Nextro https://nextro.nz/ Managed Telecommunications, Network & Security Solutions NZ Thu, 02 Oct 2025 19:35:18 +0000 en-NZ hourly 1 https://wordpress.org/?v=6.8.3 https://nextro.nz/wp-content/uploads/2020/05/cropped-image001-32x32.png Nextro https://nextro.nz/ 32 32 Genetec Expands Global Access Control Market Share with Strong Growth in 2025 https://nextro.nz/genetec-expands-global-access-control-market-share-with-strong-growth-in-2025/?utm_source=rss&utm_medium=rss&utm_campaign=genetec-expands-global-access-control-market-share-with-strong-growth-in-2025 Thu, 02 Oct 2025 02:59:31 +0000 https://nextro.nz/?p=6606 Genetec records the fastest growth in Asia Pacific, including New Zealand, in Omdia’s 2025 Access Control Report. Nextro brings these global innovations to New Zealand organisations with unified security solutions.

The post Genetec Expands Global Access Control Market Share with Strong Growth in 2025 appeared first on Nextro.

]]>

Genetec Expands Global Access Control Market Share with Strong Growth in 2025

Genetec, Montréal, October 2, 2025

Genetec has secured the #2 position worldwide for access control software and recorded the fastest organic growth in Asia Pacific, including New Zealand, according to Omdia’s newly released  2025 Access Control Report.

In an industry shaped by mergers and acquisitions, the report shows that Genetec achieved the highest organic global market share gain in on-premises access control software. For customers, partnering with a company focused on product innovation and stable growth rather than portfolio consolidation means they can plan long-term with confidence.

According to the Omdia report, Genetec also ranked as one of the fastest organically growing vendors in the Access Control as a service (ACaaS) segment in the Americas region, which represents more than 70% of the global market. This growth was propelled by the rapid adoption of Security Center SaaS, the company’s open, unified physical security cloud-based platform. Genetec has delivered ACaaS solutions since 2017, demonstrating its long-standing experience in helping organizations adopt cloud-based access control at their own pace.

Genetec retained its #2 position in the Americas for access control software market share, gained ground in EMEA, and remained among the top 10 providers in Asia Pacific*, where it once again recorded the region’s highest rate of organic growth.

According to Bryan Montany, Principal Research Analyst, Physical Security at Omdia, “The access control software market has been the fastest growing global driver of access control equipment sales over the past decade as the industry has become more software centric. Cloud-based solutions have emerged as a significant growth driver due to their scalability and their enhanced data processing capabilities. The strong organic growth achieved by Genetec demonstrates the appeal of its flexible deployment options, broad interoperability with third-party hardware, and unified security systems platform.”

Genetec access control solutions scale seamlessly from a single site to global deployments and give organizations the flexibility to run fully on-premises, in the cloud, or to deploy with a mix of both. Built on an open architecture, Genetec eliminates vendor lock-in and lets customers choose the hardware and third-party integrations that best meet their needs. Access control in Genetec Security Center and Security Center SaaS can also be unified with video, intrusion, communications, and other systems in a single interface, delivering stronger situational awareness and more efficient operations.

In addition to its 2025 access control report, Omdia recently released its 2025 Video Surveillance & Analytics Report, which showed that Genetec retained its #1 position worldwide in video surveillance software, and is also ranked #1 globally in the broader category that combines video surveillance software and Video Surveillance as a Service (VSaaS).

“For more than 25 years, our development strategy has focused on anticipating customer needs and delivering practical innovations. The consistent year-over-year growth noted by analysts in the access control and VMS markets is a testament to our long-standing commitment to open, unified systems, robust cybersecurity, and privacy by design,” said Christian Morin, Vice President of Product Engineering and Chief Security Officer at Genetec Inc.

What this means for the New Zealand market

With Asia Pacific recording the highest organic growth rate, New Zealand organisations are directly part of this regional momentum. More New Zealand businesses are seeking to modernise access control, unify security platforms, and explore cloud-based deployments.

As New Zealand’s top Genetec partner, Nextro helps bring this global innovation to the New Zealand market, tailoring deployments to meet the specific needs of New Zealand enterprises, crowded spaces, and critical infrastructure operators. By combining Genetec’s globally recognised solutions with Nextro’s local expertise, organisations gain access to trusted technology that is scalable, resilient, and designed with cybersecurity at its core.

Contact the Nextro team today. We are here to help you harness the latest in access control solutions, be they on premise, in the cloud or hybrid.

The post Genetec Expands Global Access Control Market Share with Strong Growth in 2025 appeared first on Nextro.

]]>
Lessons for New Zealand from the Fortinet 2025 State of OT Cybersecurity Report  https://nextro.nz/lessons-for-new-zealand-from-the-fortinet-2025-state-of-ot-cybersecurity-report/?utm_source=rss&utm_medium=rss&utm_campaign=lessons-for-new-zealand-from-the-fortinet-2025-state-of-ot-cybersecurity-report Thu, 02 Oct 2025 01:06:44 +0000 https://nextro.nz/?p=6589 Fortinet’s 2025 State of Operational Technology and Cybersecurity Report highlights global OT security trends. Nextro shares insights for New Zealand businesses on improving resilience and protecting critical operations.

The post Lessons for New Zealand from the Fortinet 2025 State of OT Cybersecurity Report  appeared first on Nextro.

]]>
Lessons for New Zealand from the Fortinet 2025 State of OT Cybersecurity Report 

Global OT security trends and what they mean for New Zealand organisations in 2025

Fortinet has released its 2025 State of Operational Technology and Cybersecurity Report, a global study of 550 OT professionals across industries including energy, healthcare, manufacturing, and logistics. The findings show that OT security is maturing worldwide, with responsibility increasingly elevated to the C-suite, intrusions declining among more mature organisations, and best practices such as vendor consolidation, threat intelligence, and segmentation proving effective. For New Zealand organisations operating critical infrastructure, these trends provide valuable lessons. Nextro has analysed the report and drawn out insights specific to the New Zealand market. 

OT security rises to the boardroom 

One of the strongest messages from the report is that responsibility for OT cybersecurity is shifting into executive leadership. More than half of organisations now place OT security under the Chief Information Security Officer, compared to just 16 percent in 2022. This evolution signals that OT is no longer seen as a siloed technical issue but as a matter of corporate governance, risk, and reputation. 

Maturity is the key to fewer intrusions 

The study shows a strong link between security maturity and resilience. Organisations at the highest levels of maturity reported far fewer breaches, with 65 percent of Level 4 organisations experiencing no intrusions in 2025. In contrast, those at lower maturity levels faced more frequent attacks, particularly phishing and ransomware. For New Zealand, the lesson is clear: investing in structured, process-driven security yields measurable reductions in risk. 

Consolidation as a path to resilience

Another major shift is the consolidation of technology vendors. Nearly eight in ten organisations worldwide now work with only one to four OT vendors, reducing complexity and simplifying operations. For New Zealand organisations, where teams are often small and resources tight, adopting a platform approach can bring similar benefits. Integration and simplification reduce overheads while enhancing visibility and security outcomes.  

Preparing for regulatory change 

Two-thirds of survey participants expect new OT compliance requirements within the next five years, and many believe these changes will arrive much sooner. While New Zealand has not yet introduced stringent OT regulations, the global move towards frameworks such as IEC 62443 suggests it is only a matter of time. Local organisations that align early with international standards will be better prepared for regulatory pressure and more resilient in the face of scrutiny. 

Managing the legacy challenge 

Most OT devices in use globally are more than six years old, with many incapable of being patched. This situation mirrors the reality in New Zealand, where industrial infrastructure often relies on ageing systems. To protect these environments, organisations must adopt compensating measures such as segmentation, OT-specific monitoring, and virtual patching. These approaches extend the life of critical assets without leaving security gaps. 

Lessons for New Zealand leaders

The Fortinet 2025 report demonstrates that maturity, consolidation, and proactive governance are transforming OT security globally. For New Zealand businesses, the takeaways are clear: elevate OT security into board-level discussions, pursue continuous improvement to reach higher maturity, reduce complexity through platform integration, and prepare for both regulatory and legacy challenges. 

Contact Nextro today to discover how your organisation can strengthen long-term security maturity, streamline through vendor consolidation, prepare for upcoming regulatory change, and manage the risks of legacy systems.

The post Lessons for New Zealand from the Fortinet 2025 State of OT Cybersecurity Report  appeared first on Nextro.

]]>
Learnings from the 2025 Data Security Report https://nextro.nz/learnings-from-the-2025-data-security-report/?utm_source=rss&utm_medium=rss&utm_campaign=learnings-from-the-2025-data-security-report Tue, 30 Sep 2025 02:13:11 +0000 https://nextro.nz/?p=6576 Discover insights from the Fortinet 2025 Data Security Report and how Nextro helps NZ organisations modernise data protection beyond traditional DLP.

The post Learnings from the 2025 Data Security Report appeared first on Nextro.

]]>
Learnings from the 2025 Data Security Report

Beyond Traditional Data Loss Prevention Solutions: Building Modern Data Security for New Zealand Organisations

In August 2025, Fortinet, in partnership with Cybersecurity Insiders, released the 2025 Data Security Report. Based on a global survey of 883 IT and cybersecurity professionals, the report explores the state of enterprise data protection, where traditional Data Loss Prevention (DLP) tools are falling short, and what capabilities are most critical for the future. New Zealand businesses are generating and sharing more sensitive data than ever before, from customer records and financial reports to intellectual property. Yet the Fortinet 2025 Data Security Report shows that legacy Data Loss Prevention (DLP) tools are increasingly failing to protect this information in today’s cloud-driven, AI-enabled environments. For New Zealand SMBs, enterprises, government agencies, and critical infrastructure operators, this presents both a challenge and an opportunity.

Persistent Risk in the Modern Workplace

The report found that 77% of organisations experienced insider-related data loss in the past 18 months, with most incidents caused by accidental errors rather than malicious actors. In New Zealand’s tight-knit business ecosystem, such breaches can damage trust quickly and have lasting reputational impact. What’s more, 72% of organisations admitted they lack visibility into how users interact with sensitive data across endpoints and cloud services. That’s a major blind spot as Kiwi businesses increasingly adopt SaaS tools, AI platforms, and remote working models.

The High Cost of Data Exposure

Globally, 45% of organisations reported financial or revenue loss from data exposure, with 41% estimating damages between $1 million and $10 million for their most significant incident. While the dollar figures may differ in New Zealand, the impacts are just as serious: operational disruption, regulatory scrutiny, and erosion of public trust.

For industries such as healthcare, financial services, and manufacturing, key pillars of New Zealand’s economy, the stakes are even higher when customer records, personal data, or proprietary designs are exposed.

Why Traditional DLP Falls Short

Traditional DLP tools focus on blocking data flows but fail to understand the context of user behaviour. Only 33% of organisations said they have immediate visibility into data usage, and just 27% could see which users were putting data at risk.

For New Zealand organisations, this means risk often goes undetected until it becomes a serious incident, whether that’s a staff member accidentally uploading sensitive files to a personal cloud, or AI tools being used without oversight.

What Security Leaders Want Next

According to the report, the top priorities for next-generation data protection include:
• Real-time behavioural analytics (66%)
• Day-one visibility into data flows (61%)
• Control over shadow AI and SaaS tools (52%)

These priorities align closely with the needs of New Zealand businesses, where rapid cloud adoption and increasing use of AI are reshaping how data is created, stored, and shared.

Nextro’s insights for New Zealand

The report highlights a clear shift: effective data protection must evolve from static enforcement to context-driven insight. For New Zealand organisations, the priority is not creating more alerts but gaining clarity around who is moving sensitive data, why it is happening, and whether the activity poses real risk.

By aligning Fortinet’s next-generation DLP and insider risk management capabilities with local requirements, Nextro identifies a pathway for New Zealand businesses to strengthen visibility, reduce the likelihood of accidental exposure, and build resilience against insider-driven incidents.

Contact Nextro today for a data security assessment and for building a modern data protection strategy that keeps your business secure in an AI-driven, hybrid world.

The post Learnings from the 2025 Data Security Report appeared first on Nextro.

]]>
New Zealand Faces Most Challenging Security Environment in Recent History https://nextro.nz/new-zealand-faces-most-challenging-security-environment-in-recent-history/?utm_source=rss&utm_medium=rss&utm_campaign=new-zealand-faces-most-challenging-security-environment-in-recent-history Thu, 21 Aug 2025 01:42:59 +0000 https://nextro.nz/?p=6449 The New Zealand Security Intelligence Service (NZSIS) has released its 2025 Threat Environment Report, revealing that the country is confronting its most complex national security landscape in decades.

Despite our geographic isolation in the South Pacific, New Zealand remains firmly in the crosshairs of sophisticated international threats.
See Nextro's summary of the report.

The post New Zealand Faces Most Challenging Security Environment in Recent History appeared first on Nextro.

]]>

New Zealand Faces Most Challenging Security Environment in Recent History

The New Zealand Security Intelligence Service (NZSIS) has released its 2025 Threat Environment Report, revealing that the country is confronting its most complex national security landscape in decades.

Despite our geographic isolation in the South Pacific, New Zealand remains firmly in the crosshairs of sophisticated international threats.
See Nextro’s summary of the report below.

Six Critical Security Assessments for 2025

The NZSIS makes six key assessments about New Zealand’s
threat environment in 2025:

  • Lone actor terrorist attacks – The most plausible violent extremist attack scenario remains a lone actor who has radicalised online and prepares for violence without intelligence forewarning, likely using easily accessible weapons
  • Online-driven extremist support – Grievances and polarising issues in online spaces are almost certainly driving support for a range of violent extremist ideologies, with no single ideology presenting a greater threat
  • Youth radicalisation risk – Young and vulnerable people are particularly at risk of radicalisation, especially while online
  • Active foreign interference – Multiple states are conducting foreign interference activities, including transnational repression targeting diaspora communities
  • Undetected espionage – It is almost certain there is undetected espionage activity harming New Zealand’s national interests, with foreign states continuing to target critical organisations, infrastructure and technology
  • Insider exploitation – Some foreign states have attempted to exploit people inside public and private sector organisations through deceptive, corruptive, or coercive means

The Threat Landscape

The report reveals that a terrorist attack remains a “realistic possibility,” with young and vulnerable New Zealanders particularly at risk of online radicalisation. Foreign interference activities continue across multiple fronts, with several states actively targeting New Zealand. The People’s Republic of China remains the most active, though it’s not the only concern. These activities include transnational repression targeting diaspora communities, particularly those from certain religions, ethnicities, Rainbow communities, and pro-democracy movements.

The Global Context

Three global themes are driving these security challenges: strategic competition between major powers (particularly involving the US, China, and Russia), increasingly polarised and violent online rhetoric, and rapid technological advancement that’s both creating opportunities and vulnerabilities.

The report emphasises that while New Zealand may seem distant from global security hotspots, our economic connectedness, diverse society, and strategic location in an increasingly contested Indo-Pacific region make us a target for states seeking power and influence.

Looking Forward

The NZSIS stresses that while threats cannot always be eliminated, risks can be managed through awareness and robust security practices. The agency continues to call for public vigilance, encouraging New Zealanders to report concerning behaviour through their online portal at nzsis.govt.nz.

As global instability continues and shared international values degrade, the report makes clear that foreign interference and espionage activities are likely to intensify. For a nation that has long prided itself on being safely removed from international conflicts, this assessment serves as a sobering reminder that in our interconnected world, no country is truly isolated from global security challenges.

The full report provides detailed protective security advice for organisations and communities, emphasising that national security is increasingly everyone’s responsibility in this challenging new environment.

Whether you manage a crowded place, critical infrastructure, large retail, hospitality or logistics environment, contact Nextro today to discuss your protective security requirements.

Download a full copy of the report below.

The post New Zealand Faces Most Challenging Security Environment in Recent History appeared first on Nextro.

]]>
New Biometric Processing Privacy Code for New Zealand 2025 https://nextro.nz/new-biometric-processing-privacy-code-for-nz-2025/?utm_source=rss&utm_medium=rss&utm_campaign=new-biometric-processing-privacy-code-for-nz-2025 Wed, 13 Aug 2025 03:26:15 +0000 https://nextro.nz/?p=6426 The Biometric Processing Privacy Code 2025 outlines how biometric information, such as facial features or iris scans, must be managed under the Privacy Act. It applies to technologies used to identify individuals or to learn about them, and sets expectations for transparency, necessity, fairness, and accountability in the use of these technologies. 

The post New Biometric Processing Privacy Code for New Zealand 2025 appeared first on Nextro.

]]>

New Biometric Processing Privacy Code for New Zealand 2025

A major update for biometric security solutions in New Zealand

On 21 July 2025, the Office of the Privacy Commissioner in New Zealand announced the release of the Biometric Processing Privacy Code 2025. This is a significant milestone in regulating how biometric technologies, such as facial recognition, are used across New Zealand. The Code introduces specific rules for organisations collecting, using, and processing biometric information. 

The new Code reinforces the importance of privacy in an era where biometric authentication is rapidly expanding across sectors, from critical infrastructure and public venues to private enterprise. It will be interesting to see how it is interpreted and whether it fits all use cases. Nextro recommends its customers to take note and follow the new code.

The Biometric Processing Privacy Code 2025 outlines how biometric information, such as facial features or iris scans, must be managed under the Privacy Act. It applies to technologies used to identify individuals or to learn about them, and sets expectations for transparency, necessity, fairness, and accountability in the use of these technologies. 

Key Obligations for New Zealand Businesses:

For New Zealand organisations using biometric systems, including facial recognition cameras and biometric access control, the Code introduces the following key obligations.

  • Transparency: Businesses must ensure people know when their biometric information is being collected. Clear, accessible signage and privacy statements must be visible at the point of collection. 
  • Purpose limitation: Biometric data must only be collected for specific, lawful purposes. The use must be necessary for that purpose and not collected ‘just in case’. 
  • Necessity and proportionality: Organisations must assess whether less privacy-intrusive options exist before using biometric tech. If a swipe card or PIN can reasonably meet the same purpose, biometric use may not be justified. 
  • Privacy Impact Assessments (PIAs): A PIA is required for any biometric processing activity, documenting risks and mitigations. This is mandatory and should be completed prior to deployment. 
  • Consent and alternatives: In many cases, particularly in workplaces or public access scenarios, individuals must be offered a genuine alternative to biometric enrolment, unless an exemption applies. 
  • Special restrictions: Certain uses, like real-time facial recognition in public, or profiling individuals based on biometric data, are considered high-risk, and face stricter scrutiny under the Code. 

The Code comes into effect on 3 November 2025 with new systems deployed after that date having to be compliant. A grace period for existing biometric systems, in operation prior to 3 November 2025, gives operators until 3 August 2026 to meet the updated compliance standards. New systems will need to be compliant from 3 November 2025.

This timeframe is short and likely insufficient for large organisations. Nextro recommends that business start early to ensure sufficient time to assess and align their technologies, policies, and processes. 

Nextro will continue to work closely with its technology partners and customers to ensure that our evolving biometric solutions are capable of meeting the requirements of the Code.  

We encourage all businesses using or considering biometric technologies to familiarise themselves with the Code.  

Please reach out to the Nextro team to discuss our face recognition, iris recognition, and finger print biometric access control solutions.

Nextro Biometric Access Control

The post New Biometric Processing Privacy Code for New Zealand 2025 appeared first on Nextro.

]]>
Why New Zealand IT Managers Must Embrace Operational Technology Security Platforms https://nextro.nz/why-new-zealand-it-managers-must-embrace-operational-technology-security-platforms/?utm_source=rss&utm_medium=rss&utm_campaign=why-new-zealand-it-managers-must-embrace-operational-technology-security-platforms Wed, 23 Jul 2025 02:41:05 +0000 https://nextro.nz/?p=6239 As New Zealand’s critical infrastructure and industrial assets become increasingly digitised, cybersecurity risks tied to operational technology (OT) environments continue to rise. In light of these evolving threats, CISOs must rethink their priorities. This Nextro insight explores why embracing an OT security platform is essential for aligning with strategic goals like vendor consolidation and IT/OT convergence.

The post Why New Zealand IT Managers Must Embrace Operational Technology Security Platforms appeared first on Nextro.

]]>
Why New Zealand IT Managers Must Embrace Operational Technology Security Platforms

As New Zealand’s critical infrastructure and industrial assets become increasingly digitised, cybersecurity risks tied to operational technology (OT) environments continue to rise.

Operational Technology (OT) environments in New Zealand face unprecedented cybersecurity risks as digital transformation accelerates. While IT leaders have traditionally prioritised information technology (IT) systems, the convergence of IT and OT now demands equal focus on securing critical industrial systems. Recent research conducted by Fortinet shows that 96% of organisations expect challenges as they move towards IT-OT convergence, yet the benefits in operational efficiency, cost savings, and innovation are too significant to ignore. This Nextro insight explores why embracing an OT security platform is essential for aligning with strategic goals like vendor consolidation and IT/OT convergence.

The Growing OT Threat Landscape

The rapid integration of IT and OT systems has expanded the potential attack surface. Threats once limited to IT now have pathways into OT, impacting industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks. Cybercriminals are increasingly targeting cyber-physical systems (CPS) in OT and critical infrastructure sectors, resulting in productivity losses, revenue hits, damage to brand reputation, compromise of business-critical data, and even risks to physical safety. In the past year, 9 out of 10 OT organisations globally experienced at least one intrusion, with malware and phishing being the most common attack vectors.

Why New Zealand IT Managers Need an OT Security Platform

The ongoing skills shortage across cybersecurity and network roles is magnified in OT, where specialised knowledge is critical. Historically underfunded and overlooked, OT teams are now overwhelmed. Increased cyberattacks have accelerated the demand for better cybersecurity protection for OT networks and their underlying systems.

The complexity of securing OT environments, combined with a shortage of skilled personnel, makes platform-based security essential. An OT security platform enables IT and OT convergence, vendor consolidation, and centralised management, simplifying operations while reducing the total cost of ownership. It also provides the flexibility to address evolving threats, ensures operational continuity, and supports strategic goals such as zero-trust security adoption.

For example, the Fortinet OT Security Platform integrates secure networking, security service edge (SSE), OT-specific security operations (OT SecOps), threat intelligence, and a broad ecosystem of technology partners. This unified approach eliminates the need for multiple disjointed products, reducing vendor sprawl and enhancing security posture across both IT and OT networks.

Key Considerations for Secure Digital Transformation

Organisations embarking on industrial digital transformation should assess potential security partners against several criteria:

– Full edge-to-cloud security coverage, from ruggedised firewalls and secure switches in industrial zones to cloud security capabilities.
– SD-WAN integration to improve ROI while enhancing security.
– Support for OT-specific protocols and asset discovery tools.
– Federated management and air-gapped licensing for secure deployments.
– An extensive partner ecosystem that integrates with existing vendor solutions.
– Converged IT/OT security operations for streamlined management and rapid incident response.

Capabilities of a Modern OT Security Platform

A comprehensive OT security platform should provide:
– Network segmentation and microsegmentation to isolate critical assets.
– Virtual patching to protect unpatched systems, with thousands of vulnerability signatures covering major ICS vendors.
– Asset discovery, compliance reporting (e.g., IEC 62443, NERC CIP), and risk analysis.
– Integrated threat detection, incident response automation, and deception technologies such as honeypots.
– AI-powered network detection and response for sub-second threat identification.

Supporting Consolidation and Convergence

At Nextro, we understand the unique cybersecurity demands of industrial operations in New Zealand. As a trusted partner for converged IT and OT security solutions, we help New Zealand businesses implement OT security platforms that align with operational requirements while strengthening cybersecurity resilience.

For New Zealand IT managers, the path forward involves leveraging OT security platforms to unify security controls, reduce complexity, and bridge the IT/OT divide. This approach not only strengthens defences against increasingly sophisticated threats but also supports operational priorities such as production reliability and personnel safety.

With the right platform, consolidation and convergence become achievable, enabling organisations to securely advance their digital transformation goals while safeguarding critical infrastructure.

Ready to secure your OT environment and simplify your vendor landscape? Talk to the team at Nextro today to explore how our Fortinet platform-led security solutions can support your digital and operational priorities.

The post Why New Zealand IT Managers Must Embrace Operational Technology Security Platforms appeared first on Nextro.

]]>
Navigating the 2025 Cyber Threat Landscape https://nextro.nz/navigating-the-2025-cyber-threat-landscape/?utm_source=rss&utm_medium=rss&utm_campaign=navigating-the-2025-cyber-threat-landscape Wed, 23 Jul 2025 02:40:15 +0000 https://nextro.nz/?p=6247 The 2025 Fortinet Global Threat Landscape Report paints a stark picture of an increasingly aggressive and sophisticated cyber threat environment.

The post Navigating the 2025 Cyber Threat Landscape appeared first on Nextro.

]]>
Navigating the 2025 Cyber Threat Landscape

The 2025 Fortinet Global Threat Landscape Report paints a stark picture of an increasingly aggressive and sophisticated cyber threat environment.

With automation, artificial intelligence, and commoditised cybercrime tools at their disposal, threat actors are moving faster than ever. For New Zealand organisations, particularly those in critical infrastructure and cloud-first sectors, the shift to proactive cybersecurity is no longer optional, it is imperative.

Automation is fuelling a surge in reconnaissance

In 2024, cybercriminals ramped up automated reconnaissance efforts, with global scan volumes rising by 16.7%. These scans, often using tools like SIPVicious and targeting protocols like SIP and Modbus TCP, were used to map exposed digital assets before organisations had a chance to patch vulnerabilities.

AI and CaaS are supercharging cybercrime

Artificial intelligence has now become a staple in the cybercrime toolkit. Threat actors are deploying AI-powered tools like FraudGPT and ElevenLabs to generate phishing content, deepfake videos, and synthetic voices. Combined with the rise of Cybercrime-as-a-Service (CaaS), which offers everything from stolen credentials to Initial Access Broker services, the barrier to entry for attackers has never been lower.

Exploitation at scale: From initial access to persistent threats

Despite no significant drop in the time it takes to exploit vulnerabilities (remaining near a 5.4-day average), the scale of attacks surged, with over 97 billion exploitation attempts recorded in 2024. Common targets included IoT devices, firewalls, and routers, which are often exploited for lateral movement or botnet control.

Stealth tactics post-breach

Post-exploitation behaviours are increasingly stealthy, with attackers using legitimate Windows utilities and encrypted C2 channels to evade detection. Techniques such as DCShadow and RDP-based lateral movement are growing more common, particularly in attacks involving ransomware or espionage.

Cloud remains a soft target

The cloud remains a primary battleground. Misconfigurations, over-permissioned identities, and exposed APIs continue to allow attackers easy entry.

Telemetry from FortiCNAPP revealed that in 70% of cloud compromise incidents, identity misuse from unfamiliar geographies was a key indicator. Attackers often move laterally within cloud environments using legitimate services for cover.

Nextro’s call to action for IT Managers

The report underscores the need for Continuous Threat Exposure Management (CTEM). NZ IT Managers must move beyond traditional threat detection and embrace proactive strategies such as adversary emulation, attack surface monitoring, and automated patch prioritisation. With threat actors operating at machine speed, cyber defence must do the same.

Nextro’s call to action for New Zealand

For organisations and their boards of directors across New Zealand, especially those operating in sectors like energy, transport, education, and government, the findings of the 2025 Threat Landscape Report are a pressing reminder that traditional defences are no longer sufficient. With automated reconnaissance now occurring at a rate of 36,000 scans per second globally, it’s not a question of ‘if’ a vulnerability will be found, but ‘when’.

Nextro works with New Zealand enterprises to anticipate and mitigate cyber risk before adversaries strike. Our team implements solutions aligned with Continuous Threat Exposure Management (CTEM), enabling your organisation to simulate real-world threats, prioritise patching based on risk, and reduce your attack surface in cloud, hybrid and OT environments.

Whether you’re facing legacy IoT challenges, cloud misconfigurations, or targeted phishing campaigns staff, Nextro can help you take back control of your cyber terrain. Our partnerships with global leaders like Fortinet give you the insight, tools, and support to operate securely at speed.

Ready to enhance your cybersecurity and reduce your risk? Contact the Nextro team today to enhance your cybersecurity posture.

The post Navigating the 2025 Cyber Threat Landscape appeared first on Nextro.

]]>
Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™  https://nextro.nz/genetec-enhances-digital-evidence-management-with-ai-powered-scene-redaction-in-clearance/?utm_source=rss&utm_medium=rss&utm_campaign=genetec-enhances-digital-evidence-management-with-ai-powered-scene-redaction-in-clearance Wed, 23 Jul 2025 02:36:43 +0000 https://nextro.nz/?p=6256 Nextro is proud to highlight the latest innovation from our strategic partner Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions. Genetec has announced a major enhancement to its digital evidence management system, Genetec Clearance™, with the addition of Scene Redaction, an AI-powered capability that significantly accelerates the process of preparing video evidence for sharing.

The post Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™  appeared first on Nextro.

]]>

Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™ 

Nextro is proud to highlight the latest innovation from our strategic partner Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions. Genetec has announced a major enhancement to its digital evidence management system, Genetec Clearance™, with the addition of Scene Redaction, an AI-powered capability that significantly accelerates the process of preparing video evidence for sharing.

A major step forward for video redaction

Traditional manual redaction is often slow and labour-intensive, especially when dealing with large volumes of footage involving multiple individuals and moving elements. With Scene Redaction, Genetec Clearance leverages advanced AI and machine learning to identify people in a scene and automatically apply blurring, dramatically reducing the time and effort required by investigators and privacy officers.

“Redacting video evidence to protect privacy is both a legal obligation and a practical challenge for organisations around the world. Scene Redaction allows users to do this with unprecedented speed and consistency,” said Samir Sinha, Product Group Director at Genetec Inc.

Built for public and private sector needs

Genetec Clearance is already trusted by public safety agencies, police, retailers, and private enterprises across New Zealand and internationally. This new redaction capability is particularly relevant for local government, education providers, security firms, and other organisations subject to Privacy Act 2020 obligations in New Zealand.

As privacy regulations become more stringent and public scrutiny of video surveillance increases, the need for reliable and efficient redaction tools is more critical than ever. Scene Redaction ensures compliance without slowing down operations.

Seamless integration with existing workflows

Clearance users can access Scene Redaction directly within the platform’s intuitive interface. It complements the system’s existing redaction tools, which allow for manual redaction or blurring based on facial recognition, and works across footage from various sources, including body-worn cameras, fixed surveillance, and mobile devices.

At Nextro, we see this as a game-changing advancement for businesses across New Zealand. Whether you’re managing critical infrastructure, safeguarding schools, or coordinating a public safety response, this update to Genetec Clearance delivers powerful tools to ensure evidence integrity and individual privacy, fast.

Want to know more?

To learn how Genetec Clearance™ with Scene Redaction can support your organisation’s evidence management and compliance workflows, contact the Nextro team today, we’re here to help New Zealand businesses and agencies harness the latest in secure, privacy-forward technologies.

The post Genetec Enhances Digital Evidence Management with AI-Powered Scene Redaction in Clearance™  appeared first on Nextro.

]]>
The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence https://nextro.nz/the-genetec-cloudrunners-revolutionary-mapping-transforming-anpr-investigations-through-geographic-intelligence/?utm_source=rss&utm_medium=rss&utm_campaign=the-genetec-cloudrunners-revolutionary-mapping-transforming-anpr-investigations-through-geographic-intelligence Wed, 04 Jun 2025 02:31:10 +0000 https://nextro.nz/?p=6082 Read Nextro’s insight on how Genetec’s precision-based mapping and collaborative camera networks are reshaping vehicle-centric investigations

The post The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence appeared first on Nextro.

]]>
The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence

Read Nextro’s insight on how Genetec’s precision-based mapping and collaborative camera networks are reshaping vehicle-centric investigations

Genetec has fundamentally transformed how security professionals conduct vehicle-centric investigations with the introduction of advanced mapping capabilities and collaborative camera discovery for the Genetec Cloudrunner. These enhancements represent more than incremental improvements—they constitute a paradigm shift in ANPR investigation methodology, enabling unprecedented precision and collaborative reach across partner networks.

Precision Geographic Investigations Replace Manual Camera Selection

Traditional ANPR investigations required security operators to manually select cameras based on naming conventions, creating significant potential for oversight and inefficiency. The Genetec Cloudrunner’s new precision-based mapping eliminates this limitation through intelligent geographic search capabilities. The polygon tool within the Vehicle-Centric Investigation System (VCIS) allows investigators to define exact search areas on interactive maps, automatically including all relevant cameras within the selected region.

This geographic approach proves particularly valuable for complex facilities such as airports and ports, where camera networks span extensive areas with varied naming conventions. Rather than attempting to identify relevant cameras through potentially confusing asset names, investigators can simply draw their area of interest and immediately access all available vehicle reads within that geographic boundary. The system provides instant visual feedback, displaying read counts per camera and comprehensive tile views of all detected vehicles.

Collaborative Camera Networks Expand Investigative Reach

The Genetec Cloudrunner’s most significant advancement lies in its collaborative camera discovery and partnership capabilities. The new ‘Cameras’ tab reveals three distinct categories of available cameras: organisational cameras, existing partner cameras, and potential partner cameras marked as ‘discoverable’ by their tenant owners. This transparency enables investigators to identify gaps in coverage and opportunities for enhanced collaboration.

The streamlined partnership request process transforms what previously required complex negotiations into simple administrative workflows. When investigators identify relevant partner cameras during active investigations, they can flag potential partnerships directly to system administrators, who can then submit access requests efficiently. This capability proves invaluable for incidents spanning multiple jurisdictions or facilities, enabling seamless investigative continuity across organisational boundaries.

Real-World Applications in Critical Infrastructure

For New Zealand’s interconnected infrastructure networks, the Cloudrunner’s mapping capabilities deliver immediate operational benefits. Consider a security incident originating at an Airport and extending through surrounding commercial areas—investigators can now track vehicle movements seamlessly across partner camera networks without manual coordination delays. The geographic search tools ensure comprehensive coverage whilst collaborative features enable rapid access to additional camera resources.

Similarly, port security operations benefit from the ability to define precise perimeter searches and identify vehicle patterns across extended facility boundaries. The mapping interface provides intuitive visualisation of vehicle behaviours and movement patterns, enabling security teams to identify reconnaissance activities, track suspicious vehicles, and analyse operational trends with unprecedented clarity.

Enhanced Investigative Workflows and Pattern Analysis

The Cloudrunner’s mapping integration transforms investigative workflows by combining geographic precision with comprehensive vehicle data analysis. Investigators can apply multiple filters—including number plate characteristics, vehicle colour, and type—within specific geographic boundaries, immediately visualising results through both map displays and detailed tile views. This integrated approach enables rapid identification of target vehicles and comprehensive analysis of their movement patterns over time.

The ability to track driving behaviours and patterns across geographic regions provides valuable intelligence for both immediate investigations and long-term security planning. Security professionals can identify recurring patterns, potential vulnerabilities, and suspicious activities that might otherwise remain undetected through traditional investigation methods.

Strategic Implementation for Maximum Effectiveness

Organisations implementing the Genetec Cloudrunner’s advanced mapping capabilities should prioritise camera discoverability settings and partnership strategies. The collaborative features function optimally when camera networks are appropriately configured for discovery and partnership requests, enabling maximum investigative reach across regional security communities.

The polygon search tools require minimal training but deliver substantial efficiency improvements, particularly for organisations managing extensive camera networks across large geographic areas. Security teams should consider integrating these mapping capabilities with existing investigation protocols to maximise operational benefits whilst maintaining comprehensive documentation standards.

The Evolution of Collaborative Security Intelligence

The Genetec Cloudrunner’s mapping advancements represent the future of collaborative security operations, where geographic intelligence and partnership networks combine to create comprehensive investigative capabilities. As these technologies mature, organisations that embrace collaborative ANPR networks will possess significant advantages in incident response, pattern recognition, and community-wide security coordination.

For security professionals managing critical infrastructure, commercial facilities, or transport networks, the Cloudrunner’s enhanced mapping capabilities offer immediate opportunities to improve investigative efficiency whilst building stronger collaborative relationships across the security community.

Discover how Genetec the Cloudrunner’s new advanced mapping capabilities can transform your security investigations. Contact Nextro’s specialists to explore implementation opportunities.

The post The Genetec Cloudrunner’s Revolutionary Mapping: Transforming ANPR Investigations Through Geographic Intelligence appeared first on Nextro.

]]>
The State of AI in Video Surveillance: Industry Perspectives 2025 https://nextro.nz/the-state-of-ai-in-video-surveillance-industry-perspectives-2025/?utm_source=rss&utm_medium=rss&utm_campaign=the-state-of-ai-in-video-surveillance-industry-perspectives-2025 Tue, 13 May 2025 04:52:30 +0000 https://nextro.nz/?p=5957 In this Nextro analysis, we set out key insights from Axis Communications’ 2025 report on AI in video surveillance. As an Axis Gold Partner and trusted strategic technology partner for many New Zealand businesses, we know that understanding these trends is crucial for our clients seeking to enhance their security posture and gain operational efficiencies.

The post The State of AI in Video Surveillance: Industry Perspectives 2025 appeared first on Nextro.

]]>
AI Transforming Security, Safety and Business Intelligence

In this Nextro analysis, we set out key insights from Axis Communications’ 2025 report on AI in video surveillance. As an Axis Gold Partner and trusted strategic technology partner for many New Zealand businesses, we know that understanding these trends is crucial for our clients seeking to enhance their security posture and gain operational efficiencies.

Key Industry Trends Identified

The comprehensive report reveals nine critical insights that are shaping the future of AI in surveillance:

  1. AI Adoption Surging Globally – With notable differences between markets, we’re seeing accelerated adoption in countries like the US, Japan, Singapore, and parts of Europe.
  2. Cloud and Edge AI Acceleration – A hybrid approach that combines edge processing with cloud scalability is emerging as the preferred solution, something that we at Nextro have been implementing for our forward-thinking clients.
  3. Integration of Diverse Data Sources – Combining video with audio and environmental data is creating richer, more actionable intelligence.
  4. Growing Use of Facial Recognition – Despite varying adoption rates due to regional privacy regulations, facial recognition continues to expand with responsible implementation.
  5. New Business Intelligence Opportunities – AI is transforming cameras into powerful data-generating sensors that deliver significant ROI beyond security.
  6. Integration Challenges – There’s often a gap between customer expectations and actual AI capabilities, highlighting the importance of working with experienced providers like Nextro.
  7. Partnership Importance – Collaboration between developers, integrators, and end-users is crucial for successful implementation.
  8. Responsible AI Practices – Ethical considerations, privacy, and data security are becoming central concerns, areas where Nextro maintains the highest standards.
  9. Future Trends – Generative AI, smarter AI pipelines, and IoT convergence are set to transform the industry further.

Responsible AI: A Critical Focus:

The report emphasises that responsible AI practices are essential, highlighting:

  • The need for human oversight in AI decision-making.
  • Transparency as a prerequisite for building trust.
  • Data privacy and security as major concerns.
  • The importance of preventing bias in AI systems.

What This Means for Nextro Clients

At Nextro, we believe in:

  • Building systems that enhance human capabilities and provide them with force-multiplying capabilities.
  • Maintaining transparency about what our AI systems can and cannot do.
  • Protecting your data with robust privacy and security measures.
  • Monitoring and testing to ensure that our systems remain fair and unbiased.

As your strategic partner, we are focused on delivering AI-powered surveillance solutions that not only improve security but that also deliver operational efficiencies and provide valuable business intelligence and insights.

For more information, explore our AI Video Surveillance Solutions.

Want to learn how these AI trends can benefit your organisation? Contact our Nextro team today for a consultation on implementing AI surveillance solutions that are tailored to your needs.

The state of AI in video surveillance source report



The post The State of AI in Video Surveillance: Industry Perspectives 2025 appeared first on Nextro.

]]>