Nextro https://nextro.nz/ Managed Telecommunications, Network & Security Solutions NZ Tue, 18 Mar 2025 02:22:24 +0000 en-NZ hourly 1 https://wordpress.org/?v=6.7.2 https://nextro.nz/wp-content/uploads/2020/05/cropped-image001-32x32.png Nextro https://nextro.nz/ 32 32 Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks https://nextro.nz/enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=enhancing-security-with-lockdown-guidance-for-marauding-terrorist-attacks Sun, 16 Mar 2025 22:00:06 +0000 https://nextro.nz/?p=5661 Lockdown procedures are a critical security measure against Marauding Terrorist Attacks (MTAs). In this article, Nextro explores key insights from the UK’s CPNI on implementing effective lockdowns, highlighting strategies, challenges, and best practices for businesses and security teams in New Zealand and Australia. Stay prepared—learn how to safeguard your site.

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>

Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks

In an era of evolving security threats, preparedness is key to mitigating risks and protecting lives. The Supplementary Guidance: Lockdown document, developed by the UK’s Centre for the Protection of National Infrastructure (CPNI), provides critical insights on how organisations can implement lockdown procedures to prevent and delay Marauding Terrorist Attacks (MTAs).

This is highly relevant for New Zealand and Australia in the wake of the Bondi Westfield terror attack in 2024, the New Lynn Auckland stabbings in 2021 and the Christchurch, New Zealand Mosque shootings in 2019.

In this article, Nextro summarises the key takeaways from the UK guidance, and explores the considerations businesses, security teams, and PCBUs must take into account when planning for an emergency lockdown at their site or crowded place.

Understanding Lockdown and Its Importance

What is Lockdown?

Lockdown refers to the practice of securing entry points by locking doors and barriers to restrict access. It is a strategic response to prevent or delay attackers from reaching potential victims. The document also refers to this as “dynamic lockdown”, as it involves rapid implementation depending on the situation.

Key characteristics of a lockdown:

  • It can be applied to an entire site or specific zones.
  • It involves physical security measures such as locked doors, turnstiles, and barriers.
  • It aims to minimise casualties by slowing down or deterring attackers.

Why is Lockdown Important?

Data from previous terror incidents, such as the 2017 London Bridge and Borough Market attacks and the 2019 Christchurch Mosque shootings, have shown that most fatalities occur within the first few minutes—before law enforcement arrives. Implementing a well-planned lockdown can reduce casualties significantly by:

  • Preventing attackers from entering a secure zone.
  • Keeping people from running into danger unknowingly.
  • Buying critical time for emergency responders to arrive.

However, lockdowns must be implemented with caution. A poorly planned lockdown can increase risks, especially if it traps victims with attackers or creates dangerous bottlenecks.

Planning for an Effective Lockdown

Key Considerations

Before implementing a lockdown plan, organisations should assess:

  1. The effectiveness of lockdown – Will it delay the attacker and protect people?
  2. Potential risks – Could it unintentionally trap people in danger?
  3. Lockdown feasibility – Are existing security systems capable of enforcing lockdown?
  4. Triggering conditions – What circumstances should lead to a lockdown?
  5. Infrastructure investment – Do additional security measures need to be implemented?

Implementation Methods

There is no one-size-fits-all approach to lockdowns. The guidance outlines multiple methods:

1. Centralised Lockdown Management

  • Utilises an Automated Access Control System (AACS) to remotely lock and unlock doors.
  • Can be controlled from a Security Control Room (SCR).
  • Provides a coordinated, immediate response.

2. Automated Lockdown

  • Uses attack detection systems (e.g., gunshot detectors) to automatically trigger lockdown.
  • Minimises human intervention, but requires a highly reliable system to avoid false alarms.

3. Manual Lockdown

  • Relies on security personnel or staff to physically lock doors using keys, panic buttons, or chains.
  • Best suited for smaller sites but can be slow in execution.

4. Partial Lockdown

  • Locks only specific entry points, leaving some exits open for evacuation.
  • Useful for shopping centres, offices, and large venues where full lockdown may not be practical.

5. Two-Way Lockdown

  • Doors are locked from both sides, preventing entry and exit.
  • Can be dangerous if people need to evacuate quickly.

6. One-Way Lockdown

  • Doors can only be opened from one side, allowing people to escape but preventing entry.
  • A safer approach that ensures emergency exits remain accessible.

Empowering Security and Front-Line Personnel

Lockdown procedures are only effective if security and front-line personnel are trained and prepared. The guidance emphasises:

  • Empowering staff to initiate lockdowns without waiting for approval.
  • Installing panic buttons for immediate response.
  • Monitoring lockdown integrity to prevent breaches.
  • Using public address (PA) systems to announce lockdown status.
NZ Police Christchurch

Common Planning Challenges and Solutions

When designing lockdown strategies, several challenges arise.
The guidance provides recommendations for handling these scenarios:

Challenge

Recommended Approach

Large crowds running towards a building

Decide whether to grant them access or maintain lockdown to prevent attackers from entering.

Attack happening near the site

Establish a clear proximity threshold for initiating lockdown.

Attack occurring inside the site

Consider locking down specific zones rather than the entire site to allow safe evacuation.

People wanting to leave a locked area

Establish protocols for controlled exit in extreme circumstances.

Fire emergencies during lockdown

Ensure fire safety compliance and integrate lockdown with fire evacuation plans.

Police and emergency services access

Create clear procedures for law enforcement entry without compromising security.

Final Thoughts: Preparing for the Worst-Case Scenario

The Marauding Terrorist Attack Lockdown Guidance provides a comprehensive roadmap for organisations to plan, implement, and refine their lockdown procedures. While lockdowns can be an effective life-saving measure, they require careful planning, training, and legal consideration to ensure they don’t create new risks.

For businesses, security teams, and public institutions, this guide serves as a reminder that preparedness is key. By understanding when and how to use lockdown effectively, organisations can significantly improve their resilience against terrorist threats.

Key Takeaways

✔ Lockdown is an effective security measure but must be tailored to each site.
✔ Poorly planned lockdowns can increase risks rather than reduce them.
✔ Training and empowering personnel is crucial for effective lockdown implementation.
✔ Legal compliance is essential to avoid conflicts with fire safety and human rights laws.
✔ Regular testing and drills should be conducted to refine procedures.

By following these guidelines, organisations can develop robust lockdown strategies that save lives in the event of a MTA.

ProtectUK – Protective Security Advice and Guidance

NZ Police – Protect Your Crowded Place

The post Enhancing Security with Lockdown: Guidance for Marauding Terrorist Attacks appeared first on Nextro.

]]>
Genetec enhances Security Center SaaS with the addition of intrusion management https://nextro.nz/genetec-enhances-security-center-saas-with-the-addition-of-intrusion-management/?utm_source=rss&utm_medium=rss&utm_campaign=genetec-enhances-security-center-saas-with-the-addition-of-intrusion-management Sun, 09 Mar 2025 21:11:28 +0000 https://nextro.nz/?p=5637 Genetec enhances Security Center SaaS with the addition of intrusion management New functionality enhances real-time threat detection, verification, and automated response. Genetec Inc. the global leader in enterprise physical security software, recently announced the addition of intrusion management to Security Center SaaS, the company’s unified physical security solution that can be deployed in the cloud or as...

The post Genetec enhances Security Center SaaS with the addition of intrusion management appeared first on Nextro.

]]>

Genetec enhances Security Center SaaS with the addition of intrusion management

New functionality enhances real-time threat detection, verification, and automated response.

Genetec Inc. the global leader in enterprise physical security software, recently announced the addition of intrusion management to Security Center SaaS, the company’s unified physical security solution that can be deployed in the cloud or as a hybrid solution. By unifying intrusion detection with video surveillance, access control, identity, and visitor management, Security Center SaaS through Nextro now delivers a fully unified, open, cloud-managed platform supported by the Genetec Cloudlink line of appliances. Security Center SaaS will support a wide range of intrusion devices from multiple vendors, starting with Bosch intrusion panels.

Unified intrusion management

Automated intrusion management eliminates reliance on manual processes, reducing errors and ensuring systems are automatically armed when needed. Operators can configure automated schedules, enforce badge-based activation, and apply first-in, last-out logic to keep facilities protected 24/7 without adding operational complexity. By integrating intrusion with business workflows, companies can focus on their core operations while maintaining a secure environment.

Real-time threat verification and response

Security Center SaaS intrusion management helps security teams act quickly by validating alarms/alerts in real time with video verification, which eliminates uncertainty and reduces unnecessary disruptions. When a real threat is detected, automated workflows can immediately lock doors, activate deterrents, and notify the appropriate personnel based on predefined escalation paths. By minimising false alarms and focusing on real threats, end-users can enhance their security posture while reducing the impact on daily operations, ensuring faster decision-making and more effective responses.

Proactive security measures

In addition to real-time detection, Security Center SaaS intrusion management provides automated reporting and dynamic system alerts to help organisations identify vulnerabilities before they become critical issues. With comprehensive event logging, organisations can ensure compliance and maintain a solid foundation for auditing. 

Operational efficiency

An open approach to intrusion panel support in Security Center SaaS not only enhances security but also improves operational efficiency. By centralising intrusion event data on intuitive dashboards, teams gain real-time visibility that empowers faster, more informed decisions. This immediate access to critical information feeds into automated reporting, which tracks trends in alarms and response times, enabling teams to uncover valuable insights for continuous improvement.

“Security Center SaaS continues to push the boundaries of what’s possible. With the introduction of intrusion management, we are delivering on our vision of a fully unified, open, and cloud-managed platform. This empowers organisations to detect, verify, and respond to threats with greater speed and confidence,” said Christian Morin, Vice President Product Engineering at Genetec Inc.

Availability and hardware support

The intrusion panel feature for Security Center SaaS will be available in New Zealand in mid-2025 through Nextro. Built on an open architecture and supported by the Genetec Cloudlink line of multi-workload cloud-managed appliances, Security Center SaaS will support Bosch intrusion panels at launch, with plans to expand compatibility through additional technology partnerships. This open approach enables customers to choose the hardware that best fits their needs or retain their existing panels, providing a cost-effective and flexible path to modernising their physical security operations.

For more information about Security Center SaaS, its new intrusion management capabilities, and how they will benefit your business, contact us today.

The post Genetec enhances Security Center SaaS with the addition of intrusion management appeared first on Nextro.

]]>
Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report https://nextro.nz/navigating-the-future-of-security-nextros-summary-of-top-physical-security-trends-for-2025-from-the-genetec-report/?utm_source=rss&utm_medium=rss&utm_campaign=navigating-the-future-of-security-nextros-summary-of-top-physical-security-trends-for-2025-from-the-genetec-report Thu, 06 Mar 2025 08:44:17 +0000 https://nextro.nz/?p=5615 Explore Nextro’s breakdown of the top physical security trends for 2025, based on Genetec’s latest report. From cyber-physical security convergence and AI advancements to hybrid-cloud adoption and data-driven decision-making, stay ahead of emerging threats. Learn how these trends are shaping security in New Zealand and how Nextro can help.

The post Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report appeared first on Nextro.

]]>

Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report

The security landscape is constantly evolving. Staying ahead of the curve is crucial for businesses in New Zealand.

In this insight, we’ll explore the key physical security trends to watch in 2025, drawing insights from Genetec’s State of Physical Security Report 2025. These trends include the increasing convergence of cyber and physical security, a wider adoption of hybrid-cloud models, a rise in data-driven decision-making, and the innovative use of AI.

1. Cybersecurity Takes Centre Stage

Cyber threats are on the rise, and businesses are responding by strengthening their cybersecurity measures. Genetec’s report reveals that 71% of businesses prioritised educating employees about cybersecurity best practices in 2024, compared to 61% in 2023. Additionally, 51% focused on refining user permissions and privileges, while 47% prioritised securing data storage.

The convergence of cyber and physical security is undeniable. IT departments are playing an increasingly influential role in physical security decisions, highlighting the need for seamless collaboration between these two critical areas.

2. Converged Security: Bridging the Gap Between Physical and Cyber

The boundaries between physical and cyber security are becoming increasingly intertwined, and businesses are recognising the need for a unified approach. Genetec’s State of Physical Security Report 2025 reveals a significant rise in the awareness and implementation of cybersecurity practices.

This shift is driven by the understanding that physical security systems are now deeply reliant on digital infrastructure. As a result, IT departments are playing a more influential role in managing and securing these systems, leading to greater collaboration between IT and security professionals.

  • IT influence: Genetec’s report reveals that IT departments consistently rank above physical security departments in terms of involvement in buying decisions. In 2024, 51% of IT professionals prioritised deploying cybersecurity tools, compared to 27% of security and safety professionals. This highlights the growing influence of IT in physical security decisions.

This convergence of physical and cyber security is vital for building a robust security strategy that addresses the evolving threat landscape and protects businesses from both internal and external risks

3. Cloud Adoption Meets Reality

Cloud adoption in physical security has recently slowed down. A recent report found that globally, 38% of businesses already have over a quarter of their physical security deployment in a cloud or hybrid-cloud environment, which is a 6% decrease from last year.

 In New Zealand specifically, 62% of businesses have reported that they are not currently using any cloud for their physical security environments, partially due to the lack of local data centre infrastructure in the region.

Businesses are trending toward taking a more cautious approach, opting for hybrid deployments that balance the benefits of cloud scalability with the control of on-premises infrastructure. Those looking to fully migrate to the cloud are doing so by moving individual workloads to the cloud in an incremental fashion, minimising risk.

  •  Data Security and Control: Concerns about data loss and control remain prevalent, particularly in the physical security domain. Businesses are keen on ensuring the security and integrity of their sensitive data while migrating to the cloud.  
  • Long-term Outlook: Despite the slowdown, the long-term outlook for cloud adoption in physical security remains positive. As technology evolves and addresses concerns around cost and security, businesses will continue to explore hybrid-cloud solutions to enhance their security infrastructure.

4. Access Control and Video Surveillance Remain Paramount

For the fifth consecutive year, access control is the top priority for physical security departments. Video surveillance is a close second.

Genetec’s Physical Security Report 2025 emphasises the continued importance of access control and video surveillance in 2025. End users are looking to expand the functionalities of their access control systems, with 41% showing interest in visitor management, 39% in biometrics, and 37% in identity management.

For video surveillance, the focus is on replacing or updating cameras and video management systems (VMS) to incorporate new technologies like higher quality video, streamlined VMS interfaces, and intelligent video analytics.  

In 2024, many businesses implemented unified security solutions, integrating their access control and video surveillance systems. This has helped streamline security operations, enabling teams to manage both systems from a single platform, leading to improved efficiency and enhanced overall security. This trend is expected to continue into 2025 as businesses increasingly seek integrated solutions to optimise their security management.

5. The Rise of Data-Driven Decision-making

Businesses are gathering, using, and sharing security data to improve physical security and business operations.

Genetec’s Physical Security Report 2025 identifies a growing trend of using security data for strategic decision-making. Both end users and consultants recognise the increasing use of this data across key departments. Executive leaders view this data as crucial for achieving business objectives, emphasising the strategic value of physical security data.

What can data-driven decision-making improve?

  • Situational Awareness: Real-time data and analytics can provide a comprehensive view of the security landscape, enabling quicker response times and proactive threat mitigation.  
  • Enhanced Operational Efficiency: Data-driven insights can help optimise security operations, reduce manual tasks, and improve resource allocation.  
  • Reduced Security Risks: By analysing data trends and patterns, businesses can identify potential vulnerabilities and proactively address them, minimising security risks.  
  • Better Decision Making: Access to accurate and timely data empowers informed decision-making, enabling businesses to align security strategies with business objectives and optimise resource allocation.  
  • ROI: By leveraging security data for operational insights and business intelligence, businesses can maximise the value of their security investments and demonstrate a return on investment (ROI).  

6. Harnessing the Power of AI

The integration of artificial intelligence (AI) into physical security systems is a promising development. Businesses are exploring how AI can help streamline and automate security operations with 37% of businesses planning to explore the integration of AI in their physical security systems, an increase of 27% over 2024.

While the report acknowledges the potential of AI in physical security, it also notes that 27% of businesses are unsure how to deploy AI effectively. This uncertainty highlights the need for greater understanding and training on AI applications in physical security.

Despite this, those already using AI see its value in streamlining and automating security operations, particularly in tasks like automatically triggering events of interest, automating emergency response dispatch, and forecasting future threats.

7. Pragmatism and Value-Driven Solutions

In 2025, the physical security industry is demonstrating pragmatism and a renewed focus on operational excellence. Businesses are prioritising projects that enhance security and efficiency without introducing unnecessary complexity or costs.  

This trend involves:

  • Seeking reliable, value-driven solutions that enhance security without unnecessary complexity or costs.  
  • Focusing on technology that meets day-to-day needs while tracking innovative technology for future implementation.  
  • Looking for real-world solutions that improve work and efficiency within budget constraints.  
  • Prioritising hybrid-cloud deployments and a measured approach to finding strong use cases for new technology.  
  • Focusing on ways to adopt new technology into existing infrastructure to improve operations, increase cyber resiliency, and deliver physical security more cost-efficiently.

At Nextro, we’re passionate about securing New Zealand and empowering New Zealand’s top businesses to thrive in a secure environment. Our expertise extends beyond physical security, encompassing a holistic approach that integrates cyber resilience and proactive risk management.

We leverage the latest technologies and industry best practices to fortify your organisation’s defences, safeguard your assets, and protect your people. Our team collaborates closely with you to develop tailored security strategies that align with your business objectives and address your unique challenges.

Whether you’re looking to enhance your access control systems, upgrade your video surveillance, or implement a comprehensive cybersecurity strategy, Nextro is your trusted partner.

Ready to elevate your converged security posture and unlock your business potential? Contact us today to explore how Nextro can help you achieve your converged security goals.

To download the full State of Physical Security Report 2025 

The post Navigating the Future of Security: Nextro’s Summary of Top Physical Security Trends for 2025 – from the Genetec Report appeared first on Nextro.

]]>
Nextro Achieves Fortinet SD-WAN Specialisation https://nextro.nz/nextro-achieves-fortinet-sdwan-specialisation/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-achieves-fortinet-sdwan-specialisation Tue, 04 Mar 2025 01:29:58 +0000 https://nextro.nz/?p=5584 Nextro has announced that it has proudly achieved Fortinet’s Secure SD-WAN Specialisation, demonstrating its commitment to delivering advanced and secure networking solutions to businesses across New Zealand and Australia. Nextro’s in-depth knowledge of Fortinet’s Secure SD-WAN technology, combined with its extensive experience in cybersecurity, enables the company to provide comprehensive solutions that meet the specific needs of its clients.

The post Nextro Achieves Fortinet SD-WAN Specialisation appeared first on Nextro.

]]>

Nextro Achieves Fortinet SD-WAN Specialisation

The Fortinet Secure SD-WAN Specialisation solidifies Nextro’s position as a leader in secure networking solutions.

Auckland, New Zealand, 5 March 2025 – Nextro, the New Zealand-headquartered network, cybersecurity and physical security provider, today announced that it has proudly achieved Fortinet’s Secure SD-WAN Specialisation, demonstrating its commitment to delivering advanced and secure networking solutions to businesses across New Zealand and Australia.

This specialisation recognises Nextro’s expertise in deploying Fortinet Secure SD-WAN, showcasing and validating its capability to enhance network security while optimising client performance. As a key player in cybersecurity, Nextro continues to ensure that businesses are equipped with the tools that they need to navigate the complexities of today’s digital landscape.

“Achieving the Fortinet Secure SD-WAN Specialisation is a significant milestone for our team and a deserved validation of their experience and capabilities. It not only reflects our dedication to offering the best in network security, but also positions us to further support our clients in protecting their digital environments, assets, and critical infrastructure,” said Martyn Levy, Nextro’s Managing Director.      

Nextro’s in-depth knowledge of Fortinet’s Secure SD-WAN technology, combined with its extensive experience in cybersecurity, enables the company to provide comprehensive solutions that meet the specific needs of its clients. This includes secure connectivity, optimised application performance, and simplified management – all while reducing costs and enhancing security.

“Nextro has consistently demonstrated its ability to deliver innovative and secure networking solutions. We are excited to see how their expertise in Fortinet’s Secure SD-WAN technology will benefit their clients and contribute to the overall cybersecurity landscape across Australia and New Zealand,” said Nick Frantzen, Service Creation Manager at Fortinet New Zealand.

In a fast-paced industry, specialisations focused on market opportunities enabled by the Fortinet Engage Partner Program help partners be recognised and valued by current and potential customers as trusted advisors who have the expertise, services and technologies they need to meet their digital acceleration needs.

With this specialisation, Nextro is now positioned to offer even greater value to its clients, helping them stay ahead in an increasingly challenging cybersecurity environment. The Fortinet specialisation means that Nextro understands convergence and the value of maximising a secure networking approach for digital acceleration for customers.   

Click here for more information on Nextro’s SD-WAN offering.

A wall of Fortinet firewall boxes from one of Nextro’s recent 40+ site SD-WAN deployments.

A wall of Fortinet firewall boxes from one of Nextro’s recent 50+ site SD-WAN deployments.

The post Nextro Achieves Fortinet SD-WAN Specialisation appeared first on Nextro.

]]>
Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management https://nextro.nz/nextro-and-fortinet-partner-to-enhance-cybersecurity-with-24-7-socaas-monitoring-and-incident-management/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-and-fortinet-partner-to-enhance-cybersecurity-with-24-7-socaas-monitoring-and-incident-management Sun, 23 Feb 2025 22:22:25 +0000 https://nextro.nz/?p=5534 Nextro and Fortinet have partnered to provide affordable 24/7 Security Operations Centre as a Service (SOCaaS) for businesses in Australia and New Zealand. Nextro's solution, powered by Fortinet, offers continuous network monitoring, advanced threat detection, expert analysis, and regulatory compliance to enhance cybersecurity resilience without the high costs of traditional SOCs.

The post Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management appeared first on Nextro.

]]>
Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management

Having a firewall in place is essential, but it is only one part of a comprehensive cybersecurity strategy. The real question is: who is actively monitoring your network around the clock for suspicious activity, irregular traffic patterns, and potential security threats?

Large enterprises, multinational corporations, and government organisations can afford dedicated Security Operations Centres (SOCs) to monitor and respond to cyber threats in real time. However, for most businesses, the cost of maintaining such a service in-house is prohibitive.

In Australia and New Zealand, many businesses and critical infrastructure sites have firewalls and edge security solutions in place, yet they lack continuous network monitoring. This is often due to the perceived high costs and complexity involved, despite the recognition that ongoing surveillance is crucial for robust cybersecurity.

Introducing Nextro’s SOCaaS Solution

Nextro has partnered with Fortinet to offer an affordable and scalable Security Operations Centre as a Service (SOCaaS) tailored for businesses across Australia and New Zealand. This service is designed to provide 24/7 monitoring and security management for:

  • Corporate networks
  • Building services networks (BSN)
  • Operational Technology (OT) networks

𝟮𝟰/𝟳 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 – Detect and respond to threats in real-time to minimise impact.

  • Continuous surveillance for potential security risks
  • Rapid response to minimise damage
  • Proactive threat detection to stay ahead of attackers

𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗧𝗵𝗿𝗲𝗮𝘁 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 – Leverage behavioural analytics and anomaly detection to counter evolving cyber risks.

  • AI-driven security for real-time threat identification
  • Behavioural analysis to detect unusual activities
  • Adaptive security to mitigate emerging cyber threats

𝗘𝘅𝗽𝗲𝗿𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 – Get insights and recommendations from skilled analysts to enhance your cybersecurity.

  • Access to cybersecurity experts for in-depth analysis
  • Actionable insights to strengthen security posture
  • Tailored recommendations to address vulnerabilities

𝗥𝗲𝗴𝘂𝗹𝗮𝘁𝗼𝗿𝘆 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 – Stay compliant by continuously monitoring and addressing security issues.

  • Meet industry standards and regulatory requirements
  • Proactive risk management to avoid compliance violations
  • Ongoing assessments to maintain security best practices

With Nextro’s SOCaaS, businesses of all sizes can enhance their cybersecurity resilience without the high costs associated with traditional SOC solutions.
Contact us today to learn how we can help protect your business from cyber threats.

The post Nextro and Fortinet Partner to Enhance Cybersecurity With 24/7 SOCaaS Monitoring and Incident management appeared first on Nextro.

]]>
Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure https://nextro.nz/lessons-from-the-august-2024-vienna-concert-terror-plot-security-strategies-for-large-events-critical-infrastructure/?utm_source=rss&utm_medium=rss&utm_campaign=lessons-from-the-august-2024-vienna-concert-terror-plot-security-strategies-for-large-events-critical-infrastructure Mon, 03 Feb 2025 04:09:50 +0000 https://nextro.nz/?p=5360 Uncover Nextro’s insights on the August 2024 Taylor Swift concert terror plot and its implications for event security and critical infrastructure. Learn key lessons on threat evolution, intelligence sharing, and proactive security measures to protect crowded places, stadia, and high-risk sites from emerging threats.

The post Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure appeared first on Nextro.

]]>
Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure

In August 2024, Austrian authorities, with intelligence cooperation from international agencies, disrupted a terrorist plot targeting Taylor Swift’s concerts in Vienna. The attack, allegedly orchestrated by radicalised individuals, planned a mass-casualty event using vehicle ramming, knives, and explosives.

This foiled plot serves as a critical case study for security professionals across event management, law enforcement, and critical infrastructure protection. It highlights growing threats to stadia, crowded places, and critical infrastructure and the urgent need for integrated security solutions.

What We Can Learn: Evolving Threats to Public Safety

The Vienna plot underscores several key trends in modern threat landscapes:

  • Large events remain high-value targets – Stadium gatherings and crowded places provide maximum media exposure for bad actors. Security planning must anticipate dynamic threats, not just traditional attack methods.
  • Online radicalisation is a growing concern – The Vienna suspects were radicalized via online forums and encrypted messaging apps. Law enforcement and intelligence agencies must monitor emerging extremist networks, leveraging AI-driven intelligence gathering.
  • Attackers are diversifying methods – The planned attack included multiple tactics, from vehicular attacks to edged weapons and explosives. Security teams must deploy multi-layered defences that address different risk factors.
  • International intelligence sharing is crucial – The Vienna plot was prevented through timely intelligence cooperation between multiple countries. Security teams at major venues must have direct channels to law enforcement and counterterrorism agencies to facilitate real-time threat detection.

Proactive Security Measures for Large Events & Critical Infrastructure

As security integrators and consultants, we must design holistic, technology-driven solutions that safeguard crowded places from evolving threats, whether at large gatherings, stadia, or critical infrastructure sites. Here’s how:

  1. Physical Barriers & Controlled Perimeters 
  • Deploy hostile vehicle mitigation (HVM) solutions, including reinforced bollards and traffic-calming measures to protect pedestrian zones from vehicle-borne attacks around crowded places like a stadium, shopping districts, and critical infrastructure
  • Create layered security perimeters to secure and monitor access control zones effectively.
  1. AI-Powered Surveillance & Threat Detection
  • Utilise AI-driven video surveillance analytics to identify anomalies in real-time.
  • Integrate facial recognition and crowd behaviour analysis to flag potential threats.
  • Deploy drone surveillance for large venues to monitor movement patterns.
  1. Comprehensive Screening & Behaviour Detection
  • Enhance entry screening with multi-layered detection, including X-ray, metal detectors, and explosives screening.
  • Train staff in behavioural threat assessment to recognise suspicious actions before an incident occurs.
  1. Real-Time Intelligence Sharing & Communication
  • Establish direct communication lines between security teams and law enforcement agencies.
  • Integrate a centralised command center that collects and distributes intelligence data from multiple sources.
  1. Rapid Response Protocols & Crisis Management
  • Develop and test incident response plans, ensuring swift action in case of an attack.
  • Train staff and security personnel in active threat response, including evacuation protocols, lockdown procedures, and emergency medical aid.

Why This Matters for Crowded Places, Stadia, and Critical Infrastructure Managers

While this attack targeted a concert venue, similar threats apply to other crowded places and critical infrastructure including airports, transit hubs, energy facilities, and government buildings. Attackers seek soft targets— crowded places with high foot traffic and limited security presence. Integrating advanced security measures at these sites prevents disruptions and enhances resilience against evolving threats.

Final Thoughts: The Need for Adaptive Security

The Vienna concert plot reinforces a clear takeaway: Threat landscapes are evolving, and security strategies must evolve with them. Whether managing a large event, a public gathering, or a critical infrastructure site, a proactive, multi-layered security approach is non-negotiable.

Security is not just about detection—it’s about prevention.

At Nextro, we specialise in integrating advanced, multi-layered security systems and people-driven protocols that combine real-time intelligence and rapid response measures to safeguard crowded places, stadia, and critical infrastructure.

Contact us today to learn how our tailored security solutions and integrations can help you stay ahead of evolving threats and protect the public. 

For further insights and source material, see the full case study by the Combating Terrorism Center at West Point: Original Article

The post Lessons from the August 2024 Vienna Concert Terror Plot: Security Strategies for Large Events & Critical Infrastructure appeared first on Nextro.

]]>
Nextro and Genetec partner with Eden Park for enhanced security operations https://nextro.nz/nextro-and-genetec-partner-with-eden-park-for-enhanced-security-operations/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-and-genetec-partner-with-eden-park-for-enhanced-security-operations Thu, 24 Oct 2024 04:52:05 +0000 https://nextro.nz/?p=5216 Nextro and Genetec deliver operational efficiencies and security enhancements for Eden Park with Genetec Security Centre. On a busy event day, Eden Park welcomes about 50,000 spectators. Find out how the team has expanded visibility to keep guests safer, all while developing stronger city partnerships to streamline operations and incident response. The company Eden Park...

The post Nextro and Genetec partner with Eden Park for enhanced security operations appeared first on Nextro.

]]>

Nextro and Genetec deliver operational efficiencies and security enhancements for Eden Park with Genetec Security Centre.

On a busy event day, Eden Park welcomes about 50,000 spectators. Find out how the team has expanded visibility to keep guests safer, all while developing stronger city partnerships to streamline operations and incident response.

“Nextro is proud to partner with Eden Park to design, implement and support its upgraded security platform. The Genetec solution is now being used to enhance operations and ensure stadium-wide safety and security for New Zealand’s biggest sporting and cultural events.”

Martyn Levy

Managing Director at Nextro

The company

Eden Park is widely considered New Zealand’s national stadium. Since its opening in 1903, the stadium has been the home of Auckland Cricket and Auckland Rugby. It has a seating capacity of nearly 50,000 and an unmatched atmosphere for live events. As New Zealand’s largest stadium, Eden Park has a proven track record of delivering successful events for over a century. This includes the 1987 and 2011 Rugby World Cup finals as well as the 2022 ICC Women’s Cricket World Cup and others.

The challenge

Over one million local and international fans pass through Eden Park’s doors each year. High-volume patronage means the stadium needed a security platform that could help the team proactively safeguard against threats. This became important following the release of the New Zealand Government’s Crowded Places Strategy in 2020 and Eden Park becoming the host of the FIFA Women’s World Cup 2023™.

The solution

Boosting stadium-wide visibility

Operators now have a clear picture of stadium events. With privacy-first visual tracking and quick search functionality, identifying and responding to security alerts can happen in seconds.

Gaining real-time insights

The AutoVu ANPR system helps operators automatically track vehicle license plates, comparing them against the live law enforcement database of stolen vehicles or vehicles of interest.

Achieving full redundancy 

Dual directory servers and four Streamvault security infrastructure appliances operating in high-availability mode mean Eden Park has certainty of continuous operation for game day. 

Enhancing city-wide collaboration

Using the Genetec Federation feature, Eden Park can grant system access to the New Zealand Police in case of emergencies. This enables authorities to rapidly respond to stadium incidents.

“Eden Park is committed to delivering world-class live experiences and attracting premium events for Auckland and New Zealand. With centralized security operations underpinned by Genetec, we’re able to continue setting the benchmark for stadium experiences in the wider APAC region.” 

Nick Sautner

Chief Executive Officer at Eden Park

Results

With the Genetec platform at hand, Eden Park operators can now monitor crowds, address safety concerns, and coordinate incident responses from centralized spaces. Eden Park now has a unified view of security, backed by infrastructure appliances that have been tested to their limits and tailored to the stadium’s unique requirements. This added level of reliability eliminates guesswork and offers invaluable peace of mind.

The post Nextro and Genetec partner with Eden Park for enhanced security operations appeared first on Nextro.

]]>
Elevate critical infrastructure networks with Nextro and Arista https://nextro.nz/elevate-critical-infrastructure-networks-with-nextro-and-arista/?utm_source=rss&utm_medium=rss&utm_campaign=elevate-critical-infrastructure-networks-with-nextro-and-arista Mon, 19 Aug 2024 22:48:38 +0000 https://nextro.nz/?p=5142 Elevate critical infrastructure networks with Nextro and Arista Critical infrastructure industries such as energy, water supply, healthcare, and transportation are the backbone of our society. They are crucial to ensuring public safety, economic stability, and country security.    As critical infrastructure managers continually embrace digital transformation, their corporate (IT) and operational (OT) networks must be able...

The post Elevate critical infrastructure networks with Nextro and Arista appeared first on Nextro.

]]>
Elevate critical infrastructure networks with Nextro and Arista

Critical infrastructure industries such as energy, water supply, healthcare, and transportation are the backbone of our society. They are crucial to ensuring public safety, economic stability, and country security.   

As critical infrastructure managers continually embrace digital transformation, their corporate (IT) and operational (OT) networks must be able to efficiently manage large volumes of data, and the growing number of IoT devices, while securely integrating operational technologies, security equipment, and other devices with their systems. To keep their operations running seamlessly, critical infrastructure organisations rely heavily on robust, high-speed, efficient, and secure network solutions/architecture.  

At Nextro, we understand that ensuring the reliability, operations, and security of critical infrastructure networks is of utmost importance not only for the organisations but the entire community.  To this end, Nextro partnered with Arista Networks, an industry leader in data-driven, client-to-cloud networking for large data centre/AI, campus, and routing environments, to provide innovative network solutions tailored to meet the dynamic and growing demands of the critical infrastructure sector.  

This article explores the importance of safeguarding critical infrastructure networks and how Arista Networks’ advanced switches and network solutions enable critical infrastructure organisations and managers to enhance their network availability, agility, automation, analytics, and security. 

Arista’s solutions for critical infrastructure networks 

Arista Networks is at the forefront of providing innovative cloud networking solutions to meet the highest performance, reliability, and security standards necessary for critical infrastructure operations. Their solutions include Extensible Operating System (EOS), network applications, and Ethernet switching and routing platforms.    

Check here how Arista’s solutions and Nextro can help critical infrastructure organisations: 

1. High-Performance Switches 

Arista’s switches are designed for high-performance, offering scalable bandwidth from 1Gbps to 400Gbps. They provide ultra-low latency, high throughput and scalability, ensuring real-time data processing essential for critical infrastructure operations that demand reliable, high-speed data transmission. Below are the two models of Arista’s high-performance switches that meet the needs of critical infrastructure and can be supplied by Nextro in New Zealand & Australia:   
 

  • 7000 series switches: designed for high-frequency trading, cloud data centres, and large enterprise environments. They support 10/25/40/50/100 Gigabit Ethernet and are known for their modularity and high-density configurations.   
  • 7500R series switches: engineered for the most demanding data centre environments. They offer exceptional performance, support for up to 400 Gigabit Ethernet and features designed to handle massive amounts of data traffic with minimal latency. 

2. Extensible Operating System (EOS) 

Arista EOS is a highly modular and fully programmable operating system that delivers workflow automation, high availability, unparalleled network visibility and analytics capabilities.   

Arista EOS integrates seamlessly with a wide range of third-party applications, automation tools, and scripting languages, enabling network administrators to customise and automate network functions and workflows. It can also scale to hundreds of thousands of compute and storage nodes with management and provisioning capabilities that work at scale.   

EOS ensures optimal network performance and troubleshooting issues by harnessing advanced features, including analytics, network telemetry, and real-time monitoring.   

Designed for resiliency and programmability, Arista EOS provides a robust software foundation and allows for solutions customised to the specific needs of critical infrastructure sectors, ensuring optimal performance and security. 

3. CloudVision: Unified Management and Automation 

Managing complex network environments can be challenging, particularly in critical infrastructure organisations. Arista’s CloudVision platform offers unified management, simplifying network operations and enhancing security. CloudVision’s real-time telemetry and analytics enhance network visibility, monitoring, and control.   

CloudVision’s centralised approach enables network administrators to oversee and efficiently manage complex and large-scale deployments from a single interface, reducing operational complexity, improving response time and mitigating risks.  

The platform leverages cloud networking and integrates various automation tools and orchestration frameworks, enabling streamlined operations and reduced manual intervention. At Nextro, we know that this is crucial for maintaining high availability and scaling infrastructure in response to changing demands. 

4. Virtual Extensible LAN (VXLAN) 

Arista’s VXLAN technology enhances network segmentation, vital for isolating sensitive data and protecting critical systems. By segmenting the network, organisations can minimise the impact of potential breaches and effectively contain threats.

Benefits of Arista’s Network Solutions for Critical Infrastructure 

Nextro can help its critical infrastructure customers achieve the following benefits when deploying Arista switches and other solutions: 

1. Improved Operational Efficiency 

With high-performance switches and routers, Arista network solutions cater to the demanding requirements of critical infrastructure. Their devices provide high-speed data transmission with minimal latency and maximum throughput, allowing critical infrastructure organisations to enhance operational efficiency, reduce downtime, and ensure continuous and reliable service delivery. 

2. Scalability and Flexibility 

Critical infrastructure systems must often scale quickly to accommodate growing demands or integrate new technologies. Arista’s software-driven solutions allow critical infrastructure organisations to adapt and expand their networks without compromising performance. The flexibility and scalability of Arista’s solutions, such as EOS (EOS), enable seamless integration with existing systems and technologies, ensuring that critical infrastructure can scale and evolve without disruption. 

3. Proactive Threat Detection and Response 

With the real-time telemetry and analytics capabilities offered by Arista’s CloudVision platform, organisations can proactively detect anomalies and threats to their networks. This allows them to respond swiftly to potential incidents, minimise damage, and ensure rapid recovery. 

4. Enhanced Security 

Critical infrastructure networks are exposed to various cybersecurity threats, which can cause significant disruptions to their operations, compromise the availability and integrity of vital services, and lead to catastrophic consequences. Therefore, security is paramount in critical infrastructure.   

Arista Networks incorporates advanced security features into its solutions, including segmentation, encryption, and real-time threat detection. By leveraging these capabilities, Nextro helps organisations protect their networks from cybersecurity threats and unauthorised access, safeguarding vital operations and sensitive data. 

Protecting critical infrastructure networks from cybersecurity threats is essential to ensure the uninterrupted delivery of vital services and the safety of our society. At Nextro, we understand the challenges these industries face and provide best-of-breed solutions to meet their needs.  

Together with Arista Networks, Nextro delivers advanced switches and comprehensive network solutions that provide the security, reliability, and performance needed to safeguard critical infrastructure. By leveraging Arista’s innovative networking solutions, organisations can enhance their resilience against cybersecurity threats, ensuring the continued operation and security of the services we rely on daily.  

To learn more about how Arista’s solutions can elevate your network, operations, and security, get in touch with the Nextro team today. We are ready to help you implement the right best-of-breed solutions to optimise the operation of your critical infrastructure while at the same time meeting your security needs. Nextro is a certified and trained Arista Networks partner.   

The post Elevate critical infrastructure networks with Nextro and Arista appeared first on Nextro.

]]>
OT environments are facing increasing cyber attacks https://nextro.nz/ot-environments-are-facing-increasing-cyber-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=ot-environments-are-facing-increasing-cyber-attacks Sun, 18 Aug 2024 23:07:59 +0000 https://nextro.nz/?p=5137 OT environments are facing increasing cyber attacks According to a recent global survey released by Fortinet, 31% of organisations with OT environments reported over six intrusions in the past year, a significant increase from the 11% reported the previous year.    This alarming finding shows that despite growing efforts and investments to bolster their security posture,...

The post OT environments are facing increasing cyber attacks appeared first on Nextro.

]]>
OT environments are facing increasing cyber attacks

According to a recent global survey released by Fortinet, 31% of organisations with OT environments reported over six intrusions in the past year, a significant increase from the 11% reported the previous year.   

This alarming finding shows that despite growing efforts and investments to bolster their security posture, organisations still face significant challenges when securing integrated IT/OT environments. 

In this article, we cover the main OT cybersecurity challenges highlighted by Fortinet’s 2024 State of Operational Technology and Cybersecurity Report and provide some insights on the best practices for enhancing your OT security posture.    

Cyber Threats to Operational Technology Environments  

Traditionally kept isolated from other environments, most OT systems were not designed for today’s increased network connectivity. As organisations integrate new digital technologies into their OT environments, security challenges become more complex. 

Threats to OT environments can come from numerous sources, including terrorist groups, disgruntled employees, malicious intruders, natural disasters, actions by insiders, and unintentional actions such as human error or failure to follow established policies and procedures. Attackers are developing more sophisticated tactics and tools to penetrate OT protocols and systems.  

To ensure the safety of their OT systems, organisations must adopt essential tools and capabilities to enhance visibility and protection across the entire network, reducing the time for attack detection and response, as well as the overall risk for these environments. 

Key Findings from Fortinet Report 

1. Cyberattacks that compromise OT systems are on the rise. 

This year, 73% of organisations reported intrusions that impacted either OT systems only or both IT and OT systems, a sharp increase from only 49% in 2023. 

Findings also showed an increasing number of organisations experiencing a high volume of intrusions. Over 30% of respondents had six or more intrusions, up from only 11% in 2023. 

2. Email attacks and mobile security breaches are the main attack techniques.   

Phishing and compromised business email were the most common attack types in the last year, affecting 76% and 65% of the organisations. Additionally, ransomware and wiper intrusions saw a spike in activity, rising from 32% in 2023 to over 55% in 2024.  

Cybercriminals’ most common techniques for gaining access to OT environments were mobile security breaches and web compromises.  

These findings highlight the importance of organisations investing in cybersecurity awareness training for their team members, making them a key component of your business’s strategy to fortify your company’s defences.  

3. Organisations have experienced increased damage from intrusions. 

The damages caused by intrusions have also gotten worse for organisations. More than half of respondents (55%) reported degradation of brand awareness due to a successful attack. Findings also showed an increase in organisations that reported lost business-critical data and decreased productivity due to a breach incident.  

Given the rise in attacks and extension of their damages, nearly half (46%) of respondents indicate that they measure success based on the recovery time needed to resume normal operations. That suggests that for many organisations, quickly responding to inevitable attacks may be a more realistic target to measure their cyber resilience success.  

4. Organisations have a more mature OT security posture  

As OT threats become more sophisticated, the report suggests that most organisations still have blind spots in their environment. While there has been a decrease in organisations claiming to have complete visibility of their OT activities within central cybersecurity operations compared to the previous years, the number of organisations reporting that they have 75% visibility increased. This suggests that organisations are gaining a more realistic understanding of their security posture and becoming more aware of their blind spots.  

5. OT Cybersecurity has become a high-rank responsibility 

The percentage of organisations aligning OT security with the CISO increased to 27% this year, compared to 17% in 2023.  

Findings also indicate a growing trend of transferring OT responsibility to other C-suite roles, such as the CIO, CTO, and COO, with an expected increase to about 60% in the next 12 months. This indicates a clear concern for OT security and risk in 2024 and beyond. 

Also, in organisations where the CIO is not responsible, these responsibilities are shifted from the Director of Network Engineering to the Vice President of Operations role, illustrating another escalation of responsibility. 

This elevation into the executive ranks indicates that OT security is becoming a higher-profile topic and gaining more attention at the board level. 

Best practices to enhance OT security 

The results of the Fortinet report show us the urgent need for effective security measures. 

Based on these findings, the Nextro team has compiled the best practices to address OT security challenges and strengthen its security posture.   

Implement network segmentation 

To minimise intrusions, it’s crucial to establish a fortified OT environment with robust network policy controls at every access point. This defensible architecture begins with creating distinct network zones or segments. Additionally, teams should assess the complexity of managing these solutions and consider the advantages of an integrated or platform-based approach with centralised management capabilities. 

Enhance Visibility and Apply Compensating Controls for OT Assets 

Visibility into all assets on the OT network is essential. Once visibility is achieved, organisations must protect any vulnerable OT devices with purpose-built compensating controls. These controls should include protocol-aware network policies, system interaction analysis, and endpoint monitoring to detect and prevent the compromise of sensitive OT assets.  

Integrate OT into Security Operations and Incident Response 

Organisations should integrate OT considerations into their overall SecOps and incident response plans. This involves creating playbooks that specifically address the OT environment, ensuring comprehensive incident management and response. 

Utilise OT-Specific Threat Intelligence and Security Services 

Effective OT security relies on timely awareness and precise analysis of emerging threats. Organisations should ensure their threat intelligence and content sources are rich with OT-specific information, enhancing their ability to respond to imminent risks accurately. 

Adopt a Platform Approach to Security Architecture 

To tackle the dynamic nature of OT threats and the growing attack surface, organisations often deploy numerous security solutions from various vendors, leading to complexity. A platform-based approach can streamline this by consolidating vendors and simplifying the security architecture. A robust platform designed to safeguard both IT and OT environments enables solution integration, improving security efficacy and allowing centralised management to boost efficiency. 

With the rise of more sophisticated and complex OT security threats, organisations must adopt comprehensive and proactive cybersecurity strategies to safeguard their OT environments. 

At Nextro, we stand at the forefront of cybersecurity innovation, offering best-of-breed solutions specifically designed to protect OT and IT infrastructure effectively. Our solutions enable organisations to enhance their security and mitigate risks.  

If you would like to learn more about safeguarding your OT network, or have general networking or cybersecurity questions, please get in touch with the Nextro team today. 

To download your copy of the Fortinet 2024 State of Operational Technology and Cybersecurity here.

The post OT environments are facing increasing cyber attacks appeared first on Nextro.

]]>
Harnessing AI solutions for security, operational efficiency, and health and safety compliance  https://nextro.nz/harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance https://nextro.nz/harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance/#comments Fri, 21 Jun 2024 03:56:59 +0000 https://nextro.nz/?p=5020 Harnessing AI solutions for security, operational efficiency, and health and safety compliance  The rise of artificial intelligence (AI) has sparked both excitement over its potential and concerns about its risks. As AI technology continues to evolve, various industries around the globe are exploring its potential applications.   AI, which includes machine learning (ML), deep learning (DL),...

The post Harnessing AI solutions for security, operational efficiency, and health and safety compliance  appeared first on Nextro.

]]>
Harnessing AI solutions for security, operational efficiency, and health and safety compliance 

The rise of artificial intelligence (AI) has sparked both excitement over its potential and concerns about its risks. As AI technology continues to evolve, various industries around the globe are exploring its potential applications.  

AI, which includes machine learning (ML), deep learning (DL), and rule-based expert systems (RBES), has the potential to revolutionise the security, operations, and health and safety of critical infrastructure, industrial sites, retail, and other industries.  

At Nextro, we are already leveraging AI, ML and video analytics to help our customers gain operational leverage and efficiency.  

In this blog post, the Nextro team shares some of its learnings to date, and takes an in-depth look at the benefits of leveraging artificial intelligence and machine learning video analytics solutions to enhance physical security, operational efficiency, as well as health and safety compliance.  

Enhancing Physical Security with AI  

AI physical security applications enable security teams to perform their duties more efficiently and accurately across large datasets. Some well-known examples include:  

  • Video Analytics: AI can analyse real-time video feeds to quickly identify unusual activities from people or vehicles such as loitering or intrusion, allowing security operators to focus on other tasks, increasing overall efficiency.  
  • Face Recognition: AI systems can use biometric data to locate or recognise a person in real-time or from video archives. This is especially useful for law enforcement, retail crime prevention, or VIP use cases. It also can be used to generate highly-accurate dwell-time statistics 
  • People Counting: Automating the counting of people in airports, train stations, stadia, large-footprint retail environments, and businesses aids in managing occupancy, monitoring queues, and alerting staff when necessary. This data assists in enhancing crowd control and understanding peak travel times in transit.  
  • Traffic Flow Management: Using advanced AI technology, traffic flow is effectively managed at large venues, hospitals, and city areas. The system detects backups, promptly alerts staff to any issues, and seamlessly re-routes traffic or adjusts signage as needed to ensure optimal flow.  
  • License Plate Recognition: Recognising license plates assists in investigations and enables touchless parking payment systems.  
  • Object Detection: AI is used to detect objects to secure perimeters at critical infrastructure facilities, prevent smuggling in correctional facilities, and identify left luggage or bomb threats at airports and train stations.  
  • Data Integration: AI systems have the capability to seamlessly integrate with diverse data sources including airport baggage systems, logistics systems, and smart building systems. This integration allows for the analysis, prediction, and proactive response to specific business situations. The data can also be seamlessly outputted to an enterprises own data lake and business intelligence systems for further analysis and reporting.  

Securing critical infrastructure and industrial sites from intrusion, theft, and sabotage is just the initial measure to safeguard production and operations. Sustaining ongoing operations also depends on a strategic and proactive approach to operational efficiency, adhering to health and safety regulations, and ensuring compliance with regulatory requirements.  

AI’s Role in Enhancing Health and Safety  

AI-powered solutions offer far more than traditional methods to minimise disruptions, improve operational efficiency, and enhance health and safety procedures. From risk assessment to accident prevention, AI is reshaping how companies approach and implement health and safety practices.  

AI & Video Analytics Systems for Enhanced Safety Compliance  

The new generation of network cameras, thermal sensors, and access control systems, when paired with AI and analytics technologies, efficiently collect and analyse vast amounts of data. This results in faster and more effective safety interventions, not just in real-time events, but also for future protection, raising the bar for long-term site health and safety procedures.  

Key Applications: 

  • Personal Protective Equipment (PPE) Detection: AI can detect and confirm the presence or absence of required PPE, enabling workplaces to issue corrective actions and link to access control systems to prevent site access without proper PPE.  
  • Restricted Area Monitoring: AI helps prevent incidents in restricted areas and confined spaces. Sensors can trigger equipment shutdowns and alert operations when detecting a person within a risk zone.  
  • Early Fire Detection: AI supports fire detection with early recognition of smoke and fire, allowing prompt action.  
  • Man-Down Detection: Analytics monitor the working environment for slips, falls, or collapses, mitigating risks in lone-worker scenarios and enabling swift response to incidents.  
  • Blocked Exit Notification: AI systems, when paired with well-placed cameras, can detect objects blocking emergency exits or evacuation areas and send alerts. This reduces reliance on a human patrol of the back-of-house corridors and emergency egress points, saving time and money and allowing human resources to focus on more important tasks.  
  • Leak Detection: AI monitors pipes, tanks, and equipment, sending alerts regarding potentially dangerous leaks using thermal technology.  
  • Safety Regulations Compliance: AI analytics systems can automatically detect potential safety hazards, such as workers not wearing protective gear/PPE or unauthorised personnel in restricted areas, allowing prompt intervention and corrective actions.  

Utilising AI in High-Risk Sectors 

AI integration in high-risk fields exemplifies its potential to mitigate issues, create safer environments, and revolutionise approaches to challenging tasks in critical industries:  

  • Predictive Maintenance in Manufacturing: AI-driven systems use sensor data and ML algorithms to forecast equipment failures before they occur, enabling proactive maintenance, reducing downtime, and minimising accident risks.  
  • Hazard Detection in Mining: AI-powered drones with advanced sensors and computer vision capabilities can survey mine sites and detect safety hazards, such as unstable terrain or toxic gas leaks, prioritising worker safety and enabling prompt threat response.  

Wearable Devices and Sensors for Worker Health Monitoring  

Specialised wearable devices are indispensable in safeguarding worker health in hazardous environments. In industries like construction, mining, and manufacturing, smart helmets equipped with sensors detect harmful gases, monitor environmental conditions, and assess potential head injuries. These wearables can automatically trigger alerts or emergency responses in case of accidents, ensuring timely assistance and preventing severe consequences. 

Disaster Response and Rescue Operations  

In high-risk situations, such as natural disasters or search-and-rescue operations, AI-powered drones and robots aid first responders in assessing situations, locating survivors, and navigating hazardous environments. These technologies enable more effective disaster response and help protect the safety of rescue teams.  

AI has significantly impacted workplace security and safety through its practical applications, paving the way for a future where protection and progress are intrinsically linked. The adoption of AI for health and safety in the workplace marks a significant shift in today’s organisations. AI-driven solutions offer predictive maintenance, real-time risk assessments, virtual reality training, and wearable devices to enhance workplace safety, mitigate risks, and boost productivity.  

By identifying safety hazards and empowering workers with AI-driven insights, organisations can foster a culture of prevention, creating a collaborative work environment where technology complements human capabilities.  

If you want to know more about how to use artificial intelligence, machine learning and camera analytics to safeguard your organisation, dramatically increase operational efficiencies, surface up business insights, and improve health and safety compliance, please get in touch with the Nextro team now.   

Sources: https://itbrief.com.au/story/ai-in-physical-security-opportunities-risks-and-responsibility
https://www.thedigitalspeaker.com/transformative-role-ai-revolutionising-workplace-health-safety/

The post Harnessing AI solutions for security, operational efficiency, and health and safety compliance  appeared first on Nextro.

]]>
https://nextro.nz/harnessing-ai-solutions-for-security-operational-efficiency-and-health-and-safety-compliance/feed/ 1