Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Integrated Security for Ports and Vessels

June 1, 2005


Specialized security video provides a way to protect seaports and ports. This device from Cantronic Systems of Caquitlam, British Columbia, can capture clear images in total darkness from up to 2,600 feet away.
With a worldwide fleet of nearly 11 million marine containers and approximately $155 billion in vessels, containers, marine terminals and other direct operating assets now in service around the world, the maritime industry is clearly one of the most powerful drivers of international commerce and economic vitality in the world today. Yet only with the recent introduction of a new body of international regulations, including the International Code for the Security of Ships and of Port Facilities (ISPS), U.S. Maritime Transportation Security Act, and others, have port and vessel companies and agencies been compelled to implement security and safety measures on a comprehensive, international scale.

Such companies and agencies are now struggling to find an approach that can enhance the effectiveness of technologies such as electronic-access control, time-and-attendance, and security video, while also improving business efficiencies, and many have turned to facility-wide security integration for their answer.

Integrated approach

Integrated security could help maritime firms secure their assets and people while improving their operating efficiencies and reducing costs. At the heart of this strategy is the process of integrating the security and safety requirements for every element of, and activity that takes place at a facility. Such elements and activities may be categorized as people, openings and assets.

For instance, a ship’s openings could include the engine control room, electrical control/equipment room, cargo storage area, bridge and steering gear room. A port’s people include longshoremen, crew, administrators, maintenance workers and truck drivers. Assets for both a port and vessel may include the vessels themselves, equipment, vehicles, containers and cargo.

An integrated strategy connects people, openings and assets together through a connected IT infrastructure based on an expandable, open architecture. Data is generated through the power of electronics; access cards with electronic codes or biometric identifiers replace paper forms of ID, reducing the number of security personnel required for screening. Because the architecture is open, the system can easily accommodate the addition of new security applications (i.e., a remote-monitoring system) as modules to a shared database. The result is a highly reliable system that coordinates remote monitoring, access control, time and attendance, video surveillance and other technologies and processes designed to secure a facility’s assets.

Integrated security puts its emphasis on improving efficiencies, sharing the goal of improving security and safety, but going one step further to help run a better, more productive business. By facilitating the collection and exchange of data between security- and non-security-related technology systems, an integrated system can acts as a tool can help improve the efficiencies of various business processes. For instance, human resources managers can use data from a time-and-attendance system to track levels of tardiness. A security video application may produce data that can be used in connection with an inventory-tracking program.

Because every system is connected through a shared technology infrastructure, integration can be used to detect, investigate and resolve security violations far more quickly and with fewer security personnel and other resources than unconnected technologies.

Rather than requiring authorized individuals to endure the process of giving sensitive or even personal information, such as a Social Security card, to security personnel, such solutions rely on electronic access cards coded with an electronic code or biometric identifier.

But perhaps the most significant difference between conventional approaches and integrated security is that it becomes more effective as a security and business tool as it evolves. With each new opportunity to collect and leverage data, such systems can better manage the people, openings and assets involved in a facility’s operations.

Security technologies are used for both land and water surveillance.

Maritime environment

Integration’s advantages are especially pronounced in maritime applications. Such solutions can track crew at ports of call, making use of ISPS-required records on each ship listing the last five ports that each member of its crew last visited. The productivity of truckers can be improved by providing them a means for systematically alerting a vessel’s crew of their arrival.

Under emergency or threat scenarios, integrated solutions can also quickly adopt different levels of access control. For instance, in an emergency that requires people to exit a vessel quickly, all major exits can open rapidly and automatically. For another threat, a the system may close certain exits or allow only individuals with a specific authorization to pass through them, as well as change video settings to provide optimized recordings.

Although many port managers contend that their facilities are responsible for no more than one third of the total cost they pay annually to settle damage claims for damaged containers, they traditionally have not had a mechanism for proving their innocence. By facilitating the generation of easy-to-navigate reports and video clips that demonstrate at what time and location a particular container was harmed, Integrated Security helps to minimize costs associated from unfair claims.

Through integrated strategies, port and vessel operators will be able to meet the challenges of complying with the ISPS and other recently enacted regulations. Meanwhile, such systems can act as a foundation for accommodating a growing body of legislation and the industry’s increasing reliance on technology.

The thin red line is a virtual perimeter set as a rule so that intelligent video can alert to port intrusions without operator intervention. Photo courtesy: ObjectVideo

Sidebar: More Intelligence; Less Funding

Seaports and other transportation centers are at the forefront for a hot security tech niche – intelligent video surveillance for physical security applications. Software integrated into security video can significantly improve the effectiveness of a security operation and enable it to be more proactive by providing automated, real-time detection, identification, tracking and analysis of potential threats and events.

Federal grants now support many such developments. One example: ObjectVideo of Reston, Va., just won two contracts totaling up to $3.2 million over the next three years from the Homeland Security Advanced Research Project Agency to develop next-generation capabilities for intelligent video surveillance systems.

Instead of monitoring an “area of interest” on a continual basis, next-generation intelligent video recognizes specific mobile assets, understands what rules apply to them and automatically adjusts to protect them, no matter where they appear. It does all of this without a systems operator intervening.

Not all ports are swimming in money, however.

Only a fraction (one-sixth) of 361 U.S. seaports will be eligible to apply for $141 million in the Port Security Grant program from the Department of Homeland Security Department according to new risk-based eligibility rules released in mid-May.

Grant requirements identify only 66 seaports as high-risk, down from 100 ports in previous years. It is estimated the ports will need to spend $5.4 billion over the next decade to comply with the Maritime Transportation Security Act of 2002.

For More Information

Go to www.securitymagazine.com and its LINX search, powered by Google, to grab more information on port security. Security thanks Jim Ligotti, vice president for maritime solutions, at IR Security and Safety, Forestville, Conn., for providing content for this cover article.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • port security ship

    US declares national emergency, bans Russian vessels from ports

    See More
  • Lawmakers Criticize Cuts to Security Funding for New York City Mass Transit, Ports

    See More
  • Ghana Port Authority conducts security drills for situational awareness

    Ghana Ports and Harbors Authority conducts drills for security personnel and incident response

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing