Nextro https://nextro.nz/ Managed Telecommunications, Network & Security Solutions NZ Wed, 23 Jul 2025 02:41:10 +0000 en-NZ hourly 1 https://wordpress.org/?v=6.8.2 https://nextro.nz/wp-content/uploads/2020/05/cropped-image001-32x32.png Nextro https://nextro.nz/ 32 32 Why New Zealand CISOs Must Embrace Operational Technology Security Platforms https://nextro.nz/why-new-zealand-cisos-must-embrace-operational-technology-security-platforms/?utm_source=rss&utm_medium=rss&utm_campaign=why-new-zealand-cisos-must-embrace-operational-technology-security-platforms Wed, 23 Jul 2025 02:41:05 +0000 https://nextro.nz/?p=6239 As New Zealand’s critical infrastructure and industrial assets become increasingly digitised, cybersecurity risks tied to operational technology (OT) environments continue to rise. In light of these evolving threats, CISOs must rethink their priorities. This Nextro insight explores why embracing an OT security platform is essential for aligning with strategic goals like vendor consolidation and IT/OT convergence.

The post Why New Zealand CISOs Must Embrace Operational Technology Security Platforms appeared first on Nextro.

]]>
Why New Zealand CISOs Must Embrace Operational Technology Security Platforms

As New Zealand’s critical infrastructure and industrial assets become increasingly digitised, cybersecurity risks tied to operational technology (OT) environments continue to rise.

In light of these evolving threats, CISOs must rethink their priorities. This Nextro insight explores why embracing an OT security platform is essential for aligning with strategic goals like vendor consolidation and IT/OT convergence.

From Overlooked to Essential: OT in the CISO’s Domain

Traditionally, OT environments were not the primary concern for CISOs. However, the convergence of IT and OT systems is transforming this paradigm. As IT teams are increasingly tasked with securing OT assets, many face unfamiliar protocols and legacy technologies. This has forced a rethink of traditional IT security policies that were never designed with physical safety and production continuity in mind.

OT Security Demands Outpacing Resources

The ongoing skills shortage across cybersecurity and network roles is magnified in OT, where specialised knowledge is critical. Historically underfunded and overlooked, OT teams are now overwhelmed. Increased cyberattacks have accelerated demand for better protection.

The Platform Advantage

A dedicated OT security platform provides a scalable, centralised solution to secure both IT and OT systems. By extending existing IT platforms into OT environments, CISOs can reduce the need for niche tools and personnel. This approach enables the implementation of zero-trust architecture across the board, streamlines security management, and supports the creation of unified IT/OT Security Operations Centres (SOCs).

Taming Vendor Sprawl

The rise of specialised OT security vendors has created a complex landscape. An OT platform helps simplify this challenge by enabling vendor consolidation. Platforms with built-in capabilities, from initial infrastructure connections to OT-specific security operations (SecOps), support long-term programme maturity.

Optimising IT/OT Convergence

A Fortinet OT platform bridges IT and OT security practices, allowing CISOs to optimise budgets and workforce allocation. With most organisations already running mature IT platforms, the key to convergence lies in selecting the right OT platform that complements existing systems while meeting operational demands

At Nextro, we understand the unique cybersecurity demands of industrial operations in New Zealand. As a trusted partner for converged IT and OT security solutions, we help New Zealand businesses implement integrated OT security platforms that align with strategic goals and strengthen cyber resilience.

Conclusion: A Platform Strategy for Resilience

As cybersecurity leadership in New Zealand expands to include OT risk, CISOs must align their strategies with the dual goals of reducing vendor complexity and achieving IT/OT convergence. A Fortinet OT security platform offers the flexibility, scalability, and integrated intelligence needed to secure the nation’s critical operations against an increasingly aggressive threat landscape.

Ready to secure your OT environment and simplify your vendor landscape? Talk to the team at Nextro today to explore how our Fortinet platform-led security solutions can support your digital and operational priorities.

The post Why New Zealand CISOs Must Embrace Operational Technology Security Platforms appeared first on Nextro.

]]>
Navigating the 2025 Cyber Threat Landscape https://nextro.nz/navigating-the-2025-cyber-threat-landscape/?utm_source=rss&utm_medium=rss&utm_campaign=navigating-the-2025-cyber-threat-landscape Wed, 23 Jul 2025 02:40:15 +0000 https://nextro.nz/?p=6247 The 2025 Fortinet Global Threat Landscape Report paints a stark picture of an increasingly aggressive and sophisticated cyber threat environment.

The post Navigating the 2025 Cyber Threat Landscape appeared first on Nextro.

]]>
Navigating the 2025 Cyber Threat Landscape

The 2025 Fortinet Global Threat Landscape Report paints a stark picture of an increasingly aggressive and sophisticated cyber threat environment.

With automation, artificial intelligence, and commoditised cybercrime tools at their disposal, threat actors are moving faster than ever. For New Zealand organisations, particularly those in critical infrastructure and cloud-first sectors, the shift to proactive cybersecurity is no longer optional, it is imperative.

Automation is Fuelling a Surge in Reconnaissance

In 2024, cybercriminals ramped up automated reconnaissance efforts, with global scan volumes rising by 16.7%. These scans, often using tools like SIPVicious and targeting protocols like SIP and Modbus TCP, were used to map exposed digital assets before organisations had a chance to patch vulnerabilities.

AI and CaaS are Supercharging Cybercrime

Artificial intelligence has now become a staple in the cybercrime toolkit. Threat actors are deploying AI-powered tools like FraudGPT and ElevenLabs to generate phishing content, deepfake videos, and synthetic voices. Combined with the rise of Cybercrime-as-a-Service (CaaS), which offers everything from stolen credentials to Initial Access Broker services, the barrier to entry for attackers has never been lower.

Exploitation at Scale: From Initial Access to Persistent Threats

Despite no significant drop in the time it takes to exploit vulnerabilities (remaining near a 5.4-day average), the scale of attacks surged, with over 97 billion exploitation attempts recorded in 2024. Common targets included IoT devices, firewalls, and routers, which are often exploited for lateral movement or botnet control.

Stealth Tactics Post-Breach

Post-exploitation behaviours are increasingly stealthy, with attackers using legitimate Windows utilities and encrypted C2 channels to evade detection. Techniques such as DCShadow and RDP-based lateral movement are growing more common, particularly in attacks involving ransomware or espionage.

Cloud Remains a Soft Target

The cloud remains a primary battleground. Misconfigurations, over-permissioned identities, and exposed APIs continue to allow attackers easy entry.

Telemetry from FortiCNAPP revealed that in 70% of cloud compromise incidents, identity misuse from unfamiliar geographies was a key indicator. Attackers often move laterally within cloud environments using legitimate services for cover.

Stealth Tactics Post-Breach

The report underscores the need for Continuous Threat Exposure Management (CTEM). NZ CISOs must move beyond traditional threat detection and embrace proactive strategies such as adversary emulation, attack surface monitoring, and automated patch prioritisation. With threat actors operating at machine speed, cyber defence must do the same.

Nextro’s Call to Action for New Zealand

For organisations across New Zealand, especially those operating in sectors like energy, transport, education, and government, the findings of the 2025 Threat Landscape Report are a pressing reminder that traditional defences are no longer sufficient. With automated reconnaissance now occurring at a rate of 36,000 scans per second globally, it’s not a question of ‘if’ a vulnerability will be found, but ‘when’.

Nextro works with New Zealand enterprises to anticipate and mitigate cyber risk before adversaries strike. Our team implements solutions aligned with Continuous Threat Exposure Management (CTEM), enabling your organisation to simulate real-world threats, prioritise patching based on risk, and reduce your attack surface in cloud, hybrid and OT environments.

Whether you’re facing legacy IoT challenges, cloud misconfigurations, or targeted phishing campaigns staff, Nextro can help you take back control of your cyber terrain. Our partnerships with global leaders like Fortinet give you the insight, tools, and support to operate securely at speed.

Ready to shift left and reduce your risk? Contact the Nextro team today to assess your threat exposure.

The post Navigating the 2025 Cyber Threat Landscape appeared first on Nextro.

]]>
Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™  https://nextro.nz/genetec-enhances-digital-evidence-management-with-ai-powered-scene-redaction-in-clearance/?utm_source=rss&utm_medium=rss&utm_campaign=genetec-enhances-digital-evidence-management-with-ai-powered-scene-redaction-in-clearance Wed, 23 Jul 2025 02:36:43 +0000 https://nextro.nz/?p=6256 Nextro is proud to highlight the latest innovation from our strategic partner Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions. Genetec has announced a major enhancement to its digital evidence management system, Genetec Clearance™, with the addition of Scene Redaction, an AI-powered capability that significantly accelerates the process of preparing video evidence for sharing.

The post Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™  appeared first on Nextro.

]]>

Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™ 

Nextro is proud to highlight the latest innovation from our strategic partner Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions. Genetec has announced a major enhancement to its digital evidence management system, Genetec Clearance™, with the addition of Scene Redaction, an AI-powered capability that significantly accelerates the process of preparing video evidence for sharing.

A Major Step Forward for Video Redaction

Traditional manual redaction is often slow and labour-intensive, especially when dealing with large volumes of footage involving multiple individuals and moving elements. With Scene Redaction, Genetec Clearance leverages advanced AI and machine learning to identify people in a scene and automatically apply blurring, dramatically reducing the time and effort required by investigators and privacy officers.

“Redacting video evidence to protect privacy is both a legal obligation and a practical challenge for organisations around the world. Scene Redaction allows users to do this with unprecedented speed and consistency,” said Samir Sinha, Product Group Director at Genetec Inc.

Built for Public and Private Sector Needs

Genetec Clearance is already trusted by public safety agencies, police, retailers, and private enterprises across New Zealand and internationally. This new redaction capability is particularly relevant for local government, education providers, security firms, and other organisations subject to Privacy Act 2020 obligations in New Zealand.

As privacy regulations become more stringent and public scrutiny of video surveillance increases, the need for reliable and efficient redaction tools is more critical than ever. Scene Redaction ensures compliance without slowing down operations.

Seamless Integration with Existing Workflows

Clearance users can access Scene Redaction directly within the platform’s intuitive interface. It complements the system’s existing redaction tools, which allow for manual redaction or blurring based on facial recognition, and works across footage from various sources, including body-worn cameras, fixed surveillance, and mobile devices.

At Nextro, we see this as a game-changing advancement for businesses across New Zealand. Whether you’re managing critical infrastructure, safeguarding schools, or coordinating a public safety response, this update to Genetec Clearance delivers powerful tools to ensure evidence integrity and individual privacy, fast.

Want to Know More?

To learn how Genetec Clearance™ with Scene Redaction can support your organisation’s evidence management and compliance workflows, contact the Nextro team today.
We’re here to help New Zealand businesses and agencies harness the latest in secure, privacy-forward technologies.

The post Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™  appeared first on Nextro.

]]>
The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence https://nextro.nz/the-genetec-cloudrunners-revolutionary-mapping-transforming-anpr-investigations-through-geographic-intelligence/?utm_source=rss&utm_medium=rss&utm_campaign=the-genetec-cloudrunners-revolutionary-mapping-transforming-anpr-investigations-through-geographic-intelligence Wed, 04 Jun 2025 02:31:10 +0000 https://nextro.nz/?p=6082 Read Nextro’s insight on how Genetec’s precision-based mapping and collaborative camera networks are reshaping vehicle-centric investigations

The post The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence appeared first on Nextro.

]]>
The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence

Read Nextro’s insight on how Genetec’s precision-based mapping and collaborative camera networks are reshaping vehicle-centric investigations

Genetec has fundamentally transformed how security professionals conduct vehicle-centric investigations with the introduction of advanced mapping capabilities and collaborative camera discovery for the Genetec Cloudrunner. These enhancements represent more than incremental improvements—they constitute a paradigm shift in ANPR investigation methodology, enabling unprecedented precision and collaborative reach across partner networks.

Precision Geographic Investigations Replace Manual Camera Selection

Traditional ANPR investigations required security operators to manually select cameras based on naming conventions, creating significant potential for oversight and inefficiency. The Genetec Cloudrunner’s new precision-based mapping eliminates this limitation through intelligent geographic search capabilities. The polygon tool within the Vehicle-Centric Investigation System (VCIS) allows investigators to define exact search areas on interactive maps, automatically including all relevant cameras within the selected region.

This geographic approach proves particularly valuable for complex facilities such as airports and ports, where camera networks span extensive areas with varied naming conventions. Rather than attempting to identify relevant cameras through potentially confusing asset names, investigators can simply draw their area of interest and immediately access all available vehicle reads within that geographic boundary. The system provides instant visual feedback, displaying read counts per camera and comprehensive tile views of all detected vehicles.

Collaborative Camera Networks Expand Investigative Reach

The Genetec Cloudrunner’s most significant advancement lies in its collaborative camera discovery and partnership capabilities. The new ‘Cameras’ tab reveals three distinct categories of available cameras: organisational cameras, existing partner cameras, and potential partner cameras marked as ‘discoverable’ by their tenant owners. This transparency enables investigators to identify gaps in coverage and opportunities for enhanced collaboration.

The streamlined partnership request process transforms what previously required complex negotiations into simple administrative workflows. When investigators identify relevant partner cameras during active investigations, they can flag potential partnerships directly to system administrators, who can then submit access requests efficiently. This capability proves invaluable for incidents spanning multiple jurisdictions or facilities, enabling seamless investigative continuity across organisational boundaries.

Real-World Applications in Critical Infrastructure

For New Zealand’s interconnected infrastructure networks, the Cloudrunner’s mapping capabilities deliver immediate operational benefits. Consider a security incident originating at an Airport and extending through surrounding commercial areas—investigators can now track vehicle movements seamlessly across partner camera networks without manual coordination delays. The geographic search tools ensure comprehensive coverage whilst collaborative features enable rapid access to additional camera resources.

Similarly, port security operations benefit from the ability to define precise perimeter searches and identify vehicle patterns across extended facility boundaries. The mapping interface provides intuitive visualisation of vehicle behaviours and movement patterns, enabling security teams to identify reconnaissance activities, track suspicious vehicles, and analyse operational trends with unprecedented clarity.

Enhanced Investigative Workflows and Pattern Analysis

The Cloudrunner’s mapping integration transforms investigative workflows by combining geographic precision with comprehensive vehicle data analysis. Investigators can apply multiple filters—including number plate characteristics, vehicle colour, and type—within specific geographic boundaries, immediately visualising results through both map displays and detailed tile views. This integrated approach enables rapid identification of target vehicles and comprehensive analysis of their movement patterns over time.

The ability to track driving behaviours and patterns across geographic regions provides valuable intelligence for both immediate investigations and long-term security planning. Security professionals can identify recurring patterns, potential vulnerabilities, and suspicious activities that might otherwise remain undetected through traditional investigation methods.

Strategic Implementation for Maximum Effectiveness

Organisations implementing the Genetec Cloudrunner’s advanced mapping capabilities should prioritise camera discoverability settings and partnership strategies. The collaborative features function optimally when camera networks are appropriately configured for discovery and partnership requests, enabling maximum investigative reach across regional security communities.

The polygon search tools require minimal training but deliver substantial efficiency improvements, particularly for organisations managing extensive camera networks across large geographic areas. Security teams should consider integrating these mapping capabilities with existing investigation protocols to maximise operational benefits whilst maintaining comprehensive documentation standards.

The Evolution of Collaborative Security Intelligence

The Genetec Cloudrunner’s mapping advancements represent the future of collaborative security operations, where geographic intelligence and partnership networks combine to create comprehensive investigative capabilities. As these technologies mature, organisations that embrace collaborative ANPR networks will possess significant advantages in incident response, pattern recognition, and community-wide security coordination.

For security professionals managing critical infrastructure, commercial facilities, or transport networks, the Cloudrunner’s enhanced mapping capabilities offer immediate opportunities to improve investigative efficiency whilst building stronger collaborative relationships across the security community.

Discover how Genetec the Cloudrunner’s new advanced mapping capabilities can transform your security investigations. Contact Nextro’s specialists to explore implementation opportunities.

The post The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence appeared first on Nextro.

]]>
The State of AI in Video Surveillance: Industry Perspectives 2025 https://nextro.nz/the-state-of-ai-in-video-surveillance-industry-perspectives-2025/?utm_source=rss&utm_medium=rss&utm_campaign=the-state-of-ai-in-video-surveillance-industry-perspectives-2025 Tue, 13 May 2025 04:52:30 +0000 https://nextro.nz/?p=5957 In this Nextro analysis, we set out key insights from Axis Communications’ 2025 report on AI in video surveillance. As an Axis Gold Partner and trusted strategic technology partner for many New Zealand businesses, we know that understanding these trends is crucial for our clients seeking to enhance their security posture and gain operational efficiencies.

The post The State of AI in Video Surveillance: Industry Perspectives 2025 appeared first on Nextro.

]]>
AI Transforming Security, Safety and Business Intelligence

In this Nextro analysis, we set out key insights from Axis Communications’ 2025 report on AI in video surveillance. As an Axis Gold Partner and trusted strategic technology partner for many New Zealand businesses, we know that understanding these trends is crucial for our clients seeking to enhance their security posture and gain operational efficiencies.

Key Industry Trends Identified

The comprehensive report reveals nine critical insights that are shaping the future of AI in surveillance:

  1. AI Adoption Surging Globally – With notable differences between markets, we’re seeing accelerated adoption in countries like the US, Japan, Singapore, and parts of Europe.
  2. Cloud and Edge AI Acceleration – A hybrid approach that combines edge processing with cloud scalability is emerging as the preferred solution, something that we at Nextro have been implementing for our forward-thinking clients.
  3. Integration of Diverse Data Sources – Combining video with audio and environmental data is creating richer, more actionable intelligence.
  4. Growing Use of Facial Recognition – Despite varying adoption rates due to regional privacy regulations, facial recognition continues to expand with responsible implementation.
  5. New Business Intelligence Opportunities – AI is transforming cameras into powerful data-generating sensors that deliver significant ROI beyond security.
  6. Integration Challenges – There’s often a gap between customer expectations and actual AI capabilities, highlighting the importance of working with experienced providers like Nextro.
  7. Partnership Importance – Collaboration between developers, integrators, and end-users is crucial for successful implementation.
  8. Responsible AI Practices – Ethical considerations, privacy, and data security are becoming central concerns, areas where Nextro maintains the highest standards.
  9. Future Trends – Generative AI, smarter AI pipelines, and IoT convergence are set to transform the industry further.

Responsible AI: A Critical Focus:

The report emphasises that responsible AI practices are essential, highlighting:

  • The need for human oversight in AI decision-making.
  • Transparency as a prerequisite for building trust.
  • Data privacy and security as major concerns.
  • The importance of preventing bias in AI systems.

What This Means for Nextro Clients

At Nextro, we believe in:

  • Building systems that enhance human capabilities and provide them with force-multiplying capabilities.
  • Maintaining transparency about what our AI systems can and cannot do.
  • Protecting your data with robust privacy and security measures.
  • Monitoring and testing to ensure that our systems remain fair and unbiased.

As your strategic partner, we are focused on delivering AI-powered surveillance solutions that not only improve security but that also deliver operational efficiencies and provide valuable business intelligence and insights.

For more information, explore our AI Video Surveillance Solutions.

Want to learn how these AI trends can benefit your organisation? Contact our Nextro team today for a consultation on implementing AI surveillance solutions that are tailored to your needs.

The state of AI in video surveillance source report



The post The State of AI in Video Surveillance: Industry Perspectives 2025 appeared first on Nextro.

]]>
Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience https://nextro.nz/fortinets-global-security-awareness-and-training-report-key-insights-for-building-cyber-resilience/?utm_source=rss&utm_medium=rss&utm_campaign=fortinets-global-security-awareness-and-training-report-key-insights-for-building-cyber-resilience Sun, 27 Apr 2025 23:27:17 +0000 https://nextro.nz/?p=5816 Fortinet’s recent Security Awareness and Training Report highlights the growing impact of AI-driven cyber threats. Discover how Nextro’s managed training service helps organisations build a stronger, more resilient workforce and meet evolving security and compliance requirements

The post Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience appeared first on Nextro.

]]>
Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience

In an increasingly AI-driven world, cybersecurity is no longer just a technology challenge, it is a human one. Fortinet’s 2024 Security Awareness and Training Global Research Report reveals how business leaders worldwide are rethinking their approach to employee cyber awareness in response to rapidly evolving threats. At Nextro, we believe that cybersecurity starts with people. Here’s what you need to know from the latest global research and why building a cyber-smart workforce has never been more important.

AI-Driven Threats Are Reshaping the Risk Landscape

62% of organisations expect that employees will fall victim to more cyberattacks due to cybercriminals’ malicious use of AI.
Threat actors are increasingly using AI to create deepfakes, hyper-targeted phishing emails, and other sophisticated attacks that are harder for individuals to detect.

Key findings:

  • 95% of organisations are actively using or exploring AI-powered security solutions.
  • 80% say that growing awareness of AI-driven attacks has increased internal support for security awareness programmes.
  • Despite this, 31% of organisations still do not manage or monitor employee use of AI applications, creating significant policy gaps.

At Nextro, we see this as a critical reminder that technology alone is not enough. Strong internal policies, supported by education and training, are vital for managing AI-related risks.

Security Awareness Training Is Now a Strategic Priority

Training is no longer a box-ticking exercise. It is a core component of building organisational resilience. Fortinet’s report highlights a growing maturity in how leaders are delivering and planning training:

  • 81% of organisations believe that a minimum of three hours of security awareness training per employee per year is needed.
  • 75% of programmes are now pre-planned and delivered monthly or quarterly for maximum impact.
  • 89% of organisations report that they have seen a measurable improvement in their security posture after implementing awareness training.
  • Top training topics include phishing prevention, data security, and data privacy, all critical areas as cybercriminal tactics continue to evolve.

However, engagement remains a challenge. Among organisations dissatisfied with their programmes, 41% cited a lack of engaging content as a major issue.

Compliance, Risk, and Culture: A Unified Approach

Security awareness initiatives are increasingly being driven by:

  • Past incidents (52%)
  • Corporate sponsorship (21%)
  • Compliance and regulatory obligations (13%)

Leaders also recognise that they need to go further. 94% are interested in introducing stricter cybersecurity policies for high-risk user groups.

These findings reinforce a key Nextro belief that cybersecurity must be embedded into an organisation’s culture, not treated as an add-on. Awareness training, clear policies, and regular reinforcement must work together to build lasting resilience.

Final Thoughts

The 2024 report makes it clear that organisations investing in security awareness are better positioned to defend against both traditional and AI-enhanced threats. But successful programmes require more than good intentions. They demand strategic planning, engaging content, and executive sponsorship.

At Nextro, we deliver Fortinet Security Awareness and Training as a fully managed, turnkey service, helping businesses build cyber resilience from the inside out.

For more information, visit Security Awareness Training on our website.

If you are ready to strengthen your human firewall,
Talk to us about how we can help build a smarter, stronger, and safer workforce.

The post Fortinet’s Global Security Awareness and Training Report: Key Insights for Building Cyber Resilience appeared first on Nextro.

]]>
Using AI to Enhance Worker Safety on the Factory Floor https://nextro.nz/using-ai-to-enhance-worker-safety-on-the-factory-floor/?utm_source=rss&utm_medium=rss&utm_campaign=using-ai-to-enhance-worker-safety-on-the-factory-floor Wed, 16 Apr 2025 12:10:31 +0000 https://nextro.nz/?p=5752 Using AI to Enhance Worker Safety on the Factory Floor In today’s dynamic industrial environments, ensuring worker safety is more important than ever. Traditional safety protocols remain essential, but they don’t always keep pace with the real-time challenges and complexities of modern manufacturing, warehousing, or logistics. Enter Nextro partner Hanwha Vision’s Factory & Safety AI...

The post Using AI to Enhance Worker Safety on the Factory Floor appeared first on Nextro.

]]>
Using AI to Enhance Worker Safety on the Factory Floor
In today’s dynamic industrial environments, ensuring worker safety is more important than ever. Traditional safety protocols remain essential, but they don’t always keep pace with the real-time challenges and complexities of modern manufacturing, warehousing, or logistics. Enter Nextro partner Hanwha Vision’s Factory & Safety AI Pack — an advanced AI-powered solution designed to proactively improve worker safety and reduce incident risks on the factory floor.

Proactive Safety Monitoring with AI

The Factory & Safety AI Pack integrates seamlessly with Nextro supplied surveillance systems to deliver real-time monitoring and alerting of critical safety indicators. Key features include:

  • Forklift and Personnel Distance Detection
    The system continuously tracks forklift and worker movement, triggering alerts when unsafe distances are detected — helping to prevent collisions and near misses.
  • Speed and Parking Compliance
    Forklift speeds are monitored to ensure drivers stay within safe limits. The system also detects incorrect or hazardous parking practices, prompting immediate action to restore safe and efficient operations.
  • Slip and Fall Detection
    Using deep learning, the AI can identify slip and fall incidents as they happen, enabling quick response to reduce the severity of injuries and potential downtime.
  • Blocked Exit Monitoring
    Emergency exits are monitored to ensure they remain clear at all times. This helps sites meet obligations under New Zealand’s Health and Safety at Work Act 2015, ensuring rapid evacuation routes in the event of an emergency.

Supporting Smarter Operations

In addition to preventing injuries, the AI pack also improves operational efficiency:

  • Heatmaps and Queue Management
    High-traffic zones and queue lengths are monitored and visualised through heatmaps — allowing operations teams to adjust layouts and minimise congestion.
  • Customisable Alerts and Detection Zones
    Safety managers can fine-tune detection areas, thresholds, and alerts to suit the layout and risk profile of each facility, ensuring a tailored safety approach.

Streamlined Compliance and Reporting

Keeping track of safety performance is easier with automated event logs (straight in to Genetec or Milestone) and reporting. All incidents and alerts are documented, helping Australian and New Zealand businesses maintain transparent safety records and continuously improve performance — key components of meeting WorkSafe New Zealand and OSHA requirements.

Final Thoughts

Hanwha Vision’s Factory & Safety AI Pack is a smart step forward in workplace safety for New Zealand’s industrial sector. By leveraging AI-driven analytics, factories can proactively reduce risks, increase operational efficiency, and support compliance with New Zealand’s health and safety legislation.

Ready to enhance safety in your facility? Talk to the team at Nextro about deploying smart surveillance and AI to build a safer, smarter work environment.

The post Using AI to Enhance Worker Safety on the Factory Floor appeared first on Nextro.

]]>
Why IoT Matters in Physical Security https://nextro.nz/why-iot-matters-in-physical-security/?utm_source=rss&utm_medium=rss&utm_campaign=why-iot-matters-in-physical-security Mon, 14 Apr 2025 04:20:39 +0000 https://nextro.nz/?p=5725 The Internet of Things (IoT) is transforming the way we connect, monitor, and optimise security infrastructure. With a projected 30 billion IoT devices in use by 2030, organisations are increasingly leveraging these technologies to enhance efficiency, security, and data-driven decision-making. In this article Nextro and Genetec explore how the Industrial Internet of Things (IIoT) is...

The post Why IoT Matters in Physical Security appeared first on Nextro.

]]>
The Internet of Things (IoT) is transforming the way we connect, monitor, and optimise security infrastructure. With a projected 30 billion IoT devices in use by 2030, organisations are increasingly leveraging these technologies to enhance efficiency, security, and data-driven decision-making.

In this article Nextro and Genetec explore how the Industrial Internet of Things (IIoT) is driving digital transformation in enterprise security—examining its distinction from consumer IoT, real-world applications in building automation, and its pivotal role in Industry 4.0, cloud adoption, and future-ready infrastructure.

A key subset of IoT is IIoT, which focuses on enterprise and industrial applications. Unlike consumer IoT—such as smart speakers and home automation—IIoT connects sensors, monitoring tools, and systems within businesses to streamline operations and improve physical security. With the global IIoT market expected to reach $1.74 trillion USD by 2030, this technology is a fundamental driver of the next industrial revolution.

What is IoT, and How Does It Differ from IIoT?

IoT refers to a network of interconnected devices that exchange data via the internet or other networks. This ecosystem includes everything from everyday smart devices to complex industrial security systems. IIoT, on the other hand, is specifically designed for enterprise environments, ensuring reliability, security, and efficiency in industrial processes.

Examples of IIoT applications include integrating video surveillance and access control with lighting and HVAC systems to improve automation and sustainability. Such implementations help organisations enhance building management and security while reducing operational costs.

Industry 4.0 and the Role of IIoT

We are currently in the Industry 4.0 era, where automation, AI, and IIoT are shaping the modern industrial landscape. This follows Industry 3.0, which introduced digital electronics and automation, and precedes Industry 5.0, which emphasises human-machine collaboration.

Forward-thinking businesses are adopting Industry 4.0 principles to improve resilience, streamline processes, and deliver superior customer experiences. By integrating IIoT technologies and AI-driven security solutions, companies are enhancing security, efficiency, and real-time decision-making.

Cloud Computing and IIoT Growth

The rapid adoption of IIoT is largely driven by cloud computing, which enables secure access to critical data from anywhere. Hybrid work models have accelerated this shift, requiring organisations to deploy flexible, cloud-connected security systems.

Cloud applications provide scalable data processing, storage, and analytics capabilities. Hybrid-cloud architecture solutions allow IT and security teams to modernise infrastructure while maintaining existing sensors and devices. This eliminates previous barriers to IIoT adoption and enhances operational agility.

Strengthening IIoT Cybersecurity

As the number of connected devices grows, so do cybersecurity risks. However, the perception that cloud-based solutions lack security is outdated. Leading cloud platforms now offer built-in cybersecurity tools that automate threat detection and compliance management, reducing the burden on IT teams.

To maximise IIoT’s benefits while ensuring security, businesses must invest in solutions that integrate cybersecurity from the outset. This includes encryption, access controls, and continuous monitoring to mitigate potential vulnerabilities.

Unifying IIoT Systems for Data-Driven Insights

Managing hundreds or thousands of IIoT sensors is only effective if organisations can process and analyse the generated data efficiently. Open-architecture and unified platforms bring together diverse security and operational systems, enabling seamless integration and automation.

For example, businesses can unify video surveillance, access control, and intrusion detection into a single system. Additional integrations—such as intercoms, building management, and automatic licence plate recognition—further enhance security and operational intelligence.

Real-World Applications of IIoT in Security

Organisations worldwide are using IIoT to enhance physical security and efficiency. Some notable examples include:

  • Automating HVAC Airflow in Airports: Airports can use IIoT-enabled video analytics to adjust airflow in crowded areas, improving passenger comfort while reducing energy consumption.
  • Sound Detection for Safety in Public Restrooms: Schools and universities can deploy IIoT-based sound detection to identify potential safety incidents, triggering alerts when distress words like “help” are detected.
  • Illegal Dumping Detection in Cities: Cities can integrate IIoT cameras and motion detection to identify and address illegal dumping, leading to faster enforcement and reduced violations.
  • Temperature Monitoring in Critical Areas: Hospitals and data centres can use IIoT sensors to monitor temperature-sensitive areas, ensuring compliance and preventing damage to valuable assets.
  • Automating Building Controls for Sustainability: Organisations can link access control systems with building management to reduce energy consumption, activating heating, cooling, and lighting only when needed.

Unlocking the Potential of IIoT with Nextro

At Nextro, we help businesses harness the power of IIoT to create smarter, more secure environments. By integrating cloud computing, AI-driven analytics, and unified security solutions, we empower organisations to enhance security, efficiency, and sustainability.

The future of physical security lies in connected, intelligent systems that adapt to evolving threats and operational needs. With IIoT, businesses can unlock new efficiencies, automate critical processes, and make data-driven decisions with confidence.

Ready to explore how Nextro can deploy IIoT to transform your security strategy? Contact Nextro today.

See source material

https://www.genetec.com/blog/products/why-iot-matters-in-physical-security

The post Why IoT Matters in Physical Security appeared first on Nextro.

]]>
Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks https://nextro.nz/enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks Sun, 16 Mar 2025 22:00:06 +0000 https://nextro.nz/?p=5661 Lockdown procedures are a critical security measure against Marauding Terrorist Attacks (MTAs). In this article, Nextro explores key insights from the UK’s CPNI on implementing effective lockdowns, highlighting strategies, challenges, and best practices for businesses and security teams in New Zealand and Australia. Stay prepared—learn how to safeguard your site.

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>

Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks

In an era of evolving security threats, preparedness is key to mitigating risks and protecting lives. The Supplementary Guidance: Lockdown document, developed by the UK’s Centre for the Protection of National Infrastructure (CPNI), provides critical insights on how organisations can implement lockdown procedures to prevent and delay Marauding Terrorist Attacks (MTAs).

This is highly relevant for New Zealand and Australia in the wake of the Bondi Westfield terror attack in 2024, the New Lynn Auckland stabbings in 2021 and the Christchurch, New Zealand Mosque shootings in 2019.

In this article, Nextro summarises the key takeaways from the UK guidance, and explores the considerations businesses, security teams, and PCBUs must take into account when planning for an emergency lockdown at their site or crowded place.

Understanding Lockdown and Its Importance

What is Lockdown?

Lockdown refers to the practice of securing entry points by locking doors and barriers to restrict access. It is a strategic response to prevent or delay attackers from reaching potential victims. The document also refers to this as “dynamic lockdown”, as it involves rapid implementation depending on the situation.

Key characteristics of a lockdown:

  • It can be applied to an entire site or specific zones.
  • It involves physical security measures such as locked doors, turnstiles, and barriers.
  • It aims to minimise casualties by slowing down or deterring attackers.

Why is Lockdown Important?

Data from previous terror incidents, such as the 2017 London Bridge and Borough Market attacks and the 2019 Christchurch Mosque shootings, have shown that most fatalities occur within the first few minutes—before law enforcement arrives. Implementing a well-planned lockdown can reduce casualties significantly by:

  • Preventing attackers from entering a secure zone.
  • Keeping people from running into danger unknowingly.
  • Buying critical time for emergency responders to arrive.

However, lockdowns must be implemented with caution. A poorly planned lockdown can increase risks, especially if it traps victims with attackers or creates dangerous bottlenecks.

Planning for an Effective Lockdown

Key Considerations

Before implementing a lockdown plan, organisations should assess:

  1. The effectiveness of lockdown – Will it delay the attacker and protect people?
  2. Potential risks – Could it unintentionally trap people in danger?
  3. Lockdown feasibility – Are existing security systems capable of enforcing lockdown?
  4. Triggering conditions – What circumstances should lead to a lockdown?
  5. Infrastructure investment – Do additional security measures need to be implemented?

Implementation Methods

There is no one-size-fits-all approach to lockdowns. The guidance outlines multiple methods:

1. Centralised Lockdown Management

  • Utilises an Automated Access Control System (AACS) to remotely lock and unlock doors.
  • Can be controlled from a Security Control Room (SCR).
  • Provides a coordinated, immediate response.

2. Automated Lockdown

  • Uses attack detection systems (e.g., gunshot detectors) to automatically trigger lockdown.
  • Minimises human intervention, but requires a highly reliable system to avoid false alarms.

3. Manual Lockdown

  • Relies on security personnel or staff to physically lock doors using keys, panic buttons, or chains.
  • Best suited for smaller sites but can be slow in execution.

4. Partial Lockdown

  • Locks only specific entry points, leaving some exits open for evacuation.
  • Useful for shopping centres, offices, and large venues where full lockdown may not be practical.

5. Two-Way Lockdown

  • Doors are locked from both sides, preventing entry and exit.
  • Can be dangerous if people need to evacuate quickly.

6. One-Way Lockdown

  • Doors can only be opened from one side, allowing people to escape but preventing entry.
  • A safer approach that ensures emergency exits remain accessible.

Empowering Security and Front-Line Personnel

Lockdown procedures are only effective if security and front-line personnel are trained and prepared. The guidance emphasises:

  • Empowering staff to initiate lockdowns without waiting for approval.
  • Installing panic buttons for immediate response.
  • Monitoring lockdown integrity to prevent breaches.
  • Using public address (PA) systems to announce lockdown status.

Common Planning Challenges and Solutions

When designing lockdown strategies, several challenges arise.
The guidance provides recommendations for handling these scenarios:

Challenge

Recommended Approach

Large crowds running towards a building

Decide whether to grant them access or maintain lockdown to prevent attackers from entering.

Attack happening near the site

Establish a clear proximity threshold for initiating lockdown.

Attack occurring inside the site

Consider locking down specific zones rather than the entire site to allow safe evacuation.

People wanting to leave a locked area

Establish protocols for controlled exit in extreme circumstances.

Fire emergencies during lockdown

Ensure fire safety compliance and integrate lockdown with fire evacuation plans.

Police and emergency services access

Create clear procedures for law enforcement entry without compromising security.

Final Thoughts: Preparing for the Worst-Case Scenario

The Marauding Terrorist Attack Lockdown Guidance provides a comprehensive roadmap for organisations to plan, implement, and refine their lockdown procedures. While lockdowns can be an effective life-saving measure, they require careful planning, training, and legal consideration to ensure they don’t create new risks.

For businesses, security teams, and public institutions, this guide serves as a reminder that preparedness is key. By understanding when and how to use lockdown effectively, organisations can significantly improve their resilience against terrorist threats.

Key Takeaways

✔ Lockdown is an effective security measure but must be tailored to each site.
✔ Poorly planned lockdowns can increase risks rather than reduce them.
✔ Training and empowering personnel is crucial for effective lockdown implementation.
✔ Legal compliance is essential to avoid conflicts with fire safety and human rights laws.
✔ Regular testing and drills should be conducted to refine procedures.

By following these guidelines, organisations can develop robust lockdown strategies that save lives in the event of a MTA.

ProtectUK – Protective Security Advice and Guidance

NZ Police – Protect Your Crowded Place

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>
Genetec enhances Security Center SaaS with the addition of intrusion management https://nextro.nz/genetec-enhances-security-center-saas-with-the-addition-of-intrusion-management/?utm_source=rss&utm_medium=rss&utm_campaign=genetec-enhances-security-center-saas-with-the-addition-of-intrusion-management Sun, 09 Mar 2025 21:11:28 +0000 https://nextro.nz/?p=5637 Genetec enhances Security Center SaaS with the addition of intrusion management New functionality enhances real-time threat detection, verification, and automated response. Genetec Inc. the global leader in enterprise physical security software, recently announced the addition of intrusion management to Security Center SaaS, the company’s unified physical security solution that can be deployed in the cloud or as...

The post Genetec enhances Security Center SaaS with the addition of intrusion management appeared first on Nextro.

]]>

Genetec enhances Security Center SaaS with the addition of intrusion management

New functionality enhances real-time threat detection, verification, and automated response.

Genetec Inc. the global leader in enterprise physical security software, recently announced the addition of intrusion management to Security Center SaaS, the company’s unified physical security solution that can be deployed in the cloud or as a hybrid solution. By unifying intrusion detection with video surveillance, access control, identity, and visitor management, Security Center SaaS through Nextro now delivers a fully unified, open, cloud-managed platform supported by the Genetec Cloudlink line of appliances. Security Center SaaS will support a wide range of intrusion devices from multiple vendors, starting with Bosch intrusion panels.

Unified intrusion management

Automated intrusion management eliminates reliance on manual processes, reducing errors and ensuring systems are automatically armed when needed. Operators can configure automated schedules, enforce badge-based activation, and apply first-in, last-out logic to keep facilities protected 24/7 without adding operational complexity. By integrating intrusion with business workflows, companies can focus on their core operations while maintaining a secure environment.

Real-time threat verification and response

Security Center SaaS intrusion management helps security teams act quickly by validating alarms/alerts in real time with video verification, which eliminates uncertainty and reduces unnecessary disruptions. When a real threat is detected, automated workflows can immediately lock doors, activate deterrents, and notify the appropriate personnel based on predefined escalation paths. By minimising false alarms and focusing on real threats, end-users can enhance their security posture while reducing the impact on daily operations, ensuring faster decision-making and more effective responses.

Proactive security measures

In addition to real-time detection, Security Center SaaS intrusion management provides automated reporting and dynamic system alerts to help organisations identify vulnerabilities before they become critical issues. With comprehensive event logging, organisations can ensure compliance and maintain a solid foundation for auditing. 

Operational efficiency

An open approach to intrusion panel support in Security Center SaaS not only enhances security but also improves operational efficiency. By centralising intrusion event data on intuitive dashboards, teams gain real-time visibility that empowers faster, more informed decisions. This immediate access to critical information feeds into automated reporting, which tracks trends in alarms and response times, enabling teams to uncover valuable insights for continuous improvement.

“Security Center SaaS continues to push the boundaries of what’s possible. With the introduction of intrusion management, we are delivering on our vision of a fully unified, open, and cloud-managed platform. This empowers organisations to detect, verify, and respond to threats with greater speed and confidence,” said Christian Morin, Vice President Product Engineering at Genetec Inc.

Availability and hardware support

The intrusion panel feature for Security Center SaaS will be available in New Zealand in mid-2025 through Nextro. Built on an open architecture and supported by the Genetec Cloudlink line of multi-workload cloud-managed appliances, Security Center SaaS will support Bosch intrusion panels at launch, with plans to expand compatibility through additional technology partnerships. This open approach enables customers to choose the hardware that best fits their needs or retain their existing panels, providing a cost-effective and flexible path to modernising their physical security operations.

For more information about Security Center SaaS, its new intrusion management capabilities, and how they will benefit your business, contact us today.

The post Genetec enhances Security Center SaaS with the addition of intrusion management appeared first on Nextro.

]]>