CAAS). At the show, pioneering airports, including Narita International Airport Corporation and Airports Corporation of Vietnam (ACV), presented case studies highlighting their technological integrations, regional growth strategies, and efforts to meet rising demand while enhancing passenger experience. New Narita Airport expansion project for the 2030 Vietnam’s aviation sector is sharing rapid growth, with domestic travel projected to increase by over 20% Shinichiro Motomiya, General Manager, Narita International Airport Corporation, presented the ‘New Narita Airport’ expansion project for the 2030s, which includes extending an existing runway, constructing a new runway, improving connectivity into the city, building a new cargo area, and consolidating this into a single terminal to accommodate the expected increase of passenger capacity from 57 to 75 million and cargo capacity from 2.4 to 3.5 million tons at Narita International Airport. Separately, Vietnam’s aviation sector is experiencing rapid growth, with domestic travel projected to increase by over 20% from 2023 to 2027. To meet this soaring demand, Nguyen Dang Minh, Director of Airport Operations Department, Airports Corporation of Vietnam (ACV), shared ACV’s master plan to develop a robust and resilient airport network by 2050. Total investment for extensive development By 2030, ACV will equip 30 airports across the country with a combined capacity to handle 275.9 million passengers and 4.1 million tons of cargo annually. By 2050, the network will expand to 33 airports (14 international and 19 domestic), ensuring that 97% of the population has access to an airport within 100 kilometres. The total investment for this extensive development is estimated to reach 420,000 billion VND. Three phases of transformation At the heart of this transformation is the Long Thanh International Airport project, positioned as a key national aviation hub and one of the most ambitious infrastructure projects in the region. The project is divided into three phases: Phase 1 (2025): Complete Terminal 1 with two runways and a cargo terminal, which will have the capacity to handle 25 million passengers. Phase 2 (2025-2030): Construction of Terminal 2, which will increase the airport’s capacity to 50 million passengers. Phase 3 (2035-2040): Two additional runways (T3 and T4 Terminals), reaching a total capacity of 100 million passengers. This year’s IASEA 2025 welcomes a delegation of pioneers from major international airports in Vietnam, including Long Thanh International Airport—one of the world's most expensive greenfield airport projects—Noi Bai Airport, Danang Airport, Cat Bi Airport, Phu Quoc Airport, and Cam Ranh International Terminal. Growth of airport networks in Southeast Asia Mr. Nguyen Cao Cuong, Deputy General Director, Airports Corporation of Vietnam (ACV), shared during his opening remarks, “Under the direction of the Prime Minister of Vietnam, ACV's delegation at this expo is actively seeking high-quality, potential partners in technology, equipment, and airport operations to collaborate in accelerating the completion of Long Thanh, ensuring it meets the highest international standards." "This show is not only a valuable opportunity for ACV to explore cutting-edge technologies and advanced management models but also a chance for all of us to discuss strategies for the collective growth of airport networks in Southeast Asia." What to look out for in IASEA 2025? Over the course of three days, groundbreaking discussions and innovations are taking centre stage, redefining efficiency, sustainability, and automation in ground handling and airport logistics. CW Aero Services aims to make a meaningful impact on the ground support kit landscape in the region Now marks a significant milestone for CW Aero Services as the company announces the signing of a Memorandum of Understanding (MOU) with Goldhofer AG to become a Hub for Goldhofer GSE product lines in the Asia Pacific region. As part of this strategic partnership, CW Aero Services will not only promote Goldhofer GSE products within Singapore, Malaysia, Brunei, and the Philippines but also provide comprehensive support services. This includes the commissioning of new GSE deliveries, repair and maintenance work, and the supply of spare parts, ensuring seamless and efficient operations for customers in the region. This collaboration represents more than just a contractual agreement—it is a commitment by CW Aero Services to drive the growth and adoption of Goldhofer products and services across the Asia Pacific. By leveraging its expertise and regional presence, CW Aero Services aims to make a meaningful impact on the ground support equipment landscape in the region. Next-generation solutions to optimise airport operations Industry pioneers are unveiling next-generation solutions designed to optimise airport operations, enhance energy efficiency, and streamline airside activities. One of the most highly anticipated product debuts comes from FastCharge GSE. The company launched the Enatel eGSE Charger – a cutting-edge charging solution designed specifically for electric ground support equipment (eGSE) – earlier this month, which was one of the first few times the product was showcased to the public. With a world-leading 97.6% efficiency, the charger minimises energy waste, optimises charging times, and reduces vehicle downtime, setting a new benchmark in airport electrification. Asia market at IASEA 2025 Oshkosh AeroTech has introduced two cutting-edge electric ground support vehicles to the Asia market Meanwhile, Oshkosh AeroTech has introduced two cutting-edge electric ground support vehicles to the Asia market at IASEA 2025 – the LEKTRO 88i electric aircraft tug and the B80 electric pushback tractor – that are designed to enhance airport efficiency, sustainability, safety, and reduce operational costs. The B80 pushback tractor, specifically, was built for heavy-duty operations, delivering high torque, all-wheel drive, and advanced energy management for efficient pushbacks of both narrow-body and wide-body aircraft. Future of airport operations across Asia As the event unfolds, industry professionals can expect more exclusive product showcases, expert-led conference sessions, and networking opportunities that shape the future of airport operations across Asia. All trade professionals attending Inter Airport Southeast Asia 2025 will be granted free access to the exhibition and conference floors.


Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse future trends. Or you could try statistical or economic modelling. Or you could develop multiple scenarios based on various assumptions to explore potential outcomes. Or you could just check your email. At this time of year, my email is full of industry folks looking to predict what the future holds in 2025. Ranging from artificial intelligence (AI) to privacy, the retail market to drones, here is a sampling of forecasts for 2025 provided by various players in the security market, courtesy of my email messages. What’s Ahead for AI? From Faisal Pandit, VP & GM, Global Security Products, Johnson Controls (JCI): “The future of security operations includes customisable, scalable solutions where users can control if, when, and how they use AI to improve efficiency depending on the size and function of their organisation.” Says Kevin Woodworth, Vice President, Global Product Management, Intrusion, JCI: “Next year will see a growing focus from product developers on designing systems that streamline setup and configuration through increased AI integration. This reflects a broader trend of leveraging AI to simplify use and enhance adaptability as solutions evolve, rather simply employing it because it’s popular.” From Peter Evans, CEO of Xtract One Technologies: “AI algorithms will significantly advance in distinguishing between harmless, everyday items and potential threats. With this, we will see false alerts become even more rare.” Says JP Castellanos, Director of Threat Intelligence, Binary Defense: “Machine learning (ML)-powered anomaly detection will move beyond proof-of-concept to become mission-critical, enabling teams to uncover unknown threats and behavioural anomalies in real time – well before they escalate.” Evans of Xtract: “As AI becomes more advanced in threat detection, it will lead to more sophisticated protection of individual privacy. We can expect to see more AI techniques utilised for threat identification that do not capture personal data and are privacy-first.” Predictions on interoperability and compliance Woodworth of JCI: “New products added to singular systems must be interoperable. In 2025, organisations will need to embrace interoperability. AI will progress past reactive measures to achieve predictive capabilities.” Pandit of JCI: “With organisations increasing their focus on the regulatory environment, there will be an uptick in specialised certification programs to meet these needs. New security roles will emerge that will be focused on tracking and applying relevant regulatory changes.” Expanding capabilities for video cameras Woodworth of JCI: “Beyond capturing images, cameras will be able to detect potential threats and also mitigate them instantly, issuing vocal warnings, controlling access, or escalating issues without human intervention.” Looking ahead to retail developments Hansel Oh, Director of Product Marketing at Brivo: “Centralized, cloud-based security platforms will enhance credential management and monitor logistical operations to enable retailers to battle cargo theft.” Stephen Burd, Vice President, Essence Security: “With an increase in police response times, sophisticated crime, and smash and grabs, 2025 will see a huge demand for security solutions that go beyond simply notifying the police and will look to actively intervene and prevent damage or loss from occurring.” The role of drones and training Mary-Lou Smulders, CMO, Dedrone by Axon: “Drones will transition from being viewed as supplementary tools to becoming essential components of public safety operations. As departments recognise their effectiveness in various scenarios, the perception of drones will shift, and they will be integrated into core operational frameworks alongside traditional assets like patrol cars while replacing helicopters as a cost-effective and versatile alternative.” Erik Hohengasser, Electrical Technical Lead at NFPA: “As the skilled trades evolve, there will be an increasing demand for specialised and technical training. Predictive analytics, virtual simulations and hands-on experiential learning will become especially valuable due to allowing employees to gain real-world expertise in safe and controlled environments.”
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organisations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organisation, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organisation’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organisations to check whether drivers are licenced and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organisation is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organisation. This includes fraud, bankruptcy, poor business practices, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licencing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilising software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Case studies
Richard Thorp has been fascinated with aviation since childhood. A self-described “aviation geek,” Thorp is now the Chief Technology Officer at Swissport International AG, where he leads IT infrastructure strategy for the world’s largest ground-handling company, ensuring seamless operations across 276 airports in 45 countries, handling approximately 247 million airline passengers per year, as of the end of 2024. “If we were an airline, we’d actually be the biggest airline in the world in terms of a number of passengers we support and handle,” he says. Security challenges Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel. “If the things we do get people to their destinations safely and on time, then magically, we become more successful and profitable as an organisation,” he says. But casting that spell had been challenging for Swissport. Three years ago, legacy IT leadership at Swissport had overcome network challenges with Cato, but more work was needed to address their security challenges, particularly in securing endpoints. Thorp and Swissport CISO, Giles Ashton-Roberts, joined Swissport in the middle of the Cato deployment. Having deep experience with a legacy zero trust provider, they were skeptical that Cato could meet Swissport’s requirements. Cato platform Over the next 10 months of meetings, investigation, and testing Thorp and Ashton-Roberts challenged Cato, ultimately changing their perspective. “IT is no longer seen as a blocker; it just works,” says Thorp. “I relax a bit more with the Cato platform around. It’s given us holistic way of protecting ourselves today, and a secure foundation for everything we want to do in the future.” The challenges of a global, always-on operation Swissport’s network helps millions of passengers, cargo shipments, and lounges worldwide Swissport’s network supports millions of passengers, cargo shipments, and lounges worldwide. Three years ago, scale was an enormous challenge—ensuring reliable connectivity for operations spanning locations and time zones. The company relied on a mix of MPLS and regional SD-WAN solutions across its now 320+ sites and airport locations. But bandwidth limitations and performance variability impacted many applications, including cloud-based, mission-critical applications. As a result of that complicated network, expanding to new locations was resource-intensive, requiring manual setup and multiple vendor dependencies. Differences between networking tools made troubleshooting inconsistent and time-consuming. The IT team in turn had to maintain expertise in multiple networking technologies, increasing operational overhead. What security inspection existed for unencrypted traffic Visibility was an enormous challenge. With multiple network platforms in place, Swissport’s IT team lacked a centralised view of network performance and security threats. “In the past, working with multiple systems meant inconsistency,” says Thorp. “Different platforms required different configurations, which complicated troubleshooting and made security enforcement a challenge.” Swissport relied on a patchwork of security appliances, including firewalls and web gateways. Remote users are connected through different VPN servers deployed across different regions. The complex appliance stack required manual maintenance and lacked centralised visibility and control. Security patching was manual and error-prone and implementing consistent security policies was practically impossible, weakening Swissport’s security posture. What security inspection existed was relegated to unencrypted traffic due to the well-founded concern that inspecting encrypted traffic could break the application experience that in this case were airline partners’ systems. Finally, the lack of consistent, advanced threat detection worldwide limited Swissport’s ability to detect and stop threats. Visibility differentiates the Cato SASE cloud platform Thorp and the IT team had initially leaned away towards deploying that architecture Recognising these inefficiencies, Swissport’s legacy IT team initiated the Cato relationship, connecting many of the now 320+ sites and instances in AWS and Azure to the Cato SASE Cloud Platform. When Thorp and the new IT leadership joined Swissport, about two-thirds of the connections had been deployed. Having been familiar with a legacy cybersecurity provider, Thorp and the IT team had initially leaned away towards deploying that architecture. Hearing about the value of Cato they decided to have a closer look. “What really drew me to Cato is the visibility the platform provides. It’s incredibly easy to pinpoint connectivity issues, analyse traffic patterns, and secure our network from a single interface,” says Thorp. Cato uniquely stores the metadata of all enterprise traffic crossing the Cato SASE Cloud Platform — whether to the Internet or another location — from all endpoints — in the office and outside of it — in a single data store. This incredible resource provides Cato customers with deep, end-to-end insight into their complete network. Much improved security and a better network With a platform that is resilient, secure, and easy to manage, Swissport has been able to take a more proactive approach to security, streamline IT processes, and ensure a seamless digital experience for employees across the globe. Advanced threat prevention now operates globally and protects against malware and ransomware even in encrypted traffic. “Cato’s TLS Inspection gives us the ability to inspect encrypted traffic while avoiding unintended service disruptions,” says Ashton-Roberts. “It’s been a major improvement to our security posture.” Fine-grained access control through the always-on Cato Client connects remote users to Cato, granting access only to permitted resources. The Cato Client fully implements zero trust principles and operates outside and inside the office under one common policy set. “With Cato, every device—whether in a Swissport office or in an airport lounge—operates under the same set of security policies. That level of consistency wasn’t possible before,” says Ashton-Roberts. Deploying new network sites Cato not only delivers optimised network version worldwide but also makes deploying new networks Access is across the Cato Global Private Backbone built into the Cato SASE Cloud Platform, delivering an exceptional, secure user experience anywhere in the world. Cato not only delivers optimised network performance worldwide but also makes deploying new network sites effortless. “Connecting new airlines or contracts now takes just a few clicks,” says Thorp. Thorp’s team has also dramatically reduced network resolution times. “We recently identified and solved a performance issue in a South African location that would have taken us days before Cato,” says Thorp. “Within 15 minutes, our team identified excessive database traffic, blocked the device, and restored normal operations.” Transforming IT by transforming the infrastructure The transformative impact of the Cato SASE Cloud Platform on the IT team has been profound. Previously, managing multiple networking platforms required maintaining expertise in diverse technologies, creating an operational burden. The IT staff was constantly troubleshooting connectivity issues, manually configuring security appliances, and dealing with inconsistent policies across different locations. The shift to Cato not only simplified management but also allowed the IT team to focus on higher-value strategic initiatives. “Before Cato, we had to maintain different skill sets for different platforms, which spread the team thin. Now, we have one standardised system that allows us to be much more efficient,” Thorp says. Newfound network visibility Swissport has been able to optimise resource allocation and improve overall productivity By consolidating security and networking into a single platform, Swissport has been able to optimise resource allocation and improve overall productivity. The newfound network visibility has also brought a shift from reactive to a proactive IT strategy that has helped the company ensure consistent service delivery across its global operations. “For me, Cato future proofs Swissport’s IT infrastructure,” says Thorp. “The platform constantly evolves, adapts to new technologies, and provides the visibility and security we need to support our business today and tomorrow.” Partnership with Cato proved unique The success of Swissport’s IT transformation was built on more than just technology—it was about forming a strong, collaborative relationship with Cato Networks. From the start, Cato worked closely with Swissport to understand its unique challenges and deliver tailored solutions that addressed its global security and networking needs. “We worked directly with Cato’s product team to enhance capabilities—not just for us, but for all customers,” says Thorp. The success of Swissport’s IT transformation was built on more than just technology Features requested by Swissport were implemented on schedule, unlike other vendors who provided only lip service. Thorp says, “Many vendors say they listen, but Cato actually delivers on what they promise.” This close partnership has given Swissport confidence that its evolving needs will continue to be met as Cato refines its platform. “With Cato, we’re not just another customer; we’re part of a continuous innovation cycle that ensures our IT infrastructure remains future-ready,” says Thorp. “It’s rare to find a vendor so responsive and committed to delivering what they promise.” Looking ahead to the future Swissport IT requirements continue to evolve with Cato remaining a key pillar. “With Cato in place, we know that our network is not the limiting factor in our growth,” Thorp explains. The ongoing partnership between Swissport and Cato ensures that as technology continues to evolve, Swissport’s IT infrastructure remains secure, scalable, and adaptable to the demands of a fast-paced aviation industry. On a personal level, Cato has given Thorp peace of mind. “I relax a bit more with the Cato platform around. It’s given us a holistic way of protecting ourselves today and a secure foundation for everything we want to do in the future. Swissport’s IT leadership now can focus on innovation rather than crisis management.”
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to expand to major cities across the United States in the coming year. Adopter of new technology Francisco recognised the value that an integrated physical security system President & Founder Francisco Garcia started the company with a 15-year background in product design and mechanical engineering. An early adopter of new technology, Francisco recognised the value that an integrated physical security system could bring to the organisation, improving efficiency while going above and beyond in protecting cargo. "Once clients see our facilities, they are assured. We don't cut corners on cargo security.” The challenge Safety and security are critical for LYNX, which differentiates itself in the market with the real-time visibility it provides clients over their cargo. To meet industry requirements, the company must also provide accurate compliance documentation and assurance of timely deliveries. To maintain client satisfaction, the team proactively works to prevent and mitigate the risk of errors, defects, damages, and delays. “At one point, I considered implementing container recognition software that could read container IDs. Today, AI-powered search solves this problem.” Team proactively works to prevent and mitigate the risk of errors, defects, damages. Why Verkada? Verkada cameras, intercom, and air quality sensors are integrated behind the Command platform Verkada cameras, intercom, air quality sensors, alarms, and access control security solutions are seamlessly integrated behind the centralised Command platform, giving teams an all-in-one view of security operations – including cargo and containers. "The container ID numbers are the heartbeat of logistics. Everything moves in them, and there's often a need to review camera footage to pinpoint exactly when a container arrived and left the facility.” AI-powered search AI-powered search empowers LYNX to search for people and vehicles using freeform text within the Command platform. By typing in unique container IDs and vehicle information, teams can swiftly find and track a container's precise location and status. This reduces the risk of potential holding charges and administrative tasks, enabling the team to submit real-time data on the spot. “Using AI-powered search, we can quickly locate each container by its unique ID and know exactly where cargo is in the facility, as well as which employee unloaded each container, at which dock door, and for how long." AI-powered search empowers LYNX to search for people and vehicles. Efficient tracking and dispatch Instead of manually sifting through hours of footage, the dispatch team can retrieve the footage they need by typing in container IDs and vehicle descriptions. In the Command search bar, they can enter terms like "(container ID) red truck between April 15th and May 1st” and specify a camera or location to narrow the search even more. "Tracking down a container in our yard now takes a fraction of the time. Instead of scrolling through hours of footage, we can easily find the exact footage we need in seconds. We can filter results via the entrance camera and see when certain crates arrived based on their container ID.” Dispatch team can retrieve the footage they need by typing in container IDs. Real-time cargo monitoring Francisco can remotely check the camera feed from the Command web browser or mobile app Every corner of the facilities is closely monitored by hybrid cloud cameras that oversee cargo from its arrival to its final storage location. Through a web link, vendors can see the whereabouts of cargo as it’s unloaded, transported, and warehoused within facilities. At any point in time, Francisco can remotely check the camera feed from the Command web browser or mobile app. He has set up motion alerts for unusual after-hours activity, to which he can take action and even automate responses with professional monitoring. "We're proud to offer live monitoring to our customers, who can see as their cargo is unloaded and stored securely.” Proactive safety and risk mitigation AI-powered search helps verify that safety standards, protocols, and policies are maintained. By detecting and addressing issues quickly, the team swiftly takes action to prevent accidents and equipment damage, proactively upholding a safer work environment. “We can check for employees wearing safety vests while working, or certain forklifts only being used inside and not outside.” AI-powered search helps verify safety standards, protocols, and policies. Automating visitor management with driver check-in portal By U.S. Customs and TAPA certification standards, every driver must sign in upon entering the premises. Instead of relying on a pen-and-paper logbook, Francisco has turned Verkada Guest into a driver check-in portal. This digital record helps maintain compliance by facilitating the driver check-in process. “Now, drivers can check in through the Guest iPad, take a photo, and upload their licence. This process helps us comply with customs in a streamlined way.” Francisco has turned Verkada Guest into a driver check-in portal. Streamlined audits to support certifications Meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification Checks and check-ins extend to cargo as well. With AI-powered search, the team can search for specific items, such as medical device crates, to ensure items are properly labelled and container IDs are verified as they arrive and leave. This meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification standards. "We're dually ISO-certified, TAPA-certified, and U.S. Customs-certified. All organisations were thoroughly impressed with our video security. When we present this package to high-level customers, they're mind-blown.” Medical device and environmental monitoring A core value at LYNX is providing their clientele with customised solutions that exceed expectations. Air quality sensors help show that ISO certification standards are met for their medical device clients. LYNX goes above and beyond – tracking temperature, humidity, and carbon dioxide levels to maintain optimal conditions. "The integrity of the sensors is important to us. What a lot of people do is put a sensor in the coolest spot in the facility, then manipulate the data to show consistent results," Francisco explains. "But we track everything honestly and transparently. We show our vendors the functionality behind Verkada’s sensor technology: temperature, humidity, CO2, indoor air quality, and beyond.” A core value at LYNX is providing their clientele with customised solutions. Intrusion detection, response, and alerts Verkada’s professional monitoring service includes intrusion response from trained agents LYNX recently transitioned its legacy alarm system to Verkada to bring all physical security management under one umbrella. "It just makes sense logistically to have our team manage everything through one interface.” Wired alarm sensors protect facilities at every access point, with the ability to alert staff of incidents like Door Held/Forced Open (DHO/DFO) and tailgating. Beyond real-time intrusion detection, Verkada’s professional monitoring service includes intrusion response from trained agents who can take action immediately to potential threats. Visibility and control over doors LYNX has over 20 access-controlled doors, a requirement for certain certifications. By efficiently controlling access points and implementing real-time compliance checks, LYNX provides a protected environment for high-value cargo. "We can track every single door, along with every person who accesses or tries to access them.” LYNX provides a protected environment for high-value cargo. Gated entry with intercom Upon arrival, visitors of all types buzz into the building using the Verkada Intercom Upon arrival, visitors of all types buzz into the building using Verkada Intercom. Dedicated LYNX staff members can verify the visitor’s identity, answer the call, choose to grant them entry, and even unlock doors remotely with integrated access control. Entrance security is further enhanced with context cameras and real-time alerts for people or vehicles of interest. "It's not just about letting people in; it's about ensuring that everyone who enters our facility is verified and authorised. This technology offers peace of mind to both our team and our clients." Multi-layered perimeter security Beyond the buildings, parking lots and perimeters are protected with Licence Plate Recognition (LPR) technology, cameras, and alarms. The main entrance is followed by two buffer zones, each with its own gate, and includes Licence Plate Recognition (LPR) cameras that track vehicles entering the premises. "We have a main entrance and multiple gates – all controlled through Verkada. The cameras are strategically placed, so we could even deploy tailgate detection if needed.” Parking lots and perimeters are protected with LPR technology. Quality and client assurance Francisco shows them their guest log and footage of everywhere they have been in the facility Auditors sign in via Verkada Guest before walking through the facility. At the end of their visit, Francisco shows them their guest log and footage of everywhere they have been in the facility. Once clients see the facilities firsthand, their decision becomes clear. "I truly believe that all we have to do is get people in here. The facility does the rest.” AI-powered search capabilities further distinguish LYNX in the logistics industry, offering exceptional protection for high-value cargo. "Our AI-powered capabilities set us apart in the market. This technological edge is why clients trust us with high-value items like medical devices." Looking ahead Francisco’s passion for new technology brings innovation to the forefront, setting the company apart in the competitive logistics industry. He has even built a special mount, which can peer into containers and trailers while suspended from the loading dock. "We believe in investing in cutting-edge technology to provide the highest level of service and quality for our customers. I love to hear, ‘Nobody else is doing this.’ It means our clients are doing their homework and we're doing something right.” Francisco’s passion for new technology brings innovation to the forefront. Their proactive security measures have built trust with customers and struck a chord with prospects. So much so that expansion plans are underway to open new facilities in major cities across the United States. “We can continue to bring our security to the next level, from AI-powered search to future feature releases. We’re excited to try it all.”
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
The Swiss Federal Railways (SBB) is the largest rail and transport company in Switzerland with 1.2 million passengers and 180,000 tonnes of freight transported every day. SBB is a pioneering rail system in Europe due to its quality of service, safety, and reliability. It operates passenger, cargo, and freight services, with large real estate holdings across Switzerland that it needs to keep secure and protect from crime, anti-social behaviour, and trespassing. High-performance cameras SBB video team needed to replace an existing video surveillance system across its rail network The SBB video team needed to replace an existing video surveillance system across its rail network. Hanwha Vision cameras were chosen due to their high performance, intelligent analytics, and attractive pricing. Hanwha Vision cameras from its X and P series, including a vandal-resistant network dome camera, plus PTZ cameras and network boxes, have been installed and used continuously since 2021. Video analytics for greater awareness The cameras have a wide range of beneficial functions and analytics such as audio detection, automatic lens distortion correction and WDR (Wide Dynamic Range). If an event occurs, the dome cameras can switch to PTZ cameras. The cameras also feature tamper detection, fog detection and day and night functions. Cost optimisation in the project and in operation SBB is using dome and multi-directional cameras from the X and P series SBB is increasingly using dome and multi-directional cameras from the X and P series with the option of remote lens alignment. These help to optimise costs in the project and during operation, as the alignment and the lens can be adjusted and corrected remotely at any time, eliminating the need for on-site adjustment. Securing perimeters With intelligent video analytics, such as loitering detection and virtual line-crossing and area detection, carried out on the device, the cameras deliver accurate motion detection, allowing operators to quickly understand if there is unauthorised entry to any restricted areas. The integrated AI supports the differentiation between people and different vehicles, increasing the accuracy of the analysis and minimising false alarms. "We are very satisfied with the performance of the Hanwha Vision cameras. They help us to secure our stations and buildings, optimise processes in rail operations, improve public safety and ensure that our trains run on time,” said Chei Seung-Kyoo, responsible for Technology Video at SBB.


Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
