Insights Archives - Nextro https://nextro.nz/category/insights/ Managed Telecommunications, Network & Security Solutions NZ Mon, 28 Apr 2025 03:44:55 +0000 en-NZ hourly 1 https://wordpress.org/?v=6.8.1 https://nextro.nz/wp-content/uploads/2020/05/cropped-image001-32x32.png Insights Archives - Nextro https://nextro.nz/category/insights/ 32 32 Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience https://nextro.nz/fortinets-global-security-awareness-and-training-report-key-insights-for-building-cyber-resilience/?utm_source=rss&utm_medium=rss&utm_campaign=fortinets-global-security-awareness-and-training-report-key-insights-for-building-cyber-resilience Sun, 27 Apr 2025 23:27:17 +0000 https://nextro.nz/?p=5816 Fortinet’s recent Security Awareness and Training Report highlights the growing impact of AI-driven cyber threats. Discover how Nextro’s managed training service helps organisations build a stronger, more resilient workforce and meet evolving security and compliance requirements

The post Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience appeared first on Nextro.

]]>
Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience

In an increasingly AI-driven world, cybersecurity is no longer just a technology challenge, it is a human one. Fortinet’s 2024 Security Awareness and Training Global Research Report reveals how business leaders worldwide are rethinking their approach to employee cyber awareness in response to rapidly evolving threats. At Nextro, we believe that cybersecurity starts with people. Here’s what you need to know from the latest global research and why building a cyber-smart workforce has never been more important.

AI-Driven Threats Are Reshaping the Risk Landscape

62% of organisations expect that employees will fall victim to more cyberattacks due to cybercriminals’ malicious use of AI.
Threat actors are increasingly using AI to create deepfakes, hyper-targeted phishing emails, and other sophisticated attacks that are harder for individuals to detect.

Key findings:

  • 95% of organisations are actively using or exploring AI-powered security solutions.
  • 80% say that growing awareness of AI-driven attacks has increased internal support for security awareness programmes.
  • Despite this, 31% of organisations still do not manage or monitor employee use of AI applications, creating significant policy gaps.

At Nextro, we see this as a critical reminder that technology alone is not enough. Strong internal policies, supported by education and training, are vital for managing AI-related risks.

Security Awareness Training Is Now a Strategic Priority

Training is no longer a box-ticking exercise. It is a core component of building organisational resilience. Fortinet’s report highlights a growing maturity in how leaders are delivering and planning training:

  • 81% of organisations believe that a minimum of three hours of security awareness training per employee per year is needed.
  • 75% of programmes are now pre-planned and delivered monthly or quarterly for maximum impact.
  • 89% of organisations report that they have seen a measurable improvement in their security posture after implementing awareness training.
  • Top training topics include phishing prevention, data security, and data privacy, all critical areas as cybercriminal tactics continue to evolve.

However, engagement remains a challenge. Among organisations dissatisfied with their programmes, 41% cited a lack of engaging content as a major issue.

Compliance, Risk, and Culture: A Unified Approach

Security awareness initiatives are increasingly being driven by:

  • Past incidents (52%)
  • Corporate sponsorship (21%)
  • Compliance and regulatory obligations (13%)

Leaders also recognise that they need to go further. 94% are interested in introducing stricter cybersecurity policies for high-risk user groups.

These findings reinforce a key Nextro belief that cybersecurity must be embedded into an organisation’s culture, not treated as an add-on. Awareness training, clear policies, and regular reinforcement must work together to build lasting resilience.

Final Thoughts

The 2024 report makes it clear that organisations investing in security awareness are better positioned to defend against both traditional and AI-enhanced threats. But successful programmes require more than good intentions. They demand strategic planning, engaging content, and executive sponsorship.

At Nextro, we deliver Fortinet Security Awareness and Training as a fully managed, turnkey service, helping businesses build cyber resilience from the inside out.

For more information, visit Security Awareness Training on our website.

If you are ready to strengthen your human firewall,
Talk to us about how we can help build a smarter, stronger, and safer workforce.

The post Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience appeared first on Nextro.

]]>
Using AI to Enhance Worker Safety on the Factory Floor https://nextro.nz/using-ai-to-enhance-worker-safety-on-the-factory-floor/?utm_source=rss&utm_medium=rss&utm_campaign=using-ai-to-enhance-worker-safety-on-the-factory-floor Wed, 16 Apr 2025 12:10:31 +0000 https://nextro.nz/?p=5752 Using AI to Enhance Worker Safety on the Factory Floor In today’s dynamic industrial environments, ensuring worker safety is more important than ever. Traditional safety protocols remain essential, but they don’t always keep pace with the real-time challenges and complexities of modern manufacturing, warehousing, or logistics. Enter Nextro partner Hanwha Vision’s Factory & Safety AI...

The post Using AI to Enhance Worker Safety on the Factory Floor appeared first on Nextro.

]]>
Using AI to Enhance Worker Safety on the Factory Floor
In today’s dynamic industrial environments, ensuring worker safety is more important than ever. Traditional safety protocols remain essential, but they don’t always keep pace with the real-time challenges and complexities of modern manufacturing, warehousing, or logistics. Enter Nextro partner Hanwha Vision’s Factory & Safety AI Pack — an advanced AI-powered solution designed to proactively improve worker safety and reduce incident risks on the factory floor.

Proactive Safety Monitoring with AI

The Factory & Safety AI Pack integrates seamlessly with Nextro supplied surveillance systems to deliver real-time monitoring and alerting of critical safety indicators. Key features include:

  • Forklift and Personnel Distance Detection
    The system continuously tracks forklift and worker movement, triggering alerts when unsafe distances are detected — helping to prevent collisions and near misses.
  • Speed and Parking Compliance
    Forklift speeds are monitored to ensure drivers stay within safe limits. The system also detects incorrect or hazardous parking practices, prompting immediate action to restore safe and efficient operations.
  • Slip and Fall Detection
    Using deep learning, the AI can identify slip and fall incidents as they happen, enabling quick response to reduce the severity of injuries and potential downtime.
  • Blocked Exit Monitoring
    Emergency exits are monitored to ensure they remain clear at all times. This helps sites meet obligations under New Zealand’s Health and Safety at Work Act 2015, ensuring rapid evacuation routes in the event of an emergency.

Supporting Smarter Operations

In addition to preventing injuries, the AI pack also improves operational efficiency:

  • Heatmaps and Queue Management
    High-traffic zones and queue lengths are monitored and visualised through heatmaps — allowing operations teams to adjust layouts and minimise congestion.
  • Customisable Alerts and Detection Zones
    Safety managers can fine-tune detection areas, thresholds, and alerts to suit the layout and risk profile of each facility, ensuring a tailored safety approach.

Streamlined Compliance and Reporting

Keeping track of safety performance is easier with automated event logs (straight in to Genetec or Milestone) and reporting. All incidents and alerts are documented, helping Australian and New Zealand businesses maintain transparent safety records and continuously improve performance — key components of meeting WorkSafe New Zealand and OSHA requirements.

Final Thoughts

Hanwha Vision’s Factory & Safety AI Pack is a smart step forward in workplace safety for New Zealand’s industrial sector. By leveraging AI-driven analytics, factories can proactively reduce risks, increase operational efficiency, and support compliance with New Zealand’s health and safety legislation.

Ready to enhance safety in your facility? Talk to the team at Nextro about deploying smart surveillance and AI to build a safer, smarter work environment.

The post Using AI to Enhance Worker Safety on the Factory Floor appeared first on Nextro.

]]>
Why IoT Matters in Physical Security https://nextro.nz/why-iot-matters-in-physical-security/?utm_source=rss&utm_medium=rss&utm_campaign=why-iot-matters-in-physical-security Mon, 14 Apr 2025 04:20:39 +0000 https://nextro.nz/?p=5725 The Internet of Things (IoT) is transforming the way we connect, monitor, and optimise security infrastructure. With a projected 30 billion IoT devices in use by 2030, organisations are increasingly leveraging these technologies to enhance efficiency, security, and data-driven decision-making. In this article Nextro and Genetec explore how the Industrial Internet of Things (IIoT) is...

The post Why IoT Matters in Physical Security appeared first on Nextro.

]]>
The Internet of Things (IoT) is transforming the way we connect, monitor, and optimise security infrastructure. With a projected 30 billion IoT devices in use by 2030, organisations are increasingly leveraging these technologies to enhance efficiency, security, and data-driven decision-making.

In this article Nextro and Genetec explore how the Industrial Internet of Things (IIoT) is driving digital transformation in enterprise security—examining its distinction from consumer IoT, real-world applications in building automation, and its pivotal role in Industry 4.0, cloud adoption, and future-ready infrastructure.

A key subset of IoT is IIoT, which focuses on enterprise and industrial applications. Unlike consumer IoT—such as smart speakers and home automation—IIoT connects sensors, monitoring tools, and systems within businesses to streamline operations and improve physical security. With the global IIoT market expected to reach $1.74 trillion USD by 2030, this technology is a fundamental driver of the next industrial revolution.

What is IoT, and How Does It Differ from IIoT?

IoT refers to a network of interconnected devices that exchange data via the internet or other networks. This ecosystem includes everything from everyday smart devices to complex industrial security systems. IIoT, on the other hand, is specifically designed for enterprise environments, ensuring reliability, security, and efficiency in industrial processes.

Examples of IIoT applications include integrating video surveillance and access control with lighting and HVAC systems to improve automation and sustainability. Such implementations help organisations enhance building management and security while reducing operational costs.

Industry 4.0 and the Role of IIoT

We are currently in the Industry 4.0 era, where automation, AI, and IIoT are shaping the modern industrial landscape. This follows Industry 3.0, which introduced digital electronics and automation, and precedes Industry 5.0, which emphasises human-machine collaboration.

Forward-thinking businesses are adopting Industry 4.0 principles to improve resilience, streamline processes, and deliver superior customer experiences. By integrating IIoT technologies and AI-driven security solutions, companies are enhancing security, efficiency, and real-time decision-making.

Cloud Computing and IIoT Growth

The rapid adoption of IIoT is largely driven by cloud computing, which enables secure access to critical data from anywhere. Hybrid work models have accelerated this shift, requiring organisations to deploy flexible, cloud-connected security systems.

Cloud applications provide scalable data processing, storage, and analytics capabilities. Hybrid-cloud architecture solutions allow IT and security teams to modernise infrastructure while maintaining existing sensors and devices. This eliminates previous barriers to IIoT adoption and enhances operational agility.

Strengthening IIoT Cybersecurity

As the number of connected devices grows, so do cybersecurity risks. However, the perception that cloud-based solutions lack security is outdated. Leading cloud platforms now offer built-in cybersecurity tools that automate threat detection and compliance management, reducing the burden on IT teams.

To maximise IIoT’s benefits while ensuring security, businesses must invest in solutions that integrate cybersecurity from the outset. This includes encryption, access controls, and continuous monitoring to mitigate potential vulnerabilities.

Unifying IIoT Systems for Data-Driven Insights

Managing hundreds or thousands of IIoT sensors is only effective if organisations can process and analyse the generated data efficiently. Open-architecture and unified platforms bring together diverse security and operational systems, enabling seamless integration and automation.

For example, businesses can unify video surveillance, access control, and intrusion detection into a single system. Additional integrations—such as intercoms, building management, and automatic licence plate recognition—further enhance security and operational intelligence.

Real-World Applications of IIoT in Security

Organisations worldwide are using IIoT to enhance physical security and efficiency. Some notable examples include:

  • Automating HVAC Airflow in Airports: Airports can use IIoT-enabled video analytics to adjust airflow in crowded areas, improving passenger comfort while reducing energy consumption.
  • Sound Detection for Safety in Public Restrooms: Schools and universities can deploy IIoT-based sound detection to identify potential safety incidents, triggering alerts when distress words like “help” are detected.
  • Illegal Dumping Detection in Cities: Cities can integrate IIoT cameras and motion detection to identify and address illegal dumping, leading to faster enforcement and reduced violations.
  • Temperature Monitoring in Critical Areas: Hospitals and data centres can use IIoT sensors to monitor temperature-sensitive areas, ensuring compliance and preventing damage to valuable assets.
  • Automating Building Controls for Sustainability: Organisations can link access control systems with building management to reduce energy consumption, activating heating, cooling, and lighting only when needed.

Unlocking the Potential of IIoT with Nextro

At Nextro, we help businesses harness the power of IIoT to create smarter, more secure environments. By integrating cloud computing, AI-driven analytics, and unified security solutions, we empower organisations to enhance security, efficiency, and sustainability.

The future of physical security lies in connected, intelligent systems that adapt to evolving threats and operational needs. With IIoT, businesses can unlock new efficiencies, automate critical processes, and make data-driven decisions with confidence.

Ready to explore how Nextro can deploy IIoT to transform your security strategy? Contact Nextro today.

See source material

https://www.genetec.com/blog/products/why-iot-matters-in-physical-security

The post Why IoT Matters in Physical Security appeared first on Nextro.

]]>
Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks https://nextro.nz/enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks Sun, 16 Mar 2025 22:00:06 +0000 https://nextro.nz/?p=5661 Lockdown procedures are a critical security measure against Marauding Terrorist Attacks (MTAs). In this article, Nextro explores key insights from the UK’s CPNI on implementing effective lockdowns, highlighting strategies, challenges, and best practices for businesses and security teams in New Zealand and Australia. Stay prepared—learn how to safeguard your site.

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>

Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks

In an era of evolving security threats, preparedness is key to mitigating risks and protecting lives. The Supplementary Guidance: Lockdown document, developed by the UK’s Centre for the Protection of National Infrastructure (CPNI), provides critical insights on how organisations can implement lockdown procedures to prevent and delay Marauding Terrorist Attacks (MTAs).

This is highly relevant for New Zealand and Australia in the wake of the Bondi Westfield terror attack in 2024, the New Lynn Auckland stabbings in 2021 and the Christchurch, New Zealand Mosque shootings in 2019.

In this article, Nextro summarises the key takeaways from the UK guidance, and explores the considerations businesses, security teams, and PCBUs must take into account when planning for an emergency lockdown at their site or crowded place.

Understanding Lockdown and Its Importance

What is Lockdown?

Lockdown refers to the practice of securing entry points by locking doors and barriers to restrict access. It is a strategic response to prevent or delay attackers from reaching potential victims. The document also refers to this as “dynamic lockdown”, as it involves rapid implementation depending on the situation.

Key characteristics of a lockdown:

  • It can be applied to an entire site or specific zones.
  • It involves physical security measures such as locked doors, turnstiles, and barriers.
  • It aims to minimise casualties by slowing down or deterring attackers.

Why is Lockdown Important?

Data from previous terror incidents, such as the 2017 London Bridge and Borough Market attacks and the 2019 Christchurch Mosque shootings, have shown that most fatalities occur within the first few minutes—before law enforcement arrives. Implementing a well-planned lockdown can reduce casualties significantly by:

  • Preventing attackers from entering a secure zone.
  • Keeping people from running into danger unknowingly.
  • Buying critical time for emergency responders to arrive.

However, lockdowns must be implemented with caution. A poorly planned lockdown can increase risks, especially if it traps victims with attackers or creates dangerous bottlenecks.

Planning for an Effective Lockdown

Key Considerations

Before implementing a lockdown plan, organisations should assess:

  1. The effectiveness of lockdown – Will it delay the attacker and protect people?
  2. Potential risks – Could it unintentionally trap people in danger?
  3. Lockdown feasibility – Are existing security systems capable of enforcing lockdown?
  4. Triggering conditions – What circumstances should lead to a lockdown?
  5. Infrastructure investment – Do additional security measures need to be implemented?

Implementation Methods

There is no one-size-fits-all approach to lockdowns. The guidance outlines multiple methods:

1. Centralised Lockdown Management

  • Utilises an Automated Access Control System (AACS) to remotely lock and unlock doors.
  • Can be controlled from a Security Control Room (SCR).
  • Provides a coordinated, immediate response.

2. Automated Lockdown

  • Uses attack detection systems (e.g., gunshot detectors) to automatically trigger lockdown.
  • Minimises human intervention, but requires a highly reliable system to avoid false alarms.

3. Manual Lockdown

  • Relies on security personnel or staff to physically lock doors using keys, panic buttons, or chains.
  • Best suited for smaller sites but can be slow in execution.

4. Partial Lockdown

  • Locks only specific entry points, leaving some exits open for evacuation.
  • Useful for shopping centres, offices, and large venues where full lockdown may not be practical.

5. Two-Way Lockdown

  • Doors are locked from both sides, preventing entry and exit.
  • Can be dangerous if people need to evacuate quickly.

6. One-Way Lockdown

  • Doors can only be opened from one side, allowing people to escape but preventing entry.
  • A safer approach that ensures emergency exits remain accessible.

Empowering Security and Front-Line Personnel

Lockdown procedures are only effective if security and front-line personnel are trained and prepared. The guidance emphasises:

  • Empowering staff to initiate lockdowns without waiting for approval.
  • Installing panic buttons for immediate response.
  • Monitoring lockdown integrity to prevent breaches.
  • Using public address (PA) systems to announce lockdown status.
NZ Police Christchurch

Common Planning Challenges and Solutions

When designing lockdown strategies, several challenges arise.
The guidance provides recommendations for handling these scenarios:

Challenge

Recommended Approach

Large crowds running towards a building

Decide whether to grant them access or maintain lockdown to prevent attackers from entering.

Attack happening near the site

Establish a clear proximity threshold for initiating lockdown.

Attack occurring inside the site

Consider locking down specific zones rather than the entire site to allow safe evacuation.

People wanting to leave a locked area

Establish protocols for controlled exit in extreme circumstances.

Fire emergencies during lockdown

Ensure fire safety compliance and integrate lockdown with fire evacuation plans.

Police and emergency services access

Create clear procedures for law enforcement entry without compromising security.

Final Thoughts: Preparing for the Worst-Case Scenario

The Marauding Terrorist Attack Lockdown Guidance provides a comprehensive roadmap for organisations to plan, implement, and refine their lockdown procedures. While lockdowns can be an effective life-saving measure, they require careful planning, training, and legal consideration to ensure they don’t create new risks.

For businesses, security teams, and public institutions, this guide serves as a reminder that preparedness is key. By understanding when and how to use lockdown effectively, organisations can significantly improve their resilience against terrorist threats.

Key Takeaways

✔ Lockdown is an effective security measure but must be tailored to each site.
✔ Poorly planned lockdowns can increase risks rather than reduce them.
✔ Training and empowering personnel is crucial for effective lockdown implementation.
✔ Legal compliance is essential to avoid conflicts with fire safety and human rights laws.
✔ Regular testing and drills should be conducted to refine procedures.

By following these guidelines, organisations can develop robust lockdown strategies that save lives in the event of a MTA.

ProtectUK – Protective Security Advice and Guidance

NZ Police – Protect Your Crowded Place

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>
Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report https://nextro.nz/navigating-the-future-of-security-nextros-summary-of-top-physical-security-trends-for-2025-from-the-genetec-report/?utm_source=rss&utm_medium=rss&utm_campaign=navigating-the-future-of-security-nextros-summary-of-top-physical-security-trends-for-2025-from-the-genetec-report Thu, 06 Mar 2025 08:44:17 +0000 https://nextro.nz/?p=5615 Explore Nextro’s breakdown of the top physical security trends for 2025, based on Genetec’s latest report. From cyber-physical security convergence and AI advancements to hybrid-cloud adoption and data-driven decision-making, stay ahead of emerging threats. Learn how these trends are shaping security in New Zealand and how Nextro can help.

The post Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report appeared first on Nextro.

]]>

Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report

The security landscape is constantly evolving. Staying ahead of the curve is crucial for businesses in New Zealand.

In this insight, we’ll explore the key physical security trends to watch in 2025, drawing insights from Genetec’s State of Physical Security Report 2025. These trends include the increasing convergence of cyber and physical security, a wider adoption of hybrid-cloud models, a rise in data-driven decision-making, and the innovative use of AI.

1. Cybersecurity Takes Centre Stage

Cyber threats are on the rise, and businesses are responding by strengthening their cybersecurity measures. Genetec’s report reveals that 71% of businesses prioritised educating employees about cybersecurity best practices in 2024, compared to 61% in 2023. Additionally, 51% focused on refining user permissions and privileges, while 47% prioritised securing data storage.

The convergence of cyber and physical security is undeniable. IT departments are playing an increasingly influential role in physical security decisions, highlighting the need for seamless collaboration between these two critical areas.

2. Converged Security: Bridging the Gap Between Physical and Cyber

The boundaries between physical and cyber security are becoming increasingly intertwined, and businesses are recognising the need for a unified approach. Genetec’s State of Physical Security Report 2025 reveals a significant rise in the awareness and implementation of cybersecurity practices.

This shift is driven by the understanding that physical security systems are now deeply reliant on digital infrastructure. As a result, IT departments are playing a more influential role in managing and securing these systems, leading to greater collaboration between IT and security professionals.

  • IT influence: Genetec’s report reveals that IT departments consistently rank above physical security departments in terms of involvement in buying decisions. In 2024, 51% of IT professionals prioritised deploying cybersecurity tools, compared to 27% of security and safety professionals. This highlights the growing influence of IT in physical security decisions.

This convergence of physical and cyber security is vital for building a robust security strategy that addresses the evolving threat landscape and protects businesses from both internal and external risks

3. Cloud Adoption Meets Reality

Cloud adoption in physical security has recently slowed down. A recent report found that globally, 38% of businesses already have over a quarter of their physical security deployment in a cloud or hybrid-cloud environment, which is a 6% decrease from last year.

 In New Zealand specifically, 62% of businesses have reported that they are not currently using any cloud for their physical security environments, partially due to the lack of local data centre infrastructure in the region.

Businesses are trending toward taking a more cautious approach, opting for hybrid deployments that balance the benefits of cloud scalability with the control of on-premises infrastructure. Those looking to fully migrate to the cloud are doing so by moving individual workloads to the cloud in an incremental fashion, minimising risk.

  •  Data Security and Control: Concerns about data loss and control remain prevalent, particularly in the physical security domain. Businesses are keen on ensuring the security and integrity of their sensitive data while migrating to the cloud.  
  • Long-term Outlook: Despite the slowdown, the long-term outlook for cloud adoption in physical security remains positive. As technology evolves and addresses concerns around cost and security, businesses will continue to explore hybrid-cloud solutions to enhance their security infrastructure.

4. Access Control and Video Surveillance Remain Paramount

For the fifth consecutive year, access control is the top priority for physical security departments. Video surveillance is a close second.

Genetec’s Physical Security Report 2025 emphasises the continued importance of access control and video surveillance in 2025. End users are looking to expand the functionalities of their access control systems, with 41% showing interest in visitor management, 39% in biometrics, and 37% in identity management.

For video surveillance, the focus is on replacing or updating cameras and video management systems (VMS) to incorporate new technologies like higher quality video, streamlined VMS interfaces, and intelligent video analytics.  

In 2024, many businesses implemented unified security solutions, integrating their access control and video surveillance systems. This has helped streamline security operations, enabling teams to manage both systems from a single platform, leading to improved efficiency and enhanced overall security. This trend is expected to continue into 2025 as businesses increasingly seek integrated solutions to optimise their security management.

5. The Rise of Data-Driven Decision-making

Businesses are gathering, using, and sharing security data to improve physical security and business operations.

Genetec’s Physical Security Report 2025 identifies a growing trend of using security data for strategic decision-making. Both end users and consultants recognise the increasing use of this data across key departments. Executive leaders view this data as crucial for achieving business objectives, emphasising the strategic value of physical security data.

What can data-driven decision-making improve?

  • Situational Awareness: Real-time data and analytics can provide a comprehensive view of the security landscape, enabling quicker response times and proactive threat mitigation.  
  • Enhanced Operational Efficiency: Data-driven insights can help optimise security operations, reduce manual tasks, and improve resource allocation.  
  • Reduced Security Risks: By analysing data trends and patterns, businesses can identify potential vulnerabilities and proactively address them, minimising security risks.  
  • Better Decision Making: Access to accurate and timely data empowers informed decision-making, enabling businesses to align security strategies with business objectives and optimise resource allocation.  
  • ROI: By leveraging security data for operational insights and business intelligence, businesses can maximise the value of their security investments and demonstrate a return on investment (ROI).  

6. Harnessing the Power of AI

The integration of artificial intelligence (AI) into physical security systems is a promising development. Businesses are exploring how AI can help streamline and automate security operations with 37% of businesses planning to explore the integration of AI in their physical security systems, an increase of 27% over 2024.

While the report acknowledges the potential of AI in physical security, it also notes that 27% of businesses are unsure how to deploy AI effectively. This uncertainty highlights the need for greater understanding and training on AI applications in physical security.

Despite this, those already using AI see its value in streamlining and automating security operations, particularly in tasks like automatically triggering events of interest, automating emergency response dispatch, and forecasting future threats.

7. Pragmatism and Value-Driven Solutions

In 2025, the physical security industry is demonstrating pragmatism and a renewed focus on operational excellence. Businesses are prioritising projects that enhance security and efficiency without introducing unnecessary complexity or costs.  

This trend involves:

  • Seeking reliable, value-driven solutions that enhance security without unnecessary complexity or costs.  
  • Focusing on technology that meets day-to-day needs while tracking innovative technology for future implementation.  
  • Looking for real-world solutions that improve work and efficiency within budget constraints.  
  • Prioritising hybrid-cloud deployments and a measured approach to finding strong use cases for new technology.  
  • Focusing on ways to adopt new technology into existing infrastructure to improve operations, increase cyber resiliency, and deliver physical security more cost-efficiently.

At Nextro, we’re passionate about securing New Zealand and empowering New Zealand’s top businesses to thrive in a secure environment. Our expertise extends beyond physical security, encompassing a holistic approach that integrates cyber resilience and proactive risk management.

We leverage the latest technologies and industry best practices to fortify your organisation’s defences, safeguard your assets, and protect your people. Our team collaborates closely with you to develop tailored security strategies that align with your business objectives and address your unique challenges.

Whether you’re looking to enhance your access control systems, upgrade your video surveillance, or implement a comprehensive cybersecurity strategy, Nextro is your trusted partner.

Ready to elevate your converged security posture and unlock your business potential? Contact us today to explore how Nextro can help you achieve your converged security goals.

To download the full State of Physical Security Report 2025 

The post Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report appeared first on Nextro.

]]>
Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management https://nextro.nz/nextro-and-fortinet-partner-to-enhance-cybersecurity-with-24-7-socaas-monitoring-and-incident-management/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-and-fortinet-partner-to-enhance-cybersecurity-with-24-7-socaas-monitoring-and-incident-management Sun, 23 Feb 2025 22:22:25 +0000 https://nextro.nz/?p=5534 Nextro and Fortinet have partnered to provide affordable 24/7 Security Operations Centre as a Service (SOCaaS) for businesses in Australia and New Zealand. Nextro's solution, powered by Fortinet, offers continuous network monitoring, advanced threat detection, expert analysis, and regulatory compliance to enhance cybersecurity resilience without the high costs of traditional SOCs.

The post Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management appeared first on Nextro.

]]>
Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management

Having a firewall in place is essential, but it is only one part of a comprehensive cybersecurity strategy. The real question is: who is actively monitoring your network around the clock for suspicious activity, irregular traffic patterns, and potential security threats?

Large enterprises, multinational corporations, and government organisations can afford dedicated Security Operations Centres (SOCs) to monitor and respond to cyber threats in real time. However, for most businesses, the cost of maintaining such a service in-house is prohibitive.

In Australia and New Zealand, many businesses and critical infrastructure sites have firewalls and edge security solutions in place, yet they lack continuous network monitoring. This is often due to the perceived high costs and complexity involved, despite the recognition that ongoing surveillance is crucial for robust cybersecurity.

Introducing Nextro’s SOCaaS Solution

Nextro has partnered with Fortinet to offer an affordable and scalable Security Operations Centre as a Service (SOCaaS) tailored for businesses across Australia and New Zealand. This service is designed to provide 24/7 monitoring and security management for:

  • Corporate networks
  • Building services networks (BSN)
  • Operational Technology (OT) networks

𝟮𝟰/𝟳 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 – Detect and respond to threats in real-time to minimise impact.

  • Continuous surveillance for potential security risks
  • Rapid response to minimise damage
  • Proactive threat detection to stay ahead of attackers

𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗧𝗵𝗿𝗲𝗮𝘁 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 – Leverage behavioural analytics and anomaly detection to counter evolving cyber risks.

  • AI-driven security for real-time threat identification
  • Behavioural analysis to detect unusual activities
  • Adaptive security to mitigate emerging cyber threats

𝗘𝘅𝗽𝗲𝗿𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 – Get insights and recommendations from skilled analysts to enhance your cybersecurity.

  • Access to cybersecurity experts for in-depth analysis
  • Actionable insights to strengthen security posture
  • Tailored recommendations to address vulnerabilities

𝗥𝗲𝗴𝘂𝗹𝗮𝘁𝗼𝗿𝘆 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 – Stay compliant by continuously monitoring and addressing security issues.

  • Meet industry standards and regulatory requirements
  • Proactive risk management to avoid compliance violations
  • Ongoing assessments to maintain security best practices

With Nextro’s SOCaaS, businesses of all sizes can enhance their cybersecurity resilience without the high costs associated with traditional SOC solutions.
Contact us today to learn how we can help protect your business from cyber threats.

The post Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management appeared first on Nextro.

]]>
Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure https://nextro.nz/lessons-from-the-august-2024-vienna-concert-terror-plot-security-strategies-for-large-events-critical-infrastructure/?utm_source=rss&utm_medium=rss&utm_campaign=lessons-from-the-august-2024-vienna-concert-terror-plot-security-strategies-for-large-events-critical-infrastructure Mon, 03 Feb 2025 04:09:50 +0000 https://nextro.nz/?p=5360 Uncover Nextro’s insights on the August 2024 Taylor Swift concert terror plot and its implications for event security and critical infrastructure. Learn key lessons on threat evolution, intelligence sharing, and proactive security measures to protect crowded places, stadia, and high-risk sites from emerging threats.

The post Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure appeared first on Nextro.

]]>
Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure

In August 2024, Austrian authorities, with intelligence cooperation from international agencies, disrupted a terrorist plot targeting Taylor Swift’s concerts in Vienna. The attack, allegedly orchestrated by radicalised individuals, planned a mass-casualty event using vehicle ramming, knives, and explosives.

This foiled plot serves as a critical case study for security professionals across event management, law enforcement, and critical infrastructure protection. It highlights growing threats to stadia, crowded places, and critical infrastructure and the urgent need for integrated security solutions.

What We Can Learn: Evolving Threats to Public Safety

The Vienna plot underscores several key trends in modern threat landscapes:

  • Large events remain high-value targets – Stadium gatherings and crowded places provide maximum media exposure for bad actors. Security planning must anticipate dynamic threats, not just traditional attack methods.
  • Online radicalisation is a growing concern – The Vienna suspects were radicalized via online forums and encrypted messaging apps. Law enforcement and intelligence agencies must monitor emerging extremist networks, leveraging AI-driven intelligence gathering.
  • Attackers are diversifying methods – The planned attack included multiple tactics, from vehicular attacks to edged weapons and explosives. Security teams must deploy multi-layered defences that address different risk factors.
  • International intelligence sharing is crucial – The Vienna plot was prevented through timely intelligence cooperation between multiple countries. Security teams at major venues must have direct channels to law enforcement and counterterrorism agencies to facilitate real-time threat detection.

Proactive Security Measures for Large Events & Critical Infrastructure

As security integrators and consultants, we must design holistic, technology-driven solutions that safeguard crowded places from evolving threats, whether at large gatherings, stadia, or critical infrastructure sites. Here’s how:

  1. Physical Barriers & Controlled Perimeters 
  • Deploy hostile vehicle mitigation (HVM) solutions, including reinforced bollards and traffic-calming measures to protect pedestrian zones from vehicle-borne attacks around crowded places like a stadium, shopping districts, and critical infrastructure
  • Create layered security perimeters to secure and monitor access control zones effectively.
  1. AI-Powered Surveillance & Threat Detection
  • Utilise AI-driven video surveillance analytics to identify anomalies in real-time.
  • Integrate facial recognition and crowd behaviour analysis to flag potential threats.
  • Deploy drone surveillance for large venues to monitor movement patterns.
  1. Comprehensive Screening & Behaviour Detection
  • Enhance entry screening with multi-layered detection, including X-ray, metal detectors, and explosives screening.
  • Train staff in behavioural threat assessment to recognise suspicious actions before an incident occurs.
  1. Real-Time Intelligence Sharing & Communication
  • Establish direct communication lines between security teams and law enforcement agencies.
  • Integrate a centralised command center that collects and distributes intelligence data from multiple sources.
  1. Rapid Response Protocols & Crisis Management
  • Develop and test incident response plans, ensuring swift action in case of an attack.
  • Train staff and security personnel in active threat response, including evacuation protocols, lockdown procedures, and emergency medical aid.

Why This Matters for Crowded Places, Stadia, and Critical Infrastructure Managers

While this attack targeted a concert venue, similar threats apply to other crowded places and critical infrastructure including airports, transit hubs, energy facilities, and government buildings. Attackers seek soft targets— crowded places with high foot traffic and limited security presence. Integrating advanced security measures at these sites prevents disruptions and enhances resilience against evolving threats.

Final Thoughts: The Need for Adaptive Security

The Vienna concert plot reinforces a clear takeaway: Threat landscapes are evolving, and security strategies must evolve with them. Whether managing a large event, a public gathering, or a critical infrastructure site, a proactive, multi-layered security approach is non-negotiable.

Security is not just about detection—it’s about prevention.

At Nextro, we specialise in integrating advanced, multi-layered security systems and people-driven protocols that combine real-time intelligence and rapid response measures to safeguard crowded places, stadia, and critical infrastructure.

Contact us today to learn how our tailored security solutions and integrations can help you stay ahead of evolving threats and protect the public. 

For further insights and source material, see the full case study by the Combating Terrorism Center at West Point: Original Article

The post Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure appeared first on Nextro.

]]>
Elevate critical infrastructure networks with Nextro and Arista https://nextro.nz/elevate-critical-infrastructure-networks-with-nextro-and-arista/?utm_source=rss&utm_medium=rss&utm_campaign=elevate-critical-infrastructure-networks-with-nextro-and-arista Mon, 19 Aug 2024 22:48:38 +0000 https://nextro.nz/?p=5142 Elevate critical infrastructure networks with Nextro and Arista Critical infrastructure industries such as energy, water supply, healthcare, and transportation are the backbone of our society. They are crucial to ensuring public safety, economic stability, and country security.    As critical infrastructure managers continually embrace digital transformation, their corporate (IT) and operational (OT) networks must be able...

The post Elevate critical infrastructure networks with Nextro and Arista appeared first on Nextro.

]]>
Elevate critical infrastructure networks with Nextro and Arista

Critical infrastructure industries such as energy, water supply, healthcare, and transportation are the backbone of our society. They are crucial to ensuring public safety, economic stability, and country security.   

As critical infrastructure managers continually embrace digital transformation, their corporate (IT) and operational (OT) networks must be able to efficiently manage large volumes of data, and the growing number of IoT devices, while securely integrating operational technologies, security equipment, and other devices with their systems. To keep their operations running seamlessly, critical infrastructure organisations rely heavily on robust, high-speed, efficient, and secure network solutions/architecture.  

At Nextro, we understand that ensuring the reliability, operations, and security of critical infrastructure networks is of utmost importance not only for the organisations but the entire community.  To this end, Nextro partnered with Arista Networks, an industry leader in data-driven, client-to-cloud networking for large data centre/AI, campus, and routing environments, to provide innovative network solutions tailored to meet the dynamic and growing demands of the critical infrastructure sector.  

This article explores the importance of safeguarding critical infrastructure networks and how Arista Networks’ advanced switches and network solutions enable critical infrastructure organisations and managers to enhance their network availability, agility, automation, analytics, and security. 

Arista’s solutions for critical infrastructure networks 

Arista Networks is at the forefront of providing innovative cloud networking solutions to meet the highest performance, reliability, and security standards necessary for critical infrastructure operations. Their solutions include Extensible Operating System (EOS), network applications, and Ethernet switching and routing platforms.    

Check here how Arista’s solutions and Nextro can help critical infrastructure organisations: 

1. High-Performance Switches 

Arista’s switches are designed for high-performance, offering scalable bandwidth from 1Gbps to 400Gbps. They provide ultra-low latency, high throughput and scalability, ensuring real-time data processing essential for critical infrastructure operations that demand reliable, high-speed data transmission. Below are the two models of Arista’s high-performance switches that meet the needs of critical infrastructure and can be supplied by Nextro in New Zealand & Australia:   
 

  • 7000 series switches: designed for high-frequency trading, cloud data centres, and large enterprise environments. They support 10/25/40/50/100 Gigabit Ethernet and are known for their modularity and high-density configurations.   
  • 7500R series switches: engineered for the most demanding data centre environments. They offer exceptional performance, support for up to 400 Gigabit Ethernet and features designed to handle massive amounts of data traffic with minimal latency. 

2. Extensible Operating System (EOS) 

Arista EOS is a highly modular and fully programmable operating system that delivers workflow automation, high availability, unparalleled network visibility and analytics capabilities.   

Arista EOS integrates seamlessly with a wide range of third-party applications, automation tools, and scripting languages, enabling network administrators to customise and automate network functions and workflows. It can also scale to hundreds of thousands of compute and storage nodes with management and provisioning capabilities that work at scale.   

EOS ensures optimal network performance and troubleshooting issues by harnessing advanced features, including analytics, network telemetry, and real-time monitoring.   

Designed for resiliency and programmability, Arista EOS provides a robust software foundation and allows for solutions customised to the specific needs of critical infrastructure sectors, ensuring optimal performance and security. 

3. CloudVision: Unified Management and Automation 

Managing complex network environments can be challenging, particularly in critical infrastructure organisations. Arista’s CloudVision platform offers unified management, simplifying network operations and enhancing security. CloudVision’s real-time telemetry and analytics enhance network visibility, monitoring, and control.   

CloudVision’s centralised approach enables network administrators to oversee and efficiently manage complex and large-scale deployments from a single interface, reducing operational complexity, improving response time and mitigating risks.  

The platform leverages cloud networking and integrates various automation tools and orchestration frameworks, enabling streamlined operations and reduced manual intervention. At Nextro, we know that this is crucial for maintaining high availability and scaling infrastructure in response to changing demands. 

4. Virtual Extensible LAN (VXLAN) 

Arista’s VXLAN technology enhances network segmentation, vital for isolating sensitive data and protecting critical systems. By segmenting the network, organisations can minimise the impact of potential breaches and effectively contain threats.

Benefits of Arista’s Network Solutions for Critical Infrastructure 

Nextro can help its critical infrastructure customers achieve the following benefits when deploying Arista switches and other solutions: 

1. Improved Operational Efficiency 

With high-performance switches and routers, Arista network solutions cater to the demanding requirements of critical infrastructure. Their devices provide high-speed data transmission with minimal latency and maximum throughput, allowing critical infrastructure organisations to enhance operational efficiency, reduce downtime, and ensure continuous and reliable service delivery. 

2. Scalability and Flexibility 

Critical infrastructure systems must often scale quickly to accommodate growing demands or integrate new technologies. Arista’s software-driven solutions allow critical infrastructure organisations to adapt and expand their networks without compromising performance. The flexibility and scalability of Arista’s solutions, such as EOS (EOS), enable seamless integration with existing systems and technologies, ensuring that critical infrastructure can scale and evolve without disruption. 

3. Proactive Threat Detection and Response 

With the real-time telemetry and analytics capabilities offered by Arista’s CloudVision platform, organisations can proactively detect anomalies and threats to their networks. This allows them to respond swiftly to potential incidents, minimise damage, and ensure rapid recovery. 

4. Enhanced Security 

Critical infrastructure networks are exposed to various cybersecurity threats, which can cause significant disruptions to their operations, compromise the availability and integrity of vital services, and lead to catastrophic consequences. Therefore, security is paramount in critical infrastructure.   

Arista Networks incorporates advanced security features into its solutions, including segmentation, encryption, and real-time threat detection. By leveraging these capabilities, Nextro helps organisations protect their networks from cybersecurity threats and unauthorised access, safeguarding vital operations and sensitive data. 

Protecting critical infrastructure networks from cybersecurity threats is essential to ensure the uninterrupted delivery of vital services and the safety of our society. At Nextro, we understand the challenges these industries face and provide best-of-breed solutions to meet their needs.  

Together with Arista Networks, Nextro delivers advanced switches and comprehensive network solutions that provide the security, reliability, and performance needed to safeguard critical infrastructure. By leveraging Arista’s innovative networking solutions, organisations can enhance their resilience against cybersecurity threats, ensuring the continued operation and security of the services we rely on daily.  

To learn more about how Arista’s solutions can elevate your network, operations, and security, get in touch with the Nextro team today. We are ready to help you implement the right best-of-breed solutions to optimise the operation of your critical infrastructure while at the same time meeting your security needs. Nextro is a certified and trained Arista Networks partner.   

The post Elevate critical infrastructure networks with Nextro and Arista appeared first on Nextro.

]]>
OT environments are facing increasing cyber attacks https://nextro.nz/ot-environments-are-facing-increasing-cyber-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=ot-environments-are-facing-increasing-cyber-attacks Sun, 18 Aug 2024 23:07:59 +0000 https://nextro.nz/?p=5137 OT environments are facing increasing cyber attacks According to a recent global survey released by Fortinet, 31% of organisations with OT environments reported over six intrusions in the past year, a significant increase from the 11% reported the previous year.    This alarming finding shows that despite growing efforts and investments to bolster their security posture,...

The post OT environments are facing increasing cyber attacks appeared first on Nextro.

]]>
OT environments are facing increasing cyber attacks

According to a recent global survey released by Fortinet, 31% of organisations with OT environments reported over six intrusions in the past year, a significant increase from the 11% reported the previous year.   

This alarming finding shows that despite growing efforts and investments to bolster their security posture, organisations still face significant challenges when securing integrated IT/OT environments. 

In this article, we cover the main OT cybersecurity challenges highlighted by Fortinet’s 2024 State of Operational Technology and Cybersecurity Report and provide some insights on the best practices for enhancing your OT security posture.    

Cyber Threats to Operational Technology Environments  

Traditionally kept isolated from other environments, most OT systems were not designed for today’s increased network connectivity. As organisations integrate new digital technologies into their OT environments, security challenges become more complex. 

Threats to OT environments can come from numerous sources, including terrorist groups, disgruntled employees, malicious intruders, natural disasters, actions by insiders, and unintentional actions such as human error or failure to follow established policies and procedures. Attackers are developing more sophisticated tactics and tools to penetrate OT protocols and systems.  

To ensure the safety of their OT systems, organisations must adopt essential tools and capabilities to enhance visibility and protection across the entire network, reducing the time for attack detection and response, as well as the overall risk for these environments. 

Key Findings from Fortinet Report 

1. Cyberattacks that compromise OT systems are on the rise. 

This year, 73% of organisations reported intrusions that impacted either OT systems only or both IT and OT systems, a sharp increase from only 49% in 2023. 

Findings also showed an increasing number of organisations experiencing a high volume of intrusions. Over 30% of respondents had six or more intrusions, up from only 11% in 2023. 

2. Email attacks and mobile security breaches are the main attack techniques.   

Phishing and compromised business email were the most common attack types in the last year, affecting 76% and 65% of the organisations. Additionally, ransomware and wiper intrusions saw a spike in activity, rising from 32% in 2023 to over 55% in 2024.  

Cybercriminals’ most common techniques for gaining access to OT environments were mobile security breaches and web compromises.  

These findings highlight the importance of organisations investing in cybersecurity awareness training for their team members, making them a key component of your business’s strategy to fortify your company’s defences.  

3. Organisations have experienced increased damage from intrusions. 

The damages caused by intrusions have also gotten worse for organisations. More than half of respondents (55%) reported degradation of brand awareness due to a successful attack. Findings also showed an increase in organisations that reported lost business-critical data and decreased productivity due to a breach incident.  

Given the rise in attacks and extension of their damages, nearly half (46%) of respondents indicate that they measure success based on the recovery time needed to resume normal operations. That suggests that for many organisations, quickly responding to inevitable attacks may be a more realistic target to measure their cyber resilience success.  

4. Organisations have a more mature OT security posture  

As OT threats become more sophisticated, the report suggests that most organisations still have blind spots in their environment. While there has been a decrease in organisations claiming to have complete visibility of their OT activities within central cybersecurity operations compared to the previous years, the number of organisations reporting that they have 75% visibility increased. This suggests that organisations are gaining a more realistic understanding of their security posture and becoming more aware of their blind spots.  

5. OT Cybersecurity has become a high-rank responsibility 

The percentage of organisations aligning OT security with the CISO increased to 27% this year, compared to 17% in 2023.  

Findings also indicate a growing trend of transferring OT responsibility to other C-suite roles, such as the CIO, CTO, and COO, with an expected increase to about 60% in the next 12 months. This indicates a clear concern for OT security and risk in 2024 and beyond. 

Also, in organisations where the CIO is not responsible, these responsibilities are shifted from the Director of Network Engineering to the Vice President of Operations role, illustrating another escalation of responsibility. 

This elevation into the executive ranks indicates that OT security is becoming a higher-profile topic and gaining more attention at the board level. 

Best practices to enhance OT security 

The results of the Fortinet report show us the urgent need for effective security measures. 

Based on these findings, the Nextro team has compiled the best practices to address OT security challenges and strengthen its security posture.   

Implement network segmentation 

To minimise intrusions, it’s crucial to establish a fortified OT environment with robust network policy controls at every access point. This defensible architecture begins with creating distinct network zones or segments. Additionally, teams should assess the complexity of managing these solutions and consider the advantages of an integrated or platform-based approach with centralised management capabilities. 

Enhance Visibility and Apply Compensating Controls for OT Assets 

Visibility into all assets on the OT network is essential. Once visibility is achieved, organisations must protect any vulnerable OT devices with purpose-built compensating controls. These controls should include protocol-aware network policies, system interaction analysis, and endpoint monitoring to detect and prevent the compromise of sensitive OT assets.  

Integrate OT into Security Operations and Incident Response 

Organisations should integrate OT considerations into their overall SecOps and incident response plans. This involves creating playbooks that specifically address the OT environment, ensuring comprehensive incident management and response. 

Utilise OT-Specific Threat Intelligence and Security Services 

Effective OT security relies on timely awareness and precise analysis of emerging threats. Organisations should ensure their threat intelligence and content sources are rich with OT-specific information, enhancing their ability to respond to imminent risks accurately. 

Adopt a Platform Approach to Security Architecture 

To tackle the dynamic nature of OT threats and the growing attack surface, organisations often deploy numerous security solutions from various vendors, leading to complexity. A platform-based approach can streamline this by consolidating vendors and simplifying the security architecture. A robust platform designed to safeguard both IT and OT environments enables solution integration, improving security efficacy and allowing centralised management to boost efficiency. 

With the rise of more sophisticated and complex OT security threats, organisations must adopt comprehensive and proactive cybersecurity strategies to safeguard their OT environments. 

At Nextro, we stand at the forefront of cybersecurity innovation, offering best-of-breed solutions specifically designed to protect OT and IT infrastructure effectively. Our solutions enable organisations to enhance their security and mitigate risks.  

If you would like to learn more about safeguarding your OT network, or have general networking or cybersecurity questions, please get in touch with the Nextro team today. 

To download your copy of the Fortinet 2024 State of Operational Technology and Cybersecurity here.

The post OT environments are facing increasing cyber attacks appeared first on Nextro.

]]>
Harnessing AI solutions for security, operational efficiency, and health and safety compliance  https://nextro.nz/harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance https://nextro.nz/harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance/#comments Fri, 21 Jun 2024 03:56:59 +0000 https://nextro.nz/?p=5020 Harnessing AI solutions for security, operational efficiency, and health and safety compliance  The rise of artificial intelligence (AI) has sparked both excitement over its potential and concerns about its risks. As AI technology continues to evolve, various industries around the globe are exploring its potential applications.   AI, which includes machine learning (ML), deep learning (DL),...

The post Harnessing AI solutions for security, operational efficiency, and health and safety compliance  appeared first on Nextro.

]]>
Harnessing AI solutions for security, operational efficiency, and health and safety compliance 

The rise of artificial intelligence (AI) has sparked both excitement over its potential and concerns about its risks. As AI technology continues to evolve, various industries around the globe are exploring its potential applications.  

AI, which includes machine learning (ML), deep learning (DL), and rule-based expert systems (RBES), has the potential to revolutionise the security, operations, and health and safety of critical infrastructure, industrial sites, retail, and other industries.  

At Nextro, we are already leveraging AI, ML and video analytics to help our customers gain operational leverage and efficiency.  

In this blog post, the Nextro team shares some of its learnings to date, and takes an in-depth look at the benefits of leveraging artificial intelligence and machine learning video analytics solutions to enhance physical security, operational efficiency, as well as health and safety compliance.  

Enhancing Physical Security with AI  

AI physical security applications enable security teams to perform their duties more efficiently and accurately across large datasets. Some well-known examples include:  

  • Video Analytics: AI can analyse real-time video feeds to quickly identify unusual activities from people or vehicles such as loitering or intrusion, allowing security operators to focus on other tasks, increasing overall efficiency.  
  • Face Recognition: AI systems can use biometric data to locate or recognise a person in real-time or from video archives. This is especially useful for law enforcement, retail crime prevention, or VIP use cases. It also can be used to generate highly-accurate dwell-time statistics 
  • People Counting: Automating the counting of people in airports, train stations, stadia, large-footprint retail environments, and businesses aids in managing occupancy, monitoring queues, and alerting staff when necessary. This data assists in enhancing crowd control and understanding peak travel times in transit.  
  • Traffic Flow Management: Using advanced AI technology, traffic flow is effectively managed at large venues, hospitals, and city areas. The system detects backups, promptly alerts staff to any issues, and seamlessly re-routes traffic or adjusts signage as needed to ensure optimal flow.  
  • License Plate Recognition: Recognising license plates assists in investigations and enables touchless parking payment systems.  
  • Object Detection: AI is used to detect objects to secure perimeters at critical infrastructure facilities, prevent smuggling in correctional facilities, and identify left luggage or bomb threats at airports and train stations.  
  • Data Integration: AI systems have the capability to seamlessly integrate with diverse data sources including airport baggage systems, logistics systems, and smart building systems. This integration allows for the analysis, prediction, and proactive response to specific business situations. The data can also be seamlessly outputted to an enterprises own data lake and business intelligence systems for further analysis and reporting.  

Securing critical infrastructure and industrial sites from intrusion, theft, and sabotage is just the initial measure to safeguard production and operations. Sustaining ongoing operations also depends on a strategic and proactive approach to operational efficiency, adhering to health and safety regulations, and ensuring compliance with regulatory requirements.  

AI’s Role in Enhancing Health and Safety  

AI-powered solutions offer far more than traditional methods to minimise disruptions, improve operational efficiency, and enhance health and safety procedures. From risk assessment to accident prevention, AI is reshaping how companies approach and implement health and safety practices.  

AI & Video Analytics Systems for Enhanced Safety Compliance  

The new generation of network cameras, thermal sensors, and access control systems, when paired with AI and analytics technologies, efficiently collect and analyse vast amounts of data. This results in faster and more effective safety interventions, not just in real-time events, but also for future protection, raising the bar for long-term site health and safety procedures.  

Key Applications: 

  • Personal Protective Equipment (PPE) Detection: AI can detect and confirm the presence or absence of required PPE, enabling workplaces to issue corrective actions and link to access control systems to prevent site access without proper PPE.  
  • Restricted Area Monitoring: AI helps prevent incidents in restricted areas and confined spaces. Sensors can trigger equipment shutdowns and alert operations when detecting a person within a risk zone.  
  • Early Fire Detection: AI supports fire detection with early recognition of smoke and fire, allowing prompt action.  
  • Man-Down Detection: Analytics monitor the working environment for slips, falls, or collapses, mitigating risks in lone-worker scenarios and enabling swift response to incidents.  
  • Blocked Exit Notification: AI systems, when paired with well-placed cameras, can detect objects blocking emergency exits or evacuation areas and send alerts. This reduces reliance on a human patrol of the back-of-house corridors and emergency egress points, saving time and money and allowing human resources to focus on more important tasks.  
  • Leak Detection: AI monitors pipes, tanks, and equipment, sending alerts regarding potentially dangerous leaks using thermal technology.  
  • Safety Regulations Compliance: AI analytics systems can automatically detect potential safety hazards, such as workers not wearing protective gear/PPE or unauthorised personnel in restricted areas, allowing prompt intervention and corrective actions.  

Utilising AI in High-Risk Sectors 

AI integration in high-risk fields exemplifies its potential to mitigate issues, create safer environments, and revolutionise approaches to challenging tasks in critical industries:  

  • Predictive Maintenance in Manufacturing: AI-driven systems use sensor data and ML algorithms to forecast equipment failures before they occur, enabling proactive maintenance, reducing downtime, and minimising accident risks.  
  • Hazard Detection in Mining: AI-powered drones with advanced sensors and computer vision capabilities can survey mine sites and detect safety hazards, such as unstable terrain or toxic gas leaks, prioritising worker safety and enabling prompt threat response.  

Wearable Devices and Sensors for Worker Health Monitoring  

Specialised wearable devices are indispensable in safeguarding worker health in hazardous environments. In industries like construction, mining, and manufacturing, smart helmets equipped with sensors detect harmful gases, monitor environmental conditions, and assess potential head injuries. These wearables can automatically trigger alerts or emergency responses in case of accidents, ensuring timely assistance and preventing severe consequences. 

Disaster Response and Rescue Operations  

In high-risk situations, such as natural disasters or search-and-rescue operations, AI-powered drones and robots aid first responders in assessing situations, locating survivors, and navigating hazardous environments. These technologies enable more effective disaster response and help protect the safety of rescue teams.  

AI has significantly impacted workplace security and safety through its practical applications, paving the way for a future where protection and progress are intrinsically linked. The adoption of AI for health and safety in the workplace marks a significant shift in today’s organisations. AI-driven solutions offer predictive maintenance, real-time risk assessments, virtual reality training, and wearable devices to enhance workplace safety, mitigate risks, and boost productivity.  

By identifying safety hazards and empowering workers with AI-driven insights, organisations can foster a culture of prevention, creating a collaborative work environment where technology complements human capabilities.  

If you want to know more about how to use artificial intelligence, machine learning and camera analytics to safeguard your organisation, dramatically increase operational efficiencies, surface up business insights, and improve health and safety compliance, please get in touch with the Nextro team now.   

Sources: https://itbrief.com.au/story/ai-in-physical-security-opportunities-risks-and-responsibility
https://www.thedigitalspeaker.com/transformative-role-ai-revolutionising-workplace-health-safety/

The post Harnessing AI solutions for security, operational efficiency, and health and safety compliance  appeared first on Nextro.

]]>
https://nextro.nz/harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance/feed/ 1