Nextro https://nextro.nz/ Managed Telecommunications, Network & Security Solutions NZ Tue, 24 Jun 2025 21:15:54 +0000 en-NZ hourly 1 https://wordpress.org/?v=6.8.1 https://nextro.nz/wp-content/uploads/2020/05/cropped-image001-32x32.png Nextro https://nextro.nz/ 32 32 The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence https://nextro.nz/the-genetec-cloudrunners-revolutionary-mapping-transforming-anpr-investigations-through-geographic-intelligence/?utm_source=rss&utm_medium=rss&utm_campaign=the-genetec-cloudrunners-revolutionary-mapping-transforming-anpr-investigations-through-geographic-intelligence Wed, 04 Jun 2025 02:31:10 +0000 https://nextro.nz/?p=6082 Read Nextro’s insight on how Genetec’s precision-based mapping and collaborative camera networks are reshaping vehicle-centric investigations

The post The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence appeared first on Nextro.

]]>
The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence

Read Nextro’s insight on how Genetec’s precision-based mapping and collaborative camera networks are reshaping vehicle-centric investigations

Genetec has fundamentally transformed how security professionals conduct vehicle-centric investigations with the introduction of advanced mapping capabilities and collaborative camera discovery for the Genetec Cloudrunner. These enhancements represent more than incremental improvements—they constitute a paradigm shift in ANPR investigation methodology, enabling unprecedented precision and collaborative reach across partner networks.

Precision Geographic Investigations Replace Manual Camera Selection

Traditional ANPR investigations required security operators to manually select cameras based on naming conventions, creating significant potential for oversight and inefficiency. The Genetec Cloudrunner’s new precision-based mapping eliminates this limitation through intelligent geographic search capabilities. The polygon tool within the Vehicle-Centric Investigation System (VCIS) allows investigators to define exact search areas on interactive maps, automatically including all relevant cameras within the selected region.

This geographic approach proves particularly valuable for complex facilities such as airports and ports, where camera networks span extensive areas with varied naming conventions. Rather than attempting to identify relevant cameras through potentially confusing asset names, investigators can simply draw their area of interest and immediately access all available vehicle reads within that geographic boundary. The system provides instant visual feedback, displaying read counts per camera and comprehensive tile views of all detected vehicles.

Collaborative Camera Networks Expand Investigative Reach

The Genetec Cloudrunner’s most significant advancement lies in its collaborative camera discovery and partnership capabilities. The new ‘Cameras’ tab reveals three distinct categories of available cameras: organisational cameras, existing partner cameras, and potential partner cameras marked as ‘discoverable’ by their tenant owners. This transparency enables investigators to identify gaps in coverage and opportunities for enhanced collaboration.

The streamlined partnership request process transforms what previously required complex negotiations into simple administrative workflows. When investigators identify relevant partner cameras during active investigations, they can flag potential partnerships directly to system administrators, who can then submit access requests efficiently. This capability proves invaluable for incidents spanning multiple jurisdictions or facilities, enabling seamless investigative continuity across organisational boundaries.

Real-World Applications in Critical Infrastructure

For New Zealand’s interconnected infrastructure networks, the Cloudrunner’s mapping capabilities deliver immediate operational benefits. Consider a security incident originating at an Airport and extending through surrounding commercial areas—investigators can now track vehicle movements seamlessly across partner camera networks without manual coordination delays. The geographic search tools ensure comprehensive coverage whilst collaborative features enable rapid access to additional camera resources.

Similarly, port security operations benefit from the ability to define precise perimeter searches and identify vehicle patterns across extended facility boundaries. The mapping interface provides intuitive visualisation of vehicle behaviours and movement patterns, enabling security teams to identify reconnaissance activities, track suspicious vehicles, and analyse operational trends with unprecedented clarity.

Enhanced Investigative Workflows and Pattern Analysis

The Cloudrunner’s mapping integration transforms investigative workflows by combining geographic precision with comprehensive vehicle data analysis. Investigators can apply multiple filters—including number plate characteristics, vehicle colour, and type—within specific geographic boundaries, immediately visualising results through both map displays and detailed tile views. This integrated approach enables rapid identification of target vehicles and comprehensive analysis of their movement patterns over time.

The ability to track driving behaviours and patterns across geographic regions provides valuable intelligence for both immediate investigations and long-term security planning. Security professionals can identify recurring patterns, potential vulnerabilities, and suspicious activities that might otherwise remain undetected through traditional investigation methods.

Strategic Implementation for Maximum Effectiveness

Organisations implementing the Genetec Cloudrunner’s advanced mapping capabilities should prioritise camera discoverability settings and partnership strategies. The collaborative features function optimally when camera networks are appropriately configured for discovery and partnership requests, enabling maximum investigative reach across regional security communities.

The polygon search tools require minimal training but deliver substantial efficiency improvements, particularly for organisations managing extensive camera networks across large geographic areas. Security teams should consider integrating these mapping capabilities with existing investigation protocols to maximise operational benefits whilst maintaining comprehensive documentation standards.

The Evolution of Collaborative Security Intelligence

The Genetec Cloudrunner’s mapping advancements represent the future of collaborative security operations, where geographic intelligence and partnership networks combine to create comprehensive investigative capabilities. As these technologies mature, organisations that embrace collaborative ANPR networks will possess significant advantages in incident response, pattern recognition, and community-wide security coordination.

For security professionals managing critical infrastructure, commercial facilities, or transport networks, the Cloudrunner’s enhanced mapping capabilities offer immediate opportunities to improve investigative efficiency whilst building stronger collaborative relationships across the security community.

Discover how Genetec the Cloudrunner’s new advanced mapping capabilities can transform your security investigations. Contact Nextro’s specialists to explore implementation opportunities.

The post The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence appeared first on Nextro.

]]>
The State of AI in Video Surveillance: Industry Perspectives 2025 https://nextro.nz/the-state-of-ai-in-video-surveillance-industry-perspectives-2025/?utm_source=rss&utm_medium=rss&utm_campaign=the-state-of-ai-in-video-surveillance-industry-perspectives-2025 Tue, 13 May 2025 04:52:30 +0000 https://nextro.nz/?p=5957 In this Nextro analysis, we set out key insights from Axis Communications’ 2025 report on AI in video surveillance. As an Axis Gold Partner and trusted strategic technology partner for many New Zealand businesses, we know that understanding these trends is crucial for our clients seeking to enhance their security posture and gain operational efficiencies.

The post The State of AI in Video Surveillance: Industry Perspectives 2025 appeared first on Nextro.

]]>
AI Transforming Security, Safety and Business Intelligence

In this Nextro analysis, we set out key insights from Axis Communications’ 2025 report on AI in video surveillance. As an Axis Gold Partner and trusted strategic technology partner for many New Zealand businesses, we know that understanding these trends is crucial for our clients seeking to enhance their security posture and gain operational efficiencies.

Key Industry Trends Identified

The comprehensive report reveals nine critical insights that are shaping the future of AI in surveillance:

  1. AI Adoption Surging Globally – With notable differences between markets, we’re seeing accelerated adoption in countries like the US, Japan, Singapore, and parts of Europe.
  2. Cloud and Edge AI Acceleration – A hybrid approach that combines edge processing with cloud scalability is emerging as the preferred solution, something that we at Nextro have been implementing for our forward-thinking clients.
  3. Integration of Diverse Data Sources – Combining video with audio and environmental data is creating richer, more actionable intelligence.
  4. Growing Use of Facial Recognition – Despite varying adoption rates due to regional privacy regulations, facial recognition continues to expand with responsible implementation.
  5. New Business Intelligence Opportunities – AI is transforming cameras into powerful data-generating sensors that deliver significant ROI beyond security.
  6. Integration Challenges – There’s often a gap between customer expectations and actual AI capabilities, highlighting the importance of working with experienced providers like Nextro.
  7. Partnership Importance – Collaboration between developers, integrators, and end-users is crucial for successful implementation.
  8. Responsible AI Practices – Ethical considerations, privacy, and data security are becoming central concerns, areas where Nextro maintains the highest standards.
  9. Future Trends – Generative AI, smarter AI pipelines, and IoT convergence are set to transform the industry further.

Responsible AI: A Critical Focus:

The report emphasises that responsible AI practices are essential, highlighting:

  • The need for human oversight in AI decision-making.
  • Transparency as a prerequisite for building trust.
  • Data privacy and security as major concerns.
  • The importance of preventing bias in AI systems.

What This Means for Nextro Clients

At Nextro, we’re committed to implementing these insights in our solutions. We believe in:

  • Building systems that enhance human capabilities and provide them with force-multiplying capabilities.
  • Maintaining transparency about what our AI systems can and cannot do.
  • Protecting your data with robust privacy and security measures.
  • Monitoring and testing to ensure that our systems remain fair and unbiased.

As your strategic partner, we are focused on delivering AI-powered surveillance solutions that not only improve security but that also deliver operational efficiencies and provide valuable business intelligence and insights.

For more information, explore our AI Video Surveillance Solutions.

Want to learn how these AI trends can benefit your organisation? Contact our Nextro team today for a consultation on implementing AI surveillance solutions that are tailored to your needs.

The state of AI in video surveillance source report



The post The State of AI in Video Surveillance: Industry Perspectives 2025 appeared first on Nextro.

]]>
Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience https://nextro.nz/fortinets-global-security-awareness-and-training-report-key-insights-for-building-cyber-resilience/?utm_source=rss&utm_medium=rss&utm_campaign=fortinets-global-security-awareness-and-training-report-key-insights-for-building-cyber-resilience Sun, 27 Apr 2025 23:27:17 +0000 https://nextro.nz/?p=5816 Fortinet’s recent Security Awareness and Training Report highlights the growing impact of AI-driven cyber threats. Discover how Nextro’s managed training service helps organisations build a stronger, more resilient workforce and meet evolving security and compliance requirements

The post Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience appeared first on Nextro.

]]>
Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience

In an increasingly AI-driven world, cybersecurity is no longer just a technology challenge, it is a human one. Fortinet’s 2024 Security Awareness and Training Global Research Report reveals how business leaders worldwide are rethinking their approach to employee cyber awareness in response to rapidly evolving threats. At Nextro, we believe that cybersecurity starts with people. Here’s what you need to know from the latest global research and why building a cyber-smart workforce has never been more important.

AI-Driven Threats Are Reshaping the Risk Landscape

62% of organisations expect that employees will fall victim to more cyberattacks due to cybercriminals’ malicious use of AI.
Threat actors are increasingly using AI to create deepfakes, hyper-targeted phishing emails, and other sophisticated attacks that are harder for individuals to detect.

Key findings:

  • 95% of organisations are actively using or exploring AI-powered security solutions.
  • 80% say that growing awareness of AI-driven attacks has increased internal support for security awareness programmes.
  • Despite this, 31% of organisations still do not manage or monitor employee use of AI applications, creating significant policy gaps.

At Nextro, we see this as a critical reminder that technology alone is not enough. Strong internal policies, supported by education and training, are vital for managing AI-related risks.

Security Awareness Training Is Now a Strategic Priority

Training is no longer a box-ticking exercise. It is a core component of building organisational resilience. Fortinet’s report highlights a growing maturity in how leaders are delivering and planning training:

  • 81% of organisations believe that a minimum of three hours of security awareness training per employee per year is needed.
  • 75% of programmes are now pre-planned and delivered monthly or quarterly for maximum impact.
  • 89% of organisations report that they have seen a measurable improvement in their security posture after implementing awareness training.
  • Top training topics include phishing prevention, data security, and data privacy, all critical areas as cybercriminal tactics continue to evolve.

However, engagement remains a challenge. Among organisations dissatisfied with their programmes, 41% cited a lack of engaging content as a major issue.

Compliance, Risk, and Culture: A Unified Approach

Security awareness initiatives are increasingly being driven by:

  • Past incidents (52%)
  • Corporate sponsorship (21%)
  • Compliance and regulatory obligations (13%)

Leaders also recognise that they need to go further. 94% are interested in introducing stricter cybersecurity policies for high-risk user groups.

These findings reinforce a key Nextro belief that cybersecurity must be embedded into an organisation’s culture, not treated as an add-on. Awareness training, clear policies, and regular reinforcement must work together to build lasting resilience.

Final Thoughts

The 2024 report makes it clear that organisations investing in security awareness are better positioned to defend against both traditional and AI-enhanced threats. But successful programmes require more than good intentions. They demand strategic planning, engaging content, and executive sponsorship.

At Nextro, we deliver Fortinet Security Awareness and Training as a fully managed, turnkey service, helping businesses build cyber resilience from the inside out.

For more information, visit Security Awareness Training on our website.

If you are ready to strengthen your human firewall,
Talk to us about how we can help build a smarter, stronger, and safer workforce.

The post Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience appeared first on Nextro.

]]>
Using AI to Enhance Worker Safety on the Factory Floor https://nextro.nz/using-ai-to-enhance-worker-safety-on-the-factory-floor/?utm_source=rss&utm_medium=rss&utm_campaign=using-ai-to-enhance-worker-safety-on-the-factory-floor Wed, 16 Apr 2025 12:10:31 +0000 https://nextro.nz/?p=5752 Using AI to Enhance Worker Safety on the Factory Floor In today’s dynamic industrial environments, ensuring worker safety is more important than ever. Traditional safety protocols remain essential, but they don’t always keep pace with the real-time challenges and complexities of modern manufacturing, warehousing, or logistics. Enter Nextro partner Hanwha Vision’s Factory & Safety AI...

The post Using AI to Enhance Worker Safety on the Factory Floor appeared first on Nextro.

]]>
Using AI to Enhance Worker Safety on the Factory Floor
In today’s dynamic industrial environments, ensuring worker safety is more important than ever. Traditional safety protocols remain essential, but they don’t always keep pace with the real-time challenges and complexities of modern manufacturing, warehousing, or logistics. Enter Nextro partner Hanwha Vision’s Factory & Safety AI Pack — an advanced AI-powered solution designed to proactively improve worker safety and reduce incident risks on the factory floor.

Proactive Safety Monitoring with AI

The Factory & Safety AI Pack integrates seamlessly with Nextro supplied surveillance systems to deliver real-time monitoring and alerting of critical safety indicators. Key features include:

  • Forklift and Personnel Distance Detection
    The system continuously tracks forklift and worker movement, triggering alerts when unsafe distances are detected — helping to prevent collisions and near misses.
  • Speed and Parking Compliance
    Forklift speeds are monitored to ensure drivers stay within safe limits. The system also detects incorrect or hazardous parking practices, prompting immediate action to restore safe and efficient operations.
  • Slip and Fall Detection
    Using deep learning, the AI can identify slip and fall incidents as they happen, enabling quick response to reduce the severity of injuries and potential downtime.
  • Blocked Exit Monitoring
    Emergency exits are monitored to ensure they remain clear at all times. This helps sites meet obligations under New Zealand’s Health and Safety at Work Act 2015, ensuring rapid evacuation routes in the event of an emergency.

Supporting Smarter Operations

In addition to preventing injuries, the AI pack also improves operational efficiency:

  • Heatmaps and Queue Management
    High-traffic zones and queue lengths are monitored and visualised through heatmaps — allowing operations teams to adjust layouts and minimise congestion.
  • Customisable Alerts and Detection Zones
    Safety managers can fine-tune detection areas, thresholds, and alerts to suit the layout and risk profile of each facility, ensuring a tailored safety approach.

Streamlined Compliance and Reporting

Keeping track of safety performance is easier with automated event logs (straight in to Genetec or Milestone) and reporting. All incidents and alerts are documented, helping Australian and New Zealand businesses maintain transparent safety records and continuously improve performance — key components of meeting WorkSafe New Zealand and OSHA requirements.

Final Thoughts

Hanwha Vision’s Factory & Safety AI Pack is a smart step forward in workplace safety for New Zealand’s industrial sector. By leveraging AI-driven analytics, factories can proactively reduce risks, increase operational efficiency, and support compliance with New Zealand’s health and safety legislation.

Ready to enhance safety in your facility? Talk to the team at Nextro about deploying smart surveillance and AI to build a safer, smarter work environment.

The post Using AI to Enhance Worker Safety on the Factory Floor appeared first on Nextro.

]]>
Why IoT Matters in Physical Security https://nextro.nz/why-iot-matters-in-physical-security/?utm_source=rss&utm_medium=rss&utm_campaign=why-iot-matters-in-physical-security Mon, 14 Apr 2025 04:20:39 +0000 https://nextro.nz/?p=5725 The Internet of Things (IoT) is transforming the way we connect, monitor, and optimise security infrastructure. With a projected 30 billion IoT devices in use by 2030, organisations are increasingly leveraging these technologies to enhance efficiency, security, and data-driven decision-making. In this article Nextro and Genetec explore how the Industrial Internet of Things (IIoT) is...

The post Why IoT Matters in Physical Security appeared first on Nextro.

]]>
The Internet of Things (IoT) is transforming the way we connect, monitor, and optimise security infrastructure. With a projected 30 billion IoT devices in use by 2030, organisations are increasingly leveraging these technologies to enhance efficiency, security, and data-driven decision-making.

In this article Nextro and Genetec explore how the Industrial Internet of Things (IIoT) is driving digital transformation in enterprise security—examining its distinction from consumer IoT, real-world applications in building automation, and its pivotal role in Industry 4.0, cloud adoption, and future-ready infrastructure.

A key subset of IoT is IIoT, which focuses on enterprise and industrial applications. Unlike consumer IoT—such as smart speakers and home automation—IIoT connects sensors, monitoring tools, and systems within businesses to streamline operations and improve physical security. With the global IIoT market expected to reach $1.74 trillion USD by 2030, this technology is a fundamental driver of the next industrial revolution.

What is IoT, and How Does It Differ from IIoT?

IoT refers to a network of interconnected devices that exchange data via the internet or other networks. This ecosystem includes everything from everyday smart devices to complex industrial security systems. IIoT, on the other hand, is specifically designed for enterprise environments, ensuring reliability, security, and efficiency in industrial processes.

Examples of IIoT applications include integrating video surveillance and access control with lighting and HVAC systems to improve automation and sustainability. Such implementations help organisations enhance building management and security while reducing operational costs.

Industry 4.0 and the Role of IIoT

We are currently in the Industry 4.0 era, where automation, AI, and IIoT are shaping the modern industrial landscape. This follows Industry 3.0, which introduced digital electronics and automation, and precedes Industry 5.0, which emphasises human-machine collaboration.

Forward-thinking businesses are adopting Industry 4.0 principles to improve resilience, streamline processes, and deliver superior customer experiences. By integrating IIoT technologies and AI-driven security solutions, companies are enhancing security, efficiency, and real-time decision-making.

Cloud Computing and IIoT Growth

The rapid adoption of IIoT is largely driven by cloud computing, which enables secure access to critical data from anywhere. Hybrid work models have accelerated this shift, requiring organisations to deploy flexible, cloud-connected security systems.

Cloud applications provide scalable data processing, storage, and analytics capabilities. Hybrid-cloud architecture solutions allow IT and security teams to modernise infrastructure while maintaining existing sensors and devices. This eliminates previous barriers to IIoT adoption and enhances operational agility.

Strengthening IIoT Cybersecurity

As the number of connected devices grows, so do cybersecurity risks. However, the perception that cloud-based solutions lack security is outdated. Leading cloud platforms now offer built-in cybersecurity tools that automate threat detection and compliance management, reducing the burden on IT teams.

To maximise IIoT’s benefits while ensuring security, businesses must invest in solutions that integrate cybersecurity from the outset. This includes encryption, access controls, and continuous monitoring to mitigate potential vulnerabilities.

Unifying IIoT Systems for Data-Driven Insights

Managing hundreds or thousands of IIoT sensors is only effective if organisations can process and analyse the generated data efficiently. Open-architecture and unified platforms bring together diverse security and operational systems, enabling seamless integration and automation.

For example, businesses can unify video surveillance, access control, and intrusion detection into a single system. Additional integrations—such as intercoms, building management, and automatic licence plate recognition—further enhance security and operational intelligence.

Real-World Applications of IIoT in Security

Organisations worldwide are using IIoT to enhance physical security and efficiency. Some notable examples include:

  • Automating HVAC Airflow in Airports: Airports can use IIoT-enabled video analytics to adjust airflow in crowded areas, improving passenger comfort while reducing energy consumption.
  • Sound Detection for Safety in Public Restrooms: Schools and universities can deploy IIoT-based sound detection to identify potential safety incidents, triggering alerts when distress words like “help” are detected.
  • Illegal Dumping Detection in Cities: Cities can integrate IIoT cameras and motion detection to identify and address illegal dumping, leading to faster enforcement and reduced violations.
  • Temperature Monitoring in Critical Areas: Hospitals and data centres can use IIoT sensors to monitor temperature-sensitive areas, ensuring compliance and preventing damage to valuable assets.
  • Automating Building Controls for Sustainability: Organisations can link access control systems with building management to reduce energy consumption, activating heating, cooling, and lighting only when needed.

Unlocking the Potential of IIoT with Nextro

At Nextro, we help businesses harness the power of IIoT to create smarter, more secure environments. By integrating cloud computing, AI-driven analytics, and unified security solutions, we empower organisations to enhance security, efficiency, and sustainability.

The future of physical security lies in connected, intelligent systems that adapt to evolving threats and operational needs. With IIoT, businesses can unlock new efficiencies, automate critical processes, and make data-driven decisions with confidence.

Ready to explore how Nextro can deploy IIoT to transform your security strategy? Contact Nextro today.

See source material

https://www.genetec.com/blog/products/why-iot-matters-in-physical-security

The post Why IoT Matters in Physical Security appeared first on Nextro.

]]>
Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks https://nextro.nz/enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks Sun, 16 Mar 2025 22:00:06 +0000 https://nextro.nz/?p=5661 Lockdown procedures are a critical security measure against Marauding Terrorist Attacks (MTAs). In this article, Nextro explores key insights from the UK’s CPNI on implementing effective lockdowns, highlighting strategies, challenges, and best practices for businesses and security teams in New Zealand and Australia. Stay prepared—learn how to safeguard your site.

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>

Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks

In an era of evolving security threats, preparedness is key to mitigating risks and protecting lives. The Supplementary Guidance: Lockdown document, developed by the UK’s Centre for the Protection of National Infrastructure (CPNI), provides critical insights on how organisations can implement lockdown procedures to prevent and delay Marauding Terrorist Attacks (MTAs).

This is highly relevant for New Zealand and Australia in the wake of the Bondi Westfield terror attack in 2024, the New Lynn Auckland stabbings in 2021 and the Christchurch, New Zealand Mosque shootings in 2019.

In this article, Nextro summarises the key takeaways from the UK guidance, and explores the considerations businesses, security teams, and PCBUs must take into account when planning for an emergency lockdown at their site or crowded place.

Understanding Lockdown and Its Importance

What is Lockdown?

Lockdown refers to the practice of securing entry points by locking doors and barriers to restrict access. It is a strategic response to prevent or delay attackers from reaching potential victims. The document also refers to this as “dynamic lockdown”, as it involves rapid implementation depending on the situation.

Key characteristics of a lockdown:

  • It can be applied to an entire site or specific zones.
  • It involves physical security measures such as locked doors, turnstiles, and barriers.
  • It aims to minimise casualties by slowing down or deterring attackers.

Why is Lockdown Important?

Data from previous terror incidents, such as the 2017 London Bridge and Borough Market attacks and the 2019 Christchurch Mosque shootings, have shown that most fatalities occur within the first few minutes—before law enforcement arrives. Implementing a well-planned lockdown can reduce casualties significantly by:

  • Preventing attackers from entering a secure zone.
  • Keeping people from running into danger unknowingly.
  • Buying critical time for emergency responders to arrive.

However, lockdowns must be implemented with caution. A poorly planned lockdown can increase risks, especially if it traps victims with attackers or creates dangerous bottlenecks.

Planning for an Effective Lockdown

Key Considerations

Before implementing a lockdown plan, organisations should assess:

  1. The effectiveness of lockdown – Will it delay the attacker and protect people?
  2. Potential risks – Could it unintentionally trap people in danger?
  3. Lockdown feasibility – Are existing security systems capable of enforcing lockdown?
  4. Triggering conditions – What circumstances should lead to a lockdown?
  5. Infrastructure investment – Do additional security measures need to be implemented?

Implementation Methods

There is no one-size-fits-all approach to lockdowns. The guidance outlines multiple methods:

1. Centralised Lockdown Management

  • Utilises an Automated Access Control System (AACS) to remotely lock and unlock doors.
  • Can be controlled from a Security Control Room (SCR).
  • Provides a coordinated, immediate response.

2. Automated Lockdown

  • Uses attack detection systems (e.g., gunshot detectors) to automatically trigger lockdown.
  • Minimises human intervention, but requires a highly reliable system to avoid false alarms.

3. Manual Lockdown

  • Relies on security personnel or staff to physically lock doors using keys, panic buttons, or chains.
  • Best suited for smaller sites but can be slow in execution.

4. Partial Lockdown

  • Locks only specific entry points, leaving some exits open for evacuation.
  • Useful for shopping centres, offices, and large venues where full lockdown may not be practical.

5. Two-Way Lockdown

  • Doors are locked from both sides, preventing entry and exit.
  • Can be dangerous if people need to evacuate quickly.

6. One-Way Lockdown

  • Doors can only be opened from one side, allowing people to escape but preventing entry.
  • A safer approach that ensures emergency exits remain accessible.

Empowering Security and Front-Line Personnel

Lockdown procedures are only effective if security and front-line personnel are trained and prepared. The guidance emphasises:

  • Empowering staff to initiate lockdowns without waiting for approval.
  • Installing panic buttons for immediate response.
  • Monitoring lockdown integrity to prevent breaches.
  • Using public address (PA) systems to announce lockdown status.

Common Planning Challenges and Solutions

When designing lockdown strategies, several challenges arise.
The guidance provides recommendations for handling these scenarios:

Challenge

Recommended Approach

Large crowds running towards a building

Decide whether to grant them access or maintain lockdown to prevent attackers from entering.

Attack happening near the site

Establish a clear proximity threshold for initiating lockdown.

Attack occurring inside the site

Consider locking down specific zones rather than the entire site to allow safe evacuation.

People wanting to leave a locked area

Establish protocols for controlled exit in extreme circumstances.

Fire emergencies during lockdown

Ensure fire safety compliance and integrate lockdown with fire evacuation plans.

Police and emergency services access

Create clear procedures for law enforcement entry without compromising security.

Final Thoughts: Preparing for the Worst-Case Scenario

The Marauding Terrorist Attack Lockdown Guidance provides a comprehensive roadmap for organisations to plan, implement, and refine their lockdown procedures. While lockdowns can be an effective life-saving measure, they require careful planning, training, and legal consideration to ensure they don’t create new risks.

For businesses, security teams, and public institutions, this guide serves as a reminder that preparedness is key. By understanding when and how to use lockdown effectively, organisations can significantly improve their resilience against terrorist threats.

Key Takeaways

✔ Lockdown is an effective security measure but must be tailored to each site.
✔ Poorly planned lockdowns can increase risks rather than reduce them.
✔ Training and empowering personnel is crucial for effective lockdown implementation.
✔ Legal compliance is essential to avoid conflicts with fire safety and human rights laws.
✔ Regular testing and drills should be conducted to refine procedures.

By following these guidelines, organisations can develop robust lockdown strategies that save lives in the event of a MTA.

ProtectUK – Protective Security Advice and Guidance

NZ Police – Protect Your Crowded Place

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>
Genetec enhances Security Center SaaS with the addition of intrusion management https://nextro.nz/genetec-enhances-security-center-saas-with-the-addition-of-intrusion-management/?utm_source=rss&utm_medium=rss&utm_campaign=genetec-enhances-security-center-saas-with-the-addition-of-intrusion-management Sun, 09 Mar 2025 21:11:28 +0000 https://nextro.nz/?p=5637 Genetec enhances Security Center SaaS with the addition of intrusion management New functionality enhances real-time threat detection, verification, and automated response. Genetec Inc. the global leader in enterprise physical security software, recently announced the addition of intrusion management to Security Center SaaS, the company’s unified physical security solution that can be deployed in the cloud or as...

The post Genetec enhances Security Center SaaS with the addition of intrusion management appeared first on Nextro.

]]>

Genetec enhances Security Center SaaS with the addition of intrusion management

New functionality enhances real-time threat detection, verification, and automated response.

Genetec Inc. the global leader in enterprise physical security software, recently announced the addition of intrusion management to Security Center SaaS, the company’s unified physical security solution that can be deployed in the cloud or as a hybrid solution. By unifying intrusion detection with video surveillance, access control, identity, and visitor management, Security Center SaaS through Nextro now delivers a fully unified, open, cloud-managed platform supported by the Genetec Cloudlink line of appliances. Security Center SaaS will support a wide range of intrusion devices from multiple vendors, starting with Bosch intrusion panels.

Unified intrusion management

Automated intrusion management eliminates reliance on manual processes, reducing errors and ensuring systems are automatically armed when needed. Operators can configure automated schedules, enforce badge-based activation, and apply first-in, last-out logic to keep facilities protected 24/7 without adding operational complexity. By integrating intrusion with business workflows, companies can focus on their core operations while maintaining a secure environment.

Real-time threat verification and response

Security Center SaaS intrusion management helps security teams act quickly by validating alarms/alerts in real time with video verification, which eliminates uncertainty and reduces unnecessary disruptions. When a real threat is detected, automated workflows can immediately lock doors, activate deterrents, and notify the appropriate personnel based on predefined escalation paths. By minimising false alarms and focusing on real threats, end-users can enhance their security posture while reducing the impact on daily operations, ensuring faster decision-making and more effective responses.

Proactive security measures

In addition to real-time detection, Security Center SaaS intrusion management provides automated reporting and dynamic system alerts to help organisations identify vulnerabilities before they become critical issues. With comprehensive event logging, organisations can ensure compliance and maintain a solid foundation for auditing. 

Operational efficiency

An open approach to intrusion panel support in Security Center SaaS not only enhances security but also improves operational efficiency. By centralising intrusion event data on intuitive dashboards, teams gain real-time visibility that empowers faster, more informed decisions. This immediate access to critical information feeds into automated reporting, which tracks trends in alarms and response times, enabling teams to uncover valuable insights for continuous improvement.

“Security Center SaaS continues to push the boundaries of what’s possible. With the introduction of intrusion management, we are delivering on our vision of a fully unified, open, and cloud-managed platform. This empowers organisations to detect, verify, and respond to threats with greater speed and confidence,” said Christian Morin, Vice President Product Engineering at Genetec Inc.

Availability and hardware support

The intrusion panel feature for Security Center SaaS will be available in New Zealand in mid-2025 through Nextro. Built on an open architecture and supported by the Genetec Cloudlink line of multi-workload cloud-managed appliances, Security Center SaaS will support Bosch intrusion panels at launch, with plans to expand compatibility through additional technology partnerships. This open approach enables customers to choose the hardware that best fits their needs or retain their existing panels, providing a cost-effective and flexible path to modernising their physical security operations.

For more information about Security Center SaaS, its new intrusion management capabilities, and how they will benefit your business, contact us today.

The post Genetec enhances Security Center SaaS with the addition of intrusion management appeared first on Nextro.

]]>
Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report https://nextro.nz/navigating-the-future-of-security-nextros-summary-of-top-physical-security-trends-for-2025-from-the-genetec-report/?utm_source=rss&utm_medium=rss&utm_campaign=navigating-the-future-of-security-nextros-summary-of-top-physical-security-trends-for-2025-from-the-genetec-report Thu, 06 Mar 2025 08:44:17 +0000 https://nextro.nz/?p=5615 Explore Nextro’s breakdown of the top physical security trends for 2025, based on Genetec’s latest report. From cyber-physical security convergence and AI advancements to hybrid-cloud adoption and data-driven decision-making, stay ahead of emerging threats. Learn how these trends are shaping security in New Zealand and how Nextro can help.

The post Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report appeared first on Nextro.

]]>

Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report

The security landscape is constantly evolving. Staying ahead of the curve is crucial for businesses in New Zealand.

In this insight, we’ll explore the key physical security trends to watch in 2025, drawing insights from Genetec’s State of Physical Security Report 2025. These trends include the increasing convergence of cyber and physical security, a wider adoption of hybrid-cloud models, a rise in data-driven decision-making, and the innovative use of AI.

1. Cybersecurity Takes Centre Stage

Cyber threats are on the rise, and businesses are responding by strengthening their cybersecurity measures. Genetec’s report reveals that 71% of businesses prioritised educating employees about cybersecurity best practices in 2024, compared to 61% in 2023. Additionally, 51% focused on refining user permissions and privileges, while 47% prioritised securing data storage.

The convergence of cyber and physical security is undeniable. IT departments are playing an increasingly influential role in physical security decisions, highlighting the need for seamless collaboration between these two critical areas.

2. Converged Security: Bridging the Gap Between Physical and Cyber

The boundaries between physical and cyber security are becoming increasingly intertwined, and businesses are recognising the need for a unified approach. Genetec’s State of Physical Security Report 2025 reveals a significant rise in the awareness and implementation of cybersecurity practices.

This shift is driven by the understanding that physical security systems are now deeply reliant on digital infrastructure. As a result, IT departments are playing a more influential role in managing and securing these systems, leading to greater collaboration between IT and security professionals.

  • IT influence: Genetec’s report reveals that IT departments consistently rank above physical security departments in terms of involvement in buying decisions. In 2024, 51% of IT professionals prioritised deploying cybersecurity tools, compared to 27% of security and safety professionals. This highlights the growing influence of IT in physical security decisions.

This convergence of physical and cyber security is vital for building a robust security strategy that addresses the evolving threat landscape and protects businesses from both internal and external risks

3. Cloud Adoption Meets Reality

Cloud adoption in physical security has recently slowed down. A recent report found that globally, 38% of businesses already have over a quarter of their physical security deployment in a cloud or hybrid-cloud environment, which is a 6% decrease from last year.

 In New Zealand specifically, 62% of businesses have reported that they are not currently using any cloud for their physical security environments, partially due to the lack of local data centre infrastructure in the region.

Businesses are trending toward taking a more cautious approach, opting for hybrid deployments that balance the benefits of cloud scalability with the control of on-premises infrastructure. Those looking to fully migrate to the cloud are doing so by moving individual workloads to the cloud in an incremental fashion, minimising risk.

  •  Data Security and Control: Concerns about data loss and control remain prevalent, particularly in the physical security domain. Businesses are keen on ensuring the security and integrity of their sensitive data while migrating to the cloud.  
  • Long-term Outlook: Despite the slowdown, the long-term outlook for cloud adoption in physical security remains positive. As technology evolves and addresses concerns around cost and security, businesses will continue to explore hybrid-cloud solutions to enhance their security infrastructure.

4. Access Control and Video Surveillance Remain Paramount

For the fifth consecutive year, access control is the top priority for physical security departments. Video surveillance is a close second.

Genetec’s Physical Security Report 2025 emphasises the continued importance of access control and video surveillance in 2025. End users are looking to expand the functionalities of their access control systems, with 41% showing interest in visitor management, 39% in biometrics, and 37% in identity management.

For video surveillance, the focus is on replacing or updating cameras and video management systems (VMS) to incorporate new technologies like higher quality video, streamlined VMS interfaces, and intelligent video analytics.  

In 2024, many businesses implemented unified security solutions, integrating their access control and video surveillance systems. This has helped streamline security operations, enabling teams to manage both systems from a single platform, leading to improved efficiency and enhanced overall security. This trend is expected to continue into 2025 as businesses increasingly seek integrated solutions to optimise their security management.

5. The Rise of Data-Driven Decision-making

Businesses are gathering, using, and sharing security data to improve physical security and business operations.

Genetec’s Physical Security Report 2025 identifies a growing trend of using security data for strategic decision-making. Both end users and consultants recognise the increasing use of this data across key departments. Executive leaders view this data as crucial for achieving business objectives, emphasising the strategic value of physical security data.

What can data-driven decision-making improve?

  • Situational Awareness: Real-time data and analytics can provide a comprehensive view of the security landscape, enabling quicker response times and proactive threat mitigation.  
  • Enhanced Operational Efficiency: Data-driven insights can help optimise security operations, reduce manual tasks, and improve resource allocation.  
  • Reduced Security Risks: By analysing data trends and patterns, businesses can identify potential vulnerabilities and proactively address them, minimising security risks.  
  • Better Decision Making: Access to accurate and timely data empowers informed decision-making, enabling businesses to align security strategies with business objectives and optimise resource allocation.  
  • ROI: By leveraging security data for operational insights and business intelligence, businesses can maximise the value of their security investments and demonstrate a return on investment (ROI).  

6. Harnessing the Power of AI

The integration of artificial intelligence (AI) into physical security systems is a promising development. Businesses are exploring how AI can help streamline and automate security operations with 37% of businesses planning to explore the integration of AI in their physical security systems, an increase of 27% over 2024.

While the report acknowledges the potential of AI in physical security, it also notes that 27% of businesses are unsure how to deploy AI effectively. This uncertainty highlights the need for greater understanding and training on AI applications in physical security.

Despite this, those already using AI see its value in streamlining and automating security operations, particularly in tasks like automatically triggering events of interest, automating emergency response dispatch, and forecasting future threats.

7. Pragmatism and Value-Driven Solutions

In 2025, the physical security industry is demonstrating pragmatism and a renewed focus on operational excellence. Businesses are prioritising projects that enhance security and efficiency without introducing unnecessary complexity or costs.  

This trend involves:

  • Seeking reliable, value-driven solutions that enhance security without unnecessary complexity or costs.  
  • Focusing on technology that meets day-to-day needs while tracking innovative technology for future implementation.  
  • Looking for real-world solutions that improve work and efficiency within budget constraints.  
  • Prioritising hybrid-cloud deployments and a measured approach to finding strong use cases for new technology.  
  • Focusing on ways to adopt new technology into existing infrastructure to improve operations, increase cyber resiliency, and deliver physical security more cost-efficiently.

At Nextro, we’re passionate about securing New Zealand and empowering New Zealand’s top businesses to thrive in a secure environment. Our expertise extends beyond physical security, encompassing a holistic approach that integrates cyber resilience and proactive risk management.

We leverage the latest technologies and industry best practices to fortify your organisation’s defences, safeguard your assets, and protect your people. Our team collaborates closely with you to develop tailored security strategies that align with your business objectives and address your unique challenges.

Whether you’re looking to enhance your access control systems, upgrade your video surveillance, or implement a comprehensive cybersecurity strategy, Nextro is your trusted partner.

Ready to elevate your converged security posture and unlock your business potential? Contact us today to explore how Nextro can help you achieve your converged security goals.

To download the full State of Physical Security Report 2025 

The post Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report appeared first on Nextro.

]]>
Nextro Achieves Fortinet SD-WAN Specialisation https://nextro.nz/nextro-achieves-fortinet-sdwan-specialisation/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-achieves-fortinet-sdwan-specialisation Tue, 04 Mar 2025 01:29:58 +0000 https://nextro.nz/?p=5584 Nextro has announced that it has proudly achieved Fortinet’s Secure SD-WAN Specialisation, demonstrating its commitment to delivering advanced and secure networking solutions to businesses across New Zealand and Australia. Nextro’s in-depth knowledge of Fortinet’s Secure SD-WAN technology, combined with its extensive experience in cybersecurity, enables the company to provide comprehensive solutions that meet the specific needs of its clients.

The post Nextro Achieves Fortinet SD-WAN Specialisation appeared first on Nextro.

]]>

Nextro Achieves Fortinet SD-WAN Specialisation

The Fortinet Secure SD-WAN Specialisation solidifies Nextro’s position as a leader in secure networking solutions.

Auckland, New Zealand, 5 March 2025 – Nextro, the New Zealand-headquartered network, cybersecurity and physical security provider, today announced that it has proudly achieved Fortinet’s Secure SD-WAN Specialisation, demonstrating its commitment to delivering advanced and secure networking solutions to businesses across New Zealand and Australia.

This specialisation recognises Nextro’s expertise in deploying Fortinet Secure SD-WAN, showcasing and validating its capability to enhance network security while optimising client performance. As a key player in cybersecurity, Nextro continues to ensure that businesses are equipped with the tools that they need to navigate the complexities of today’s digital landscape.

“Achieving the Fortinet Secure SD-WAN Specialisation is a significant milestone for our team and a deserved validation of their experience and capabilities. It not only reflects our dedication to offering the best in network security, but also positions us to further support our clients in protecting their digital environments, assets, and critical infrastructure,” said Martyn Levy, Nextro’s Managing Director.      

Nextro’s in-depth knowledge of Fortinet’s Secure SD-WAN technology, combined with its extensive experience in cybersecurity, enables the company to provide comprehensive solutions that meet the specific needs of its clients. This includes secure connectivity, optimised application performance, and simplified management – all while reducing costs and enhancing security.

“Nextro has consistently demonstrated its ability to deliver innovative and secure networking solutions. We are excited to see how their expertise in Fortinet’s Secure SD-WAN technology will benefit their clients and contribute to the overall cybersecurity landscape across Australia and New Zealand,” said Nick Frantzen, Service Creation Manager at Fortinet New Zealand.

In a fast-paced industry, specialisations focused on market opportunities enabled by the Fortinet Engage Partner Program help partners be recognised and valued by current and potential customers as trusted advisors who have the expertise, services and technologies they need to meet their digital acceleration needs.

With this specialisation, Nextro is now positioned to offer even greater value to its clients, helping them stay ahead in an increasingly challenging cybersecurity environment. The Fortinet specialisation means that Nextro understands convergence and the value of maximising a secure networking approach for digital acceleration for customers.   

Click here for more information on Nextro’s SD-WAN offering.

A wall of Fortinet firewall boxes from one of Nextro’s recent 40+ site SD-WAN deployments.

A wall of Fortinet firewall boxes from one of Nextro’s recent 50+ site SD-WAN deployments.

The post Nextro Achieves Fortinet SD-WAN Specialisation appeared first on Nextro.

]]>
Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management https://nextro.nz/nextro-and-fortinet-partner-to-enhance-cybersecurity-with-24-7-socaas-monitoring-and-incident-management/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-and-fortinet-partner-to-enhance-cybersecurity-with-24-7-socaas-monitoring-and-incident-management Sun, 23 Feb 2025 22:22:25 +0000 https://nextro.nz/?p=5534 Nextro and Fortinet have partnered to provide affordable 24/7 Security Operations Centre as a Service (SOCaaS) for businesses in Australia and New Zealand. Nextro's solution, powered by Fortinet, offers continuous network monitoring, advanced threat detection, expert analysis, and regulatory compliance to enhance cybersecurity resilience without the high costs of traditional SOCs.

The post Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management appeared first on Nextro.

]]>
Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management

Having a firewall in place is essential, but it is only one part of a comprehensive cybersecurity strategy. The real question is: who is actively monitoring your network around the clock for suspicious activity, irregular traffic patterns, and potential security threats?

Large enterprises, multinational corporations, and government organisations can afford dedicated Security Operations Centres (SOCs) to monitor and respond to cyber threats in real time. However, for most businesses, the cost of maintaining such a service in-house is prohibitive.

In Australia and New Zealand, many businesses and critical infrastructure sites have firewalls and edge security solutions in place, yet they lack continuous network monitoring. This is often due to the perceived high costs and complexity involved, despite the recognition that ongoing surveillance is crucial for robust cybersecurity.

Introducing Nextro’s SOCaaS Solution

Nextro has partnered with Fortinet to offer an affordable and scalable Security Operations Centre as a Service (SOCaaS) tailored for businesses across Australia and New Zealand. This service is designed to provide 24/7 monitoring and security management for:

  • Corporate networks
  • Building services networks (BSN)
  • Operational Technology (OT) networks

𝟮𝟰/𝟳 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 – Detect and respond to threats in real-time to minimise impact.

  • Continuous surveillance for potential security risks
  • Rapid response to minimise damage
  • Proactive threat detection to stay ahead of attackers

𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗧𝗵𝗿𝗲𝗮𝘁 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 – Leverage behavioural analytics and anomaly detection to counter evolving cyber risks.

  • AI-driven security for real-time threat identification
  • Behavioural analysis to detect unusual activities
  • Adaptive security to mitigate emerging cyber threats

𝗘𝘅𝗽𝗲𝗿𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 – Get insights and recommendations from skilled analysts to enhance your cybersecurity.

  • Access to cybersecurity experts for in-depth analysis
  • Actionable insights to strengthen security posture
  • Tailored recommendations to address vulnerabilities

𝗥𝗲𝗴𝘂𝗹𝗮𝘁𝗼𝗿𝘆 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 – Stay compliant by continuously monitoring and addressing security issues.

  • Meet industry standards and regulatory requirements
  • Proactive risk management to avoid compliance violations
  • Ongoing assessments to maintain security best practices

With Nextro’s SOCaaS, businesses of all sizes can enhance their cybersecurity resilience without the high costs associated with traditional SOC solutions.
Contact us today to learn how we can help protect your business from cyber threats.

The post Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management appeared first on Nextro.

]]>