Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/April-2017-Product-Showcase.aspxApril 2017 Product ShowcaseGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-04-01T04:00:00ZSM Staff<p></p><p><img src="/ASIS%20SM%20Callout%20Images/Everbridge%20Rd3%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" /></p><h4>EMPLOYEE SAFETY</h4><p>Employers that have a mobile workforce, distributed teams, or large campuses may have difficulty tracking employees' locations, schedules, and travel in case of location-based critical incidents. Everbridge of Burlington, Massachusetts, introduced the Everbridge Safety Connection to help businesses and organizations quickly locate and communicate with their people. The solution aggregates geo-location data from multiple systems so that administrators can reach out to those who are potentially at risk, including employees, contractors, and visitors. Booth 3040, Circle 422.</p><p> </p><h4>MOBILE ACCESS<img src="/ASIS%20SM%20Callout%20Images/DSX%20rd3%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:72px;" /></h4><p>DSX Mobile Command from Dallas-based DSX Access Systems, Inc., brings the power of the DSX workstation program to the convenience of a smartphone. The mobile command feature allows the activation of custom predefined commands, locking and unlocking of doors, control of alarm points, and monitoring of system events from a mobile but secure application. Apple- and Android-compatible, it enables global functions such as building and campus lockdown, incident response reconfiguration, and more. Repetitive chores like momentarily unlocking a door or granting access to a gate can be programmed into command buttons for easy activation. Booth 7103, Circle 423.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Hikvision%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:282px;" />VIDEO MANAGEMENT</h4><p>The Blazer Express from Hikvision of Zhejiang, China, is an intelligent video management station that manages Hikvision IP cameras with three primary functions. It's a Windows-based NVR with a solid-state-drive operating system. It accommodates 16 or 32 cameras with 16 built-in PoE inputs for IP cameras, and up to 24 terabytes of onboard storage. The Blazer Express manages live video and playback from up to 15 remote NVRs. It offers powerful video analytic searches and point-of-sale integration. Booth 18037, Circle 424.</p><p> </p><h4>INTEGRATED SECURITY<img src="/ASIS%20SM%20Callout%20Images/G4S%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:138px;" /></h4><p>G4S Secure Solutions of Jupiter, Florida, has a 100-year legacy of innovation in the security business. New processes assess and thwart security risks, while new technologies help security personnel execute their jobs more efficiently. Integrated Security Solutions address today's security challenges in four steps: ASSESS and evaluate risks; EQUIP personnel with technology for efficient and effective protection; INTEGRATE solutions with the customer's company, technology, and environment; and STAFF the solution with the correct trained personnel in the right roles and numbers. Booth 10053, Circle 425.</p><p> </p><h4><img src="/ASIS%20SM%20Callout%20Images/SDC%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:265px;" />DOOR OPERATOR</h4><div><p>The Auto EntryControl Swinging Door Operator from Security Door Controls of Camarillo, California, provides hands-free, low-power, point-of-entry door control to help meet ADA requirements for door installations in storefronts, office buildings, campuses, and healthcare facilities. With its safe and reliable electro-mechanical drive and slim-line design, the microprocessor-based unit is self-tuning and self-learning. It offers non-handed operation, full mechanical stops, and a variety of interface options for sensors, push-plates, fire alarms, and electrified locks. It meets the ANSI standard for compliance with the Americans with Disabilities Act. Booth 21109, Circle 426.</p><p>​ </p><h4>PORTABLE DETECTOR<img src="/ASIS%20SM%20Callout%20Images/Garrett%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:74px;" /></h4><p>The Walkthrough Caster Set from Garrett Metal Detectors of Garland, Texas, is ideal for stadiums, special events, and school use. The casters, which can be permanently attached, allow full mobility of a Garrett PD 6500i walkthrough metal detector by one person. Detectors can be moved to a secure location when they are not in use and provide an unimpeded exit at the close of an event. The caster assembly is constructed of durable, powder-coated steel for use in all types of environmental conditions. Booth 16127, Circle 427.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Axis%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:139px;" />DOME CAMERA</h4><p>The AXIS Q6155-E PTZ Dome Network Camera from Axis  Communications of Chelmsford, Massachusetts, is a pan-tilt-zoom model with laser focus, offering much faster and more accurate autofocus even in the most challenging lighting conditions. The new laser focus technology combined with high image quality allows people and objects to be identified quickly and precisely. The camera offers HDTV 1080p resolution and 30x optical zoom. The camera also has Axis' Zipstream technology, which lowers bandwidth and storage requirements while keeping necessary forensic details. Booth 14051, Circle 428.</p><p>​ </p><h4>COUNTERSURVEILLANCE<img src="/ASIS%20SM%20Callout%20Images/REI%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:90px;" /></h4><p>Research Electronics International (REI) of Algood, Tennessee, introduced the ANDRE Near-field Detection Receiver, a handheld broadband receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters. The ANDRE Advanced Kit includes a wide range of accessories specifically designed to receive transmissions across a 1 kHz to 6 GHz frequency range. It presents signal responses on a touchscreen display in the form of a histogram that shows signal strength over time. The device's frequency counter generates an automatic signal list and detailed frequency band classification. Audio mode accesses analog audio demodulation, playback, and recording. Booth 19124, Circle 429.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/VUE%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:165px;" />SECURE STORAGE</h4><p>The VUE Locker from Chicago-based LossPreventionSolution.com features an open mesh design and a welded-on hardened steel hasp that resists cutting and hammering, keeping items safe and untouched. The welded construction of expanded metal and the heavy-duty, powder-coated finish hold up in the harshest industrial settings. The company's aesthetically pleasing, custom-designed solutions allow quick visual inspection of stored goods, ventilation, and peace of mind. Booth 22150, Circle 430.</p><p>​ </p><h4>SECURITY MANAGEMENT<img src="/ASIS%20SM%20Callout%20Images/AMAG%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:145px;" /></h4><p>AMAG Technology, Inc., of Torrance, California, offers a security solution that manages access control, video surveillance, intrusion detection, identity management, visitor management, and incident management. Powered by a robust, policy-based platform, it helps security managers reduce risk, reduce cost, and maintain compliance. The Symmetry Security Management System provides intelligent networked solutions scaled to manage security challenges from small, remote facilities to multinational organizations around the world. Booth 11053, Circle 431.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Cognitec%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:143px;" />VIDEO SEARCH</h4><p>FaceVACS-VideoScan video screening and analytics technology from Cognitec Systems Corporation of Dresden, Germany, now allows users to perform complex searches on persons appearing in camera streams and stored media files. Users can upload videos recorded at a specific location and time to track possible participants in a crime. They can find a person enrolled in an image database or search for an unknown person and locate their appearances in multiple videos. Person searches can be filtered by age ranges, gender, ethnicity, and glasses. A special IP video camera with built-in face detection and tracking technology is a component of the system. Booth 17127, Circle 432.</p><p> </p><h4>GLOBAL INTELLIGENCE<img src="/ASIS%20SM%20Callout%20Images/NC4%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:209px;" /></h4><p>NC4 Risk Center provides security professionals with timely, comprehensive global threat and incident information about physical hazards that may have an adverse effect on physical security, personnel, supply chains, and other mission critical infrastructure within the organization. NC4 of El Segundo, California, has a dedicated team of skilled analysts working to create situational awareness by monitoring, gathering, analyzing, reporting, escalating, and responding to incidents and events that threaten an organization's resilience. NC4 Risk Center aggregates and integrates information from public and private sources to bring users a highly configurable presentation of relevant information for operational risk management. Booth 33096, Circle 433.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Gaitronics%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:83px;" />RUGGED PHONES</h4><p>GAI-Tronics of Mohnton, Pennsylvania, announced a new line of Behavioral Health Telephones, which meet the stringent standards set forth by the U.S. Department of Veterans Affairs and the Design Guide for the Built Environment of Behavioral Health Facilities. Designed with the safety of both staff and tenants in mind, the phones come in a variety of styles. They feature stainless steel construction and an armored 12-inch cord for handset models. They can be mounted in robust surface mount enclosures. The phones are available in both analog and VoIP configurations and some models can be used indoors or outdoors. Booth 2037, Circle 434.</p><p>​ </p><h4>TAILGATE DETECTION<img src="/ASIS%20SM%20Callout%20Images/Detex%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:150px;" /></h4><p>Detex Corporation of New Braunfels, Texas, offers dependable panic hardware for restricted secure areas, where unauthorized entry must be controlled and authorized entry must be quick and reliable. The Tailgate Detection System ensures that only one person enters a door for each authorized card read. It is compatible with most access control technologies, is easy to retrofit, and has an integrated door prop alarm for extra security. Booth 19109, Circle 435.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Parkut%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:174px;" />SECURITY BOOTHS</h4><p>Par-Kut International, Inc., of Harrison Township, Michigan, manufactures bullet-resistant security booths for high-security locations. The enclosures meet protective levels UL8, NIJ4, and higher and can be engineered to meet blast load requirements. In addition to HVAC, options include reflective glass, gun ports, anti-fatigue floor mats, dimmable interior lighting, and generators. They can be built on trailers or on top of towers. Bullet-resistant guard booths can have a very basic appearance or incorporate design enhancements to blend with surroundings. Circle 436.</p><p>​ </p><h4>PERSONAL SAFETY<img src="/ASIS%20SM%20Callout%20Images/Verint%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:190px;" /></h4><p>Verint of Melville, New York, introduced the Mobile Reporter phone application, which enables users to immediately alert security to a potential security issue—regardless of their location. The app will send critical updates to the command center in a wide variety of formats, such as a simple SOS alert, text message, detailed report form, photo, and live audio and video. The technology can be leveraged for a wide variety of applications, including executive travel, remote employees, outside contractors, and visitor safety. When alerted, the command center gets a single view of users, their locations, and their current status. The system offers a variety of mechanisms to initiate active or passive tracking of people through their devices and bi-directional communication with the device. Booth 2097, Circle 437.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Quantum%20Secure%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:250px;" />IDENTITY ACCESS</h4><p>The SAFE Sports and Events Access Manager from San Jose–based Quantum Secure—part of HID Global—enables secure and rapid entry to stadiums and other venues, providing security for temporary or limited-engagement events. The mobile app solution removes the need to rely on clipboards and lists to manage contractors, vendors, volunteers, and other nonticketed individuals who need temporary access to a venue. The solution also integrates with IT systems and multiple handheld devices for swift, accurate real-time validation and immediate onboarding and provisioning for a variety of identity types based on access permissions. The solution also records identity access logs to track key operational and security metrics and streamline compliance processes. Booth 11063, Circle 438.</p><p> </p><h4>IP CAMERAS<img src="/ASIS%20SM%20Callout%20Images/Honeywell%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:209px;" /></h4><p>Honeywell of Northford, Connecticut, expanded its Performance Series IP Family to include new, affordable, easy-to-install 1080p and 4MP wide dynamic range IP cameras. The new cameras deliver high-quality video, a superior user experience, easy video integration with other solutions, and improved user account security with enhanced risk reduction, lowering installation, operation, and maintenance costs. The range includes 15 new IP cameras in mini dome, micro dome, ball, and bullet designs. Select cameras include motorized focal zoom technology, which auto-focuses the lens after zooming. Booth 14025, Circle 439.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Comnet%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:181px;" />ETHERNET TRANSPORT</h4><p>ComNet, Communication Networks of Danbury, Connecticut, introduced the ComNet CTS24+2, which offers up to 24 ports of 10/100Mbps Ethernet and two ports of Gigabit uplink using TX or SFP combo ports. Up to three eight-channel modules can be used. These modules are offered in CAT5/6 10/100Mbps Ethernet, optical 100FX SFP, or CopperLine Coax or UTP extending interfaces. Booth 4071, Circle 440.</p><p>​ </p><h4>INTERCOM ACCESS<img src="/ASIS%20SM%20Callout%20Images/Talkaphone%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:234px;" /></h4><p>The Complete IP Door Intercom System from Talkaphone of Niles, Illinois, is a fully integrated access control package with head-end IP video attendant station and two-way IP call station. The VOIP-201C3-SYS package includes the VOIP-201C3 Call Station that connects with the AVM-1 IP video attendant station to provide a one-stop solution. The AVM-1 can monitor and regulate entry points through the call stations using video and voice communications. Easily install it at any access point to intelligently control customer or employee entry or exit. The included VOIP-201C3 surface mounted call station with an ONVIF-compliant wide-angle megapixel IP camera is constructed of IP66-rated, vandal-resistant, marine-grade stainless steel. An additional Ethernet port is provided to support connection to optional Ethernet devices. The call station also allows for remote software upgrades, configuration, and monitoring. Booth 10109, Circle 441.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Avigilon%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:150px;" />VIDEO ANALYTICS</h4><p>Avigilon Appearance Search from Avigilon of Vancouver, British Columbia, Canada, is a sophisticated, deep-learning, artificial intelligence search engine for video data. It easily sorts through hours of footage to quickly locate a specific person of interest across all cameras on an entire site. It can help track a person's route and identify previous and last-known locations to improve incident response time and enhance forensic investigations. Avigilon Appearance Search technology integrates with Avigilon Control Center 6.0 Enterprise edition software, Avigilon cameras with self-learning video analytics, and select NVRs. Booth 22043, Circle 442.</p><p> </p><p>​ </p><h4>SECURITY REVOLVING DOORS<img src="/ASIS%20SM%20Callout%20Images/DormaKaba%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:204px;" /></h4><p>Facilities requiring controlled access of authorized personnel to sensitive areas can rely on security revolving doors from dormakaba of Winston-Salem, North Carolina. The doors combine convenience with performance, providing a practical and secure solution for any interior access point. Doors are designed to harmonize with traditional or modern environments. All models are available in a wide variety of finishes and can be configured to allow essential and safe passage. A sophisticated sensor system in compliance with current safety standards prevents possible injury. Depending on the security requirements, the door may be equipped with a contact mat, scales, or internal monitoring. Booth 8053, Circle 443.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Keyscan%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:201px;" />ACCESS SOFTWARE</h4><p>Keyscan of Whitby, Ontario, Canada, offers Aurora access control management software, which seamlessly integrates with Kaba E-Plex wireless locks to provide a single software platform solution. New features include Microsoft-certified webcam support, plus integrations with video management systems such as Salient Systems, biometric readers from BioConnect and Suprema, and visitor management from EasyLobby. Keyscan networked access control systems are designed for applications in all vertical markets. Booth 8053, Circle 444.</p><p>​ </p><h4>ETHERNET OVER COAX<img src="/ASIS%20SM%20Callout%20Images/Altronix%20Box%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:246px;" /></h4><p>The eBridge800E Managed 8-port EoC Receiver with integral PoE+ switch is the head-end solution for upgrading coax to IP. New from Altronix of Brooklyn, New York, the compact 1U rack unit features two 1GB uplinks, an 8-port PoE+ switch, and CAT-5 to coax media converter. IP devices can be deployed up to 300 meters away, and a built-in battery charger ensures seamless operation. LINQ technology allows users to monitor, control, and report power/diagnostics from anywhere over the network. The unit is made in the United States and has a lifetime warranty. Booth 11073, Circle 445.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Winsted%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:135px;" />CONSOLES</h4><p>Impulse Dual Sit/Stand consoles from Minneapolis-based Winsted Corporation combine ergonomics and operator comfort. Studies show that prolonged sitting can be detrimental to one's health, and that alternating between sitting and standing can increase energy and reduce fatigue. The consoles provide two independently adjustable, ergonomically curved work surfaces. These surfaces can be raised and lowered to meet the needs of individual operators while offering flexibility to sit or stand. Options include electric-lift legs for adjusting the work surface height from 30 to 46 inches at the push of a button, three programmable height settings, and a load capacity of 520 pounds. Booth 14109, Circle 446.</p><p>​ </p><h4>SECURITY MANAGEMENT<img src="/ASIS%20SM%20Callout%20Images/Genetec%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:168px;" /></h4><p>Genetec of Montreal, Quebec, Canada, unveiled the latest version of Security Center, its unified IP security platform. Security Center 5.6 includes an updated HTML5-based Web client, new security hardware integrations to SimonVoss electronic locks and the Mercury Security MS Bridge, and the ability to use license plates as access control credentials with the new AutoVu SharpV camera. As a Mercury Security Platinum-Elite partner, Genetec now officially supports a new integration to the Mercury Security MS Bridge that allows organizations to economically migrate to an open access control platform while protecting their existing investment. Booth 28055, Circle 447.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Abloy%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:125px;" />WEATHERPROOF LOCKS</h4><p>Abloy Security of Irving, Texas, offers a range of tough locks that can withstand severe weather conditions and environmental extremes. ABLOY PROTEC2 CLIQ LED key and interface make it easy to retrofit mechanical locks with electromechanical models. There are no batteries in the locks, because the power comes from the key. CLIQ technology provides audit trails in both the lock and the key, flexible time functions, and immediate removal of lost keys. All padlocks feature case-hardened boron-steel shackles and hardened steel UL-listed cylinders. Patent-protected keys can also open ABLOY door locks, and the keys cannot be duplicated. Booth 8061, Circle 448.</p><p>​ </p><h4>PROTECTIVE COVERS<img src="/ASIS%20SM%20Callout%20Images/STI%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:140px;" /></h4><p>STI tough polycarbonate covers from Safety Technology International, Inc., of Waterford, Michigan, help prevent theft and vandalism to larger keypads, access controls, volume and lighting controls, and other similar devices. Molded of clear polycarbonate, which is the same material used in football helmets, each protected unit can be clearly seen and quickly identified. The cover has a strong piano-style hinge, enclosed back box, gasket, and lock. Other models are available. Booth 30044, Circle 449.</p><p> </p><h4><img src="/ASIS%20SM%20Callout%20Images/Commport%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:201px;" />UNDER-VEHICLE INSPECTION</h4><p>The CPAS enhanced under-vehicle surveillance systems from Comm Port Technologies of Cranbury, New Jersey, has been re-engineered with advanced metal alloys to support up to 78 tons. Security personnel can view the entire length of a vehicle in real time and full color. Full high-definition color is supported even with vehicles moving up to 75 kilometers per hour. As part of the updated package, CPAS now includes a driver image camera, automatic number plate recognition, templates, and automatic comparison software all bundled together. Booth 352, Circle 450.</p><p>​ </p><h4>ANTI-TAILGATING SYSTEM<img src="/ASIS%20SM%20Callout%20Images/DSI%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:135px;" /></h4><p>Designed Security, Inc., (DSI) of Bastrop, Texas, introduced the Entry Sentry, an optical security device that detects multiple persons entering a doorway on a single valid authorization. It uses proprietary sensing technology to detect direction and tailgating, and it is compatible with all card reader technologies and access control systems. The system mounts easily on standard door frames and hallway walls. Entry Sentry consists of two self-contained, narrow door- or wall-mounted units that provide both local and remote alarm indications. Booth 19109, Circle 451.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Mercury%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:168px;" />SECURITY PANELS</h4><p>Mercury Security Products, LLC, of Long Beach, California, released the new MS Bridge series. New MS Bridge multi-device interface panels are designed to fit the specific physical parameters of Software House Pro Series access systems, and they can be easily installed for a changeover to the Authentic Mercury open platform. The award-winning solution provides a cost-effective and streamlined path to move beyond the limitations of proprietary hardware for feature-rich access control. The Authentic Mercury model also allows customers to choose from industry-leading access control software providers, both at time of product selection and in the future as their needs evolve. Circle 452.</p></div>

Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/April-2017-Product-Showcase.aspx2017-04-01T04:00:00ZApril 2017 Product Showcase
https://sm.asisonline.org/Pages/Hate-Crimes-in-2015.aspx2017-02-01T05:00:00ZHate Crimes in 2015
https://sm.asisonline.org/Pages/January-2017-Industry-News.aspx2017-01-01T05:00:00ZJanuary 2017 Industry News
https://sm.asisonline.org/Pages/Maturity--Model-101.aspx2016-12-01T05:00:00ZMaturity Model 101
https://sm.asisonline.org/Pages/Industry-News-October-2016.aspx2016-10-01T04:00:00ZIndustry News October 2016
https://sm.asisonline.org/Pages/ASIS-To-Host-First-Security-Week.aspx2016-09-11T04:00:00ZASIS To Host First Security Week
https://sm.asisonline.org/Pages/ASIS-2016-Product-Showcase.aspx2016-09-01T04:00:00ZASIS 2016 Product Showcase
https://sm.asisonline.org/Pages/A-Security-Triumvirate-in-Orlando.aspx2016-06-13T04:00:00ZA Security Triumvirate in Orlando
https://sm.asisonline.org/Pages/SM-Online-January-2016.aspx2016-01-01T05:00:00ZSM Online January 2016
https://sm.asisonline.org/Pages/December-2015-Product-Showcase.aspx2015-12-01T05:00:00ZDecember 2015 Product Showcase
https://sm.asisonline.org/Pages/How-to-Manage-a-Merger.aspx2015-10-06T04:00:00ZHow to Manage a Merger
https://sm.asisonline.org/Pages/2015-Seminar-Product-Showcase.aspx2015-09-17T04:00:00Z2015 Seminar Product Showcase
https://sm.asisonline.org/Pages/Proper-Persuasion.aspx2015-08-03T04:00:00ZProper Persuasion
https://sm.asisonline.org/Pages/Book-Review---The-Handbook-of-Security.aspx2015-08-01T04:00:00ZBook Review: The Handbook of Security
https://sm.asisonline.org/Pages/Book-Review--Three-Sisters-Pond.aspx2015-08-01T04:00:00ZBook Review: Three Sisters Ponds
https://sm.asisonline.org/Pages/Safety-at-Sea.aspx2015-07-20T04:00:00ZSafety at Sea
https://sm.asisonline.org/Pages/Crime-Trackers.aspx2015-04-01T04:00:00ZCrime Trackers
https://sm.asisonline.org/Pages/Intelligent-Infrastructure.aspx2015-04-01T04:00:00ZIntelligent Infrastructure
https://sm.asisonline.org/Pages/ISC-West-2015-Product-Showcase.aspx2015-04-01T04:00:00ZISC West 2015 Product Showcase
https://sm.asisonline.org/Pages/Security-Careers-Skills,-Compensation,-and-Career-Paths.aspx2015-03-30T04:00:00ZBook Review: Security Careers: Skills, Compensation, and Career Paths

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/In-Search-of-Security-Metrics.aspxIn Search of Security Metrics<p>At a major insurance company headquartered in the Midwestern United States, the assistant vice president for corporate security has used an environmental risk metric for the past 12 years to help the company decide where to place office facilities around the country. The company owns or leases hundreds of facilities across the United States. Corporate security regularly collects a suite of data, assigns weights to various factors, and develops a numeric score that places each facility into a low, medium, or high category of risk. For each risk category, written policy specifies a cluster of security measures that should be in place at the site. Exceptions can be granted, but the systematic approach results in uniformity and in efficiency in decision-making and security systems contracting. Most importantly, the metrics-based approach helps senior management understand the level of risk in site selection and make informed decisions on risk management. In addition, over time, the metrics have steered the corporation toward having a smaller percentage of its locations in high-risk sites.</p><p>This example illustrates how security professionals can use metrics to determine what works, measure the value of security operations, and demonstrate security's alignment with its organization's objectives. To help security managers use metrics more effectively, the ASIS Foundation funded research to create tools for discovering, developing, assessing, improving, and presenting security metrics. By using the tools, security professionals may be better positioned to manage their operations, measure their effectiveness, and communicate with senior management. </p><p>Metrics are measurements or other objective indicators collected over time to guide decision-making. The term is sometimes used interchangeably with measurements, analytics, and performance measures. With metrics, security managers can speak to senior leaders in familiar business language, offering measurable results that correlate with investment. Without compelling metrics, security managers and their budgets rely largely on the intuition of company leadership. </p><p>Two years ago, the ASIS Foundation implemented a new structure for assessing and overseeing security research. The first test of that structure was a proposal for research on security metrics, says Linda F. Florence, Ph.D, CPP, president, ASIS Foundation Board of Trustees. "The ASIS International Defense and Intelligence Council had a special interest in the topic, having made several presentations on metrics at the ASIS Annual Seminar and Exhibits. The council formed a vision of what the security field needed, found researchers who could perform the work, and helped the researchers develop a proposal for ASIS Foundation funding."</p><p>The Foundation Research Council approved the proposal, and the Foundation sought and received funding from the ASIS Board of Directors. The result was the ASIS Foundation Metrics Research Project. The Foundation awarded a grant to Global Skills X-Change (GSX) and Ohlhausen Research to undertake the project. GSX specializes in applying validation, measurement, and standards development techniques to produce business tools. Ohlhausen Research, Inc., conducts research in security, criminal justice, and technology.</p><h4>Depth Perception<br><br></h4><p>The project's research team consisted of the author as principal investigator; subject matter expert and former Director of Information Protection for the U.S. Air Force Daniel McGarvey; Senior Analyst Megan Poore; and Technical Advisor Lance Anderson, Ph.D.</p><p>Throughout the research, which be­gan in 2013, the ASIS Defense and Intelligence Council ensured that the security practitioner's point of view was represented by serving on the project's advisory board and expert panel.</p><p>The researchers gained insights into security metrics through a systematic review of the literature, an online sur­vey of ASIS members, and lengthy fol­low- up interviews by phone. In addition, the research team was guided by an advisory board and an expert panel composed of security professionals with experience in the use of metrics. The project was completed in the spring of 2014.</p><p>The research found many books, articles, and reports discussing reasons to use metrics, characteristics of existing metrics, and methods for communicating metrics. Among the most valuable resources on security metrics were George Campbell's <em>Measures and Metrics in Corporate Security: Communicating Business Value</em> and Mary Lynn Garcia's <em>The Design and Evaluation of Physical Protection Systems</em>, as well as numerous articles in both <em>Harvard Business Review</em> and <em>MIT Sloan Management Review</em>—the latter on business metrics generally.</p><p>This noted, most sources that examine security metrics operate at a conceptual level only. The literature has few specific strategies for developing or evaluating security metrics. Likewise, descriptions of empirically sound security metrics with statistical justification and evidence are scarce. </p><p>To uncover specific uses of security metrics and to gain an understanding of the different ways in which security professionals may be using metrics, the research team invited more than 3,000 ASIS members to participate in an online survey. The survey's 20 questions asked about metrics collection, comparison to external benchmarks, return on investment, sharing and presentation of metrics, and alignment with organizational risks and objectives. The survey also examined the particulars of metrics usage among respondents.</p><p>The 297 respondents demonstrated a high degree of interest in metrics. Of the respondents who said they are not using security metrics, 78 percent said they would use metrics if they knew more about how to create and use them effectively. More than half of all respondents asked for more information from ASIS regarding metrics.</p><p>Respondents provided the research team with a detailed view of the many ways that security professionals are using metrics today, including focusing on topics, reporting data, sharing with the C-suite, aligning with organizational risk, and using a dashboard tool.</p><p><strong>Metrics topics.</strong> Respondents were asked which aspects of the security program they measure. The top five categories were security incidents, criminal incidents and investigations, cost against budget, security training and education, and guarding performance, which includes turnover and inspections. </p><p><strong>Reporting.</strong> Eighty percent of respondents who use metrics provide their metric findings to persons outside the security department. Recipi­ents of the information include senior management (79 percent of those who share metrics outside the security department), managers of other departments (59 percent), supervisors (51 percent), and people who report to the security department (47 percent). Those who share metrics provide the information quarterly (43 percent), monthly (40 percent), or annually (17 percent).</p><p><strong>Sharing.</strong> Respondents who share metrics with C-suite personnel were asked which elements they share. The top choices were security incidents (80 percent), cost against budget (62 percent), criminal incidents and investigations (57 percent), regulatory compliance (44 percent), and risk analysis process (40 percent).</p><p><strong>Alignment.</strong> Eighty percent of respondents who use metrics said that their metrics are tied to, aligned with, or part of the larger organizational risk process or organiza­tional objectives. For example, some metrics protect the company's most important product line; other metrics may support business continuity, compliance, risk management, or client satisfaction. One respondent explained that top management sets broad goals and writes plans while se­cu­rity metrics demonstrate how effective those plans are.</p><p><strong>Dashboard tool.</strong> Forty-four percent of respondents who use metrics perform their data collection, review, or sharing via a security management dashboard tool.</p><p>This research makes it possible to clearly define security's role and contribution to the organization at the tactical, organizational, and strategic levels. The report provides a working metrics tool that can help practitioners use metrics in the most effective manner. </p><h4>In the Tool Belt<br><br></h4><p>GSX and Ohlhausen Research studied the current uses of security metrics and created several resources for practition­ers. The Security Metrics Evaluation Tool (Security MET) helps security pro­fessionals develop, evaluate, and improve security metrics. A library of metric descriptions, each evaluated according to the Security MET criteria, provides valuable resources. Guidelines for using metrics can help security professionals inform and persuade senior management.</p><p>The tools, especially the Security MET, are designed to help security managers assess and refine metrics that they are using or considering, based on an intimate knowledge of conditions at their organization, in a manner guided by scientific assessment methods. </p><p><strong>Security MET.</strong> The Security MET is meant to aid and empower the security manager, not to dictate any particular security decision. By providing a standard for scientific measurement, it offers guidance for improving the inputs that go into the security professional's own decision-making process.</p><p>The Security MET is a written instrument that security managers can use to assess the quality of specific security metrics. Users can determine whether an existing or proposed metric possesses scientific validity, organizational rele­vance (such as clear alignment with corporate risks or goals), return on investment, and practicality.</p><p>The tool was developed through a comprehensive, iterative process that involved synthesizing scientific literature, reviewing security industry standards, and obtaining input from metrics experts on the project's advisory board and expert panel. Many of the criteria come from the field of psychometrics, which is concerned with the measurement of mental traits, abilities, and processes. The psychometric literature addresses the measurement of complex human behaviors, including sources of error inherent in social and organizational situations. In addition, through its connection with legal guidelines and case law, psychometric theory provides ways to address complicated legal issues related to fairness and human error.</p><p>The tool presents nine criteria for evaluating a security metric. The criteria fall into three groups: technical, operational, and strategic.</p><p><em>Technical.</em> The technical criteria include reliability, validity, and generaliz­ability. Reliability means the degree to which the metric yields consistent scores that are unaffected by sources of measurement error. Validity refers to the degree to which evidence based on theory or quantitative research supports drawing conclusions from the metric. Generalizability means the degree to which conclusions drawn from the metric are consistent and applicable across different settings, organizations, timeframes, or circumstances.</p><p><em>Operational.</em> Operational criteria include the monetary and nonmonetary costs associated with metric development and administration, as well as timeliness and the extent to which metric data can be manipulated, coached, guessed, or faked by staff.</p><p><em>Strategic.</em> Strategic criteria include return on investment, organizational relevance, and communication. Return on investment is the extent to which a metric can be used to demonstrate cost savings or loss prevention in relation to relevant security spending. Organizational relevance is the extent to which the metric is linked to organizational risk management or a strategic mission, objective, goal, asset, threat, or vulnerability relevant to the organization—in other words, linked to the factors that matter the most to senior management. Communication refers to the extent to which the metric, metric results, and metric value can be communicated easily, succinctly, and quickly to key stakeholders, especially senior management.</p><p>A score sheet is presented at the end of the Security MET. The instrument is easy to score and imposes little to no time burden on staff. Lower scores on particular criteria show where a metric has room for improvement. </p><p>Here's an example of how the Security MET can be used to evaluate a real-life metric. At a major financial services firm, employees were being robbed of their mobile phones on the sidewalks all around the office as they came to work, when they went outside for lunch, or when they left to go home. The firm identified hot spots and times for phone theft and applied extra security measures. After reaching a maximum of 40 thefts in a two-month period, the number soon declined to zero.</p><p>Evaluating the metric with the Security MET provides some valuable insights. The metric—the number of mobile phone thefts—is highly reliable, as it is based on incident reports from employee victims, police reports, and video surveillance. Its validity appears to be confirmed by the outcome—that problem was eliminated. Collecting the data has little marginal cost, as the company already tracks and trends security incidents. Its organizational relevance is high, as it aligns with the firm's goal of attracting workers to the central business district. As for communication, it is a straightforward metric that is easy to explain. In terms of return on investment, it is hard to quantify the value of keeping employees safe and continuing to attract new employees.</p><p>Thus, while the metric appears to present a reasonable return on investment, the Security MET helps the user see that developing clear proof of ROI would be one way to strengthen this particular metric. The addition of a short survey asking employees if they feel more se­cure and would recommend the company to others would provide validation for both the solution and the metric.</p><p><strong>Metrics library.</strong> The researchers de­veloped 16 summaries of metrics currently in use in the security field. The summaries were developed primarily through telephone interviews with on­line survey respondents. The summaries may serve as examples for security pro­fessionals who are considering ways to use metrics. (See box on page 58 for a complete list of topics.)</p><p>The library presents a three- to four-page summary of each metric. In addition, each metric is evaluated by several metrics experts, using the Security MET. The metrics library is presented in the full project report.</p><p>These real-world metrics come from a variety of industries including defense/aerospace, energy/oil, finance, government, insurance, manufacturing, pharmaceuticals, real estate management, retail, security services, shipping/logistics, and telecommunications.</p><p>Some of the metrics are more sophisticated and detailed than others, providing a range of examples for potential users to consider. The metrics are not presented as models of perfection. Rather, they are authentic examples that security professionals can follow, refine, or otherwise adapt when developing their own metrics.</p><p><strong>Guidelines.</strong> A key task in this research was to develop guidelines for effectively using security metrics to persuade senior management. What would make those presentations more compelling? Several recommendations emerged.</p><p>Present metrics that are aligned with the organization's objectives or risks or that measure the specific issues in which management is most interested. One of the most important measures is return on investment (ROI).</p><p>Present metrics that meet measurement standards. A metric may be more persuasive to senior management if it has been properly designed from a scientific point of view and has been evaluated against a testing tool, such as the Security MET, or established measurement and statistical criteria.</p><p>Tell a story. If the metric is prevention-focused, a security professional can make the metric compelling by naming the business resources threatened, stat­ing the value of those resources, and describing the consequences if the event occurs. Another part of a compelling story is the unfolding of events over time. Metrics can show progress toward a specific strategic goal. </p><p>Use graphics and keep presentations short. Senior managers may be interested in only a few key measures. While security professionals may choose to monitor many metrics via a dashboard interface, they should create a simpler dashboard for senior management. Some security professionals said they limit their presentations to five minutes.</p><p>Present metric data regularly. As data ages it becomes more historical, less actionable, and thus potentially less valuable. The research does not suggest an optimal interval for sharing security metrics with senior management, but the survey shows that 83 percent of security professionals who share metrics outside the department do so at least quarterly. </p><p>Future steps for helping security professionals improve their use of metrics include a webinar sponsored by the ASIS Defense and Intelligence Council and the further development of the metrics library. Other ideas under consideration include metrics training for security practitioners, the development of a tool for creating a metric from scratch and implementing it in an organization, and the creation of a library of audited— not merely self-reported—metrics. </p><p>The best security practice is evi­dence-based; without research, practitioners must rely on anecdotal information to make decisions. The ASIS Foundation continues to seek ideas for research projects that would increase security knowledge and help security professionals perform their work more effectively. </p><p>The complete project report, <em>Persuading Senior Management with Effective, Evaluated Security Metrics</em>, is available as a free download. The 196-page report contains the full text of the Security MET, the library of metric summaries (with evaluations), guidelines for presenting metrics to senior management, the project's literature review, and detailed results of the online survey.</p><p>Florence says, "We are proud to brand this quality research with the ASIS Foundation logo and share the findings with our members and the security profession as a whole. This research will help propel security from an industry to a profession, where we belong."  <br></p><p>Peter E. Ohlhausen is president of Ohlhausen Research, Inc., and served as principal investigator for the ASIS Foundation Metrics Research Project. He is a member of ASIS.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Book-Review---The-Handbook-of-Security.aspxBook Review: The Handbook of Security<p><span style="line-height:1.5em;">Editor Martin Gill has collected essays from more than 50 well-credentialed and respected authors to create a superb holistic catalog of security.  The Handbook of Security, Second Edition, builds upon the first edition with a wider array of subject matter and a greater diversity of topics, resulting in a more exciting study of the field and profession of security.  </span><br></p><p>Beginning with a comprehensive historical look at the security industry, the book goes on to answer fundamental questions about the range of threats facing today’s world. It looks at how current economic conditions—far different from when the previous edition was first published—have affected the profession and agencies responsible for predicting and reacting to crime, and to what degree technological advances have impacted our world. The overall result is that security has become a dominant feature in our lives, whether we know it or not.</p><p>Although, at more than 1,000 pages, The Handbook of Security can appear daunting, this is indeed essential reading for all those involved with the security world. Both the student of security and the security professional will become engaged in the content, from the historical study of security as a discipline to the long-range issues impacting the profession. Among other things, it addresses crimes by offense and by industry, risk management, security processes, research in the field, and ethical issues. One shortcoming of the book is that it does not provide many charts or graphs to illustrate and support the material, though the flow of the text sufficiently covers the information.  </p><p>This book has significant value to security professionals at all levels as well as being a valuable research tool for the academic world of security management. It will soon be dog-eared and filled with bookmarks as are the invaluable resources in any professional’s library.</p><p><em><strong>Reviewer: Terry L. Wettig, CPP</strong>, is director of security risk management for Brink’s Incorporated and is based in Richmond Virginia. A retired U.S. Air Force chief master sergeant, he is studying for a Ph.D. in organizational psychology.  </em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Supply-Chain-Strategies.aspxSupply Chain Strategies<p>​Take almost any product you have purchased in a store or used at home or work in the last week. Chances are, that object moved thousands of miles from where it was originally manufactured to the place where it was ultimately purchased or delivered to you. Organizations have intricate supply chain networks that are constantly moving every day around the world, and having an efficient supply chain security program ensures that movement of goods is not interrupted or compromised. </p><p>Security professionals must take a detailed look at the vendors who supply their assets and understand how those goods will be handled and ultimately implemented into their company’s operations or services. Following is a look at how a children’s hospital in Alabama applied supply chain security best practices to weather an unexpected storm, as well as provide for day-to-day operations. In addition, supply chain experts discuss lessons learned from their own experience of conducting risk assessments, following standards, and vetting suppliers and transporters to better protect company property. ​</p><h4>Alabama Children’s </h4><p>When a snowstorm hit Birmingham, Alabama, on January 28, 2014, the city was caught unawares. The snowfall, which quickly turned to ice, left thousands stranded on highways or in their offices. Children were stuck at school, their parents unable to pick them up. The event became known as “Snowpocalypse,” and news service AL.com called it “the winter storm that brought Birmingham to its knees.” </p><p>Hospitals were affected by the storm as well, including Children’s of Alabama. The pediatric center encountered vulnerabilities in its supply chain during that event it hadn’t previously considered, says Dennis Blass, CPP, PSP, director of safety and security at the hospital. </p><p><strong>Lessons learned. </strong>Every year the hospital conducts a hazards vulnerability assessment for its supply chain to find out where it can improve safety and security. “Once you identify your hazards and your vulnerabilities–the things that are dangerous to you or the things that you’re weak in–then you start peeling those back,” he says. “If we identify hazards that we need to correct, then we probably are going to create a management plan to correct those issues.” </p><p>Many displaced people in the community turned to the hospital for shelter when they had nowhere else to go. “We have a very prominent position in the Birmingham skyline, so if things look bad, the hospital looks like a place to go and get help–as it is,” Blass says. There were also clinic patients who had come to the hospital that morning for a routine checkup, planning to leave; many of them were stuck because of the snowstorm, which began around 10:30 a.m. local time.</p><p>Instead of being filled to the normal capacity of 300 people—the number of beds in the hospital—there were roughly  about 600 people who spent about 48 hours at the facility to ride out the storm.</p><p>The number of people at the hospital exposed one unforeseen vulnerability—obtaining clean linens from its supplier, which is separated from the hospital by a chain of mountains. “The supplier can wash the linens, but they can’t deliver them to us…we ended up making it, but that was a close call,” says Blass.</p><p>“We could handle supplies for patients, but we had a lot of people who just came to the hospital because it was a warm place to be,” according to Blass. “That had impacts on the amount of food that got consumed, and it had impacts on the amount of linens we went through. Just things that people need, supplies like toilet paper, things you don’t think a lot of.” </p><p>For those who weren’t patients, the hospital served smaller meals than normal; “sandwiches and soup, as opposed to meat and potatoes,” Blass says, to stretch resources. </p><p>The main drug supplier for the hospital is located in the same region, so obtaining critical medicine was not a concern during the storm. The hospital also has plenty of diesel fuel tanks, and can go for days without restocking. Only the insufficient linens, which must be sent off to a facility for proper sanitation before being returned to the hospital, turned out to be an issue.</p><p>“We did an after-action report on that experience, so we…put it in our emergency management plans for the future,” he notes.</p><p>The hospital’s emergency plans help ease any supply chain shortages. The institution follows the hospital incident command system (HICS) which assigns temporary duties to leadership during an emergency. For example, during the snowstorm, the chief operating officer of the hospital assumes the role of incident commander; an information officer is assigned to keep the community informed of hospital activities; and the plan also incorporates a medical officer, logistics chief, and planning chief. </p><p>During the incident, this system helped ensure proper patient care and as few gaps in the supply chain as possible. “Food was getting tight,” Blass says, and the food warehouses are not located near the hospital. “Because of the command structure, leadership can say, ‘okay you have a company credit card, we’ll contact the bank and raise your limit from $500 to $5,000 or whatever you need.’”</p><p>The U.S. Joint Commission, which certifies and accredits healthcare bodies, requires that hospitals have a group with representatives from various divisions that evaluates the standard of care they are providing to patients. Alabama Children’s has an environment of care committee that meets once a month to complete this requirement. “Our environment of care committee looks at things like safety, security, and resource management,” says Blass. “We have to meet the Joint Commission’s standard, and it surveys us every three years.” </p><p>Representatives on the team at Alabama Children’s include staff from the pharmacy, medical team, facilities, human resources, dining services, and more. This team ensures that there aren’t any gaps in the supply chain that would interrupt the hospital’s daily operations. As a rule, Blass says that having enough supplies for 96 hours will allow the facility to continue operating smoothly and efficiently. This includes a variety of items that the environment of care team must carefully think through and document. “You’re talking about water, fuel, basic sanitary supplies, and then you start talking about medicine and those things necessary for a hospital to run,” he says. </p><p>And there can be more than one type of each supply, a detail that, if overlooked, could mean life or death. “We have pumps that pump air, we have pumps that pump blood, we have pumps that pump saline, we have pumps that do many different things. You have to have all the things needed to make those supplies work for 96 hours,” he notes. </p><p>Keeping track of inventory is critical to determine whether the hospital has a sufficient supply of each item. Blass says that the hospital is moving toward a perpetual inventory system, where a new item is ordered as soon as one is pulled off the shelf. </p><p>There is a downside to stocking too many items, which is why it’s a delicate balance between having 96 hours’ worth of supplies and more than enough. “Space is expensive. And if you want to have enough water for four days, how much water is that? Where do you put it? How do you keep it fresh?” He adds that the hospital must be thoughtful in its policies and procedures on maintaining its inventory to avoid any issues.  </p><p>Thankfully, Blass notes, t​he 2014 snowstorm only lasted 48 hours. “The size of the surge exceeded our plan, but the length of the surge was shorter than our plans, so it all worked out,” he says. </p><p>And not every element of securing the supply chain is tangible; the information and communication pieces are also critical. “Every day we’re getting blood supplies in, and other kinds of materials that must be treated very carefully,” he says. Special instructions need to be followed in many cases. For example, there may be medicine that must be stored at a precise temperature until 30 minutes before it’s dispensed. That information must be communicated from the pharmacist to the supplier, and sometimes to security, who can give special access to the supplier when it delivers the drugs. </p><p>Blass is a member of the ASIS International Supply Chain and Transportation Security Council. He helped develop an American National Standards Institute (ANSI)/ASIS standard for supply chain security, Supply Chain Risk Management: A Compilation of Best Practices Standard (SCRM), which was released in July 2014. The standard provides supply chain security guidelines for companies, and has illustrations of what exemplary supply chain models look like.</p><p><strong>Best practices.</strong> Marc Siegel, former chair of the ASIS Global Standards Initiative, also participated in the creation of the ANSI/ASIS standard, which provides explanations of how to look at managing risk in the supply chain. “It’s based on the experiences of companies that have very sophisticated supply chain operations,” he tells Security Management. “The companies that put it together were really looking at having a document that they could give to their suppliers, to help them look at themselves and think of things that they should be doing and preparing for.” </p><p>Siegel is now director of security and resilience projects for the homeland security graduate program at San Diego State University. He promotes supply chain mapping, which takes a risk management–based approach to supply chain security. “Traditionally, a lot of security people have looked at supply chain as logistics security,” he says, “whereas companies with major supply chain considerations have been moving more into an enterprise risk management perspective.” These organizations take an across-the-board look at risks that could create a disruption in the supply chain, asking themselves what the specific things are that could interrupt or prevent them from manufacturing or delivering their product. </p><p>Siegel says there is a disproportionate focus on bad actors and intentional acts as threats to the supply chain, when more often it’s a natural disaster or accident that causes the most significant disruptions. “The broader risk management perspective is also looking at, ‘Is there a potential for a storm, is there a potential for political disorder, or instability in a region, that can cause a delay in processing?’” Only then, he says, are companies efficiently mapping out all the factors that could introduce uncertainty.</p><p>Maintaining a broader perspective will keep organizations from fixating on two of the most common hangups in supply chain security. “You have people who fixate on ‘everything is a threat,’ and you have people who fixate on ‘everything is a vulnerability,’ and if you only fixate on those two things you’re going to miss a lot of stuff,” Siegel says.</p><p>Blass agrees. “When we start that annual hazards vulnerability assessment, I’m going to look through the standard and notes I’ve written myself to make sure I’ve got everything covered,” he notes. “You can never rest and say, ‘well, we’re safe and secure and we don’t have to do anything else,’ because the threats keep changing.”   ​</p><p>--</p><h4>Sidebar: assess risk<br></h4><p> </p><div>​For the co​rporation that produces the F-35 fighter jet and other advanced technologies for the U.S. government, supply chain security is of utmost importance. “The threats that we face are universal in nature due to the size and the complexity of our supply chain,” says Vicki Nichols, supply chain security lead for Lockheed Martin’s Aeronautics business. </div><div><br> </div><div>Lockheed Martin Aeronautics assesses the supply chain in a number of categories, but Nichols works most closely with cargo security. “The threats there are cargo disruption, unmanifested cargo, and anti-Western terrorism,” she notes. </div><div><br> </div><div>The division conducts a risk assessment of its international suppliers. “We look at what type of products they provide us and how vulnerable that product is to manipulation or intellectual property theft, and we look at country risk,” she says.  </div><div><br> </div><div>The company sends a questionnaire to its suppliers, and comes up with an overall score for each of them based on 10 criteria, including country risk and transportation mode. In many cases, it also sends field personnel to evaluate the supplier’s facility. “If we know we have eyes and ears going in and out of the facility, and those people are trained to recognize red flags, then we know we have a lower threat because of our presence,” she says. </div><div><br> </div><div>After one such site check at a facility in Italy, Lockheed Martin Aeronautics determined that the use of technology was warranted to further enhance security. “The concern was that the area was known for introduction of unmanifested cargo—weapons, cargo disruption,” she notes. “We began to look at tamper-evident technologies, and track-and-trace devices that would allow us to know if someone had opened or tampered with the freight.”  </div><div><br> </div><div>Lockheed Martin has a corporate supply chain security council that meets at least once a month to provide updates and discuss any issues that arise. Representatives from the company include human resources, personnel security, physical security, and counterintelligence. Stakeholders from major partner organizations are also invited to participate.</div><div><br> </div><div>Lockheed Martin Aeronautics also works closely with law enforcement and federal intelligence sources who disseminate relevant information to the company. “We subscribe to some intelligence data that is cargo-specific, so we issue a spotlight report about three times a week just to keep people engaged and aware of the threats in the supply chain,” she notes. </div><div><br> </div><div>Supplier engagement is also critical, Nichols says, so the company stays in touch with about 120 suppliers internationally. </div><div><br> </div><div>Sometime in 2017, Lockheed Martin Aeronautics plans to purchase a software management tool that will release supplier questionnaires in the native language for countries it does business with. It will tap existing resources such as “Supplier Wire” to offer training to the supply base. “This will be another evolution on how we can engage, rather than just sending them to a website,” Nichols says. “I think it’s important for our supply base to see how seriously we take security, so they will take it seriously as well.”​</div><div><br> </div><h4>sidebar: consult standards<br></h4><p> </p><p>​Laura Hains, CPP, operations manager, supply chain security and consulting at Pinkerton, member of the ASIS International Supply Chain and​ Transportation Security Council, says that companies should research whether their partners and suppliers are following major supply chain security protocols, like those put out by ASIS, and others such as the Transported Asset Protection Association (TAPA) standards for trucking companies. “TAPA is one of the big authorities on trucking, so if a company says they are TAPA certified, that to me says that they follow protocol,” she says. </p><p>Other standards include the National Strategy for Global Supply Chain Security which U.S. President Barack Obama signed in 2012 and was designed to enhance public-private partnerships. Arthur Arway, CPP, author of Supply Chain Security: A Comprehensive Approach, says the framework seeks to combine input from government and industry on protecting the transport of goods to and from the United States. “I think the government is far more willing to seek out subject matter experts and all the different modes and companies that may transport goods into the United States for their help,” he says. Arway adds the document is relatively recent, and that it could take a while before it is widely adopted. </p><p>Though terrorism is an uncommon threat to the supply chain, it must always be a consideration. Hains gives the example of vehicular attacks. In Nice, France, on July 14, 2016, Tunisia native Mohamed Lahouaiej Bouhlel drove a 19-ton cargo truck into a crowd of Bastille Day festival-goers. That attack killed 86 people and injured more than 400. New York police also warned of possible vehicular terrorism against the 2016 Macy’s Thanksgiving Day Parade. “A small company truck—that could be a target,” notes Hains. “So everybody has to think about terrorism because it’s out there.”</p><p>Another standard at the national level seeking to combat terrorism within the supply chain is the U.S. Customs Trade Partnership Against Terrorism (C-TPAT). The program is voluntary for private industry, but Arway says the national standards as a whole are seeing global adoption.​</p><p>“Standards have come a long way in how they’ve been able to incorporate security into the movement of goods,” he notes. “Many countries have accepted these programs into their own supply chain security programs.”​</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465