Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Transportation/Logistics/Supply Chain/Distribution/ Warehousing

Envisioning the Future for Supply Chain Security

By Bill Zalud
February 1, 2009

Laura Stepanek: We talked about important current technologies. Let’s also look at future technologies. Let’s take a look at what you see that may play an important role in the protection of people and assets.

Bill Zalud: Or maybe even a wish list of what you would like to see.

John Sutton: I would, at this moment, probably lean towards sophistication and further enhancement of positive ID. That through the use of biometrics, through the use of various other electronic means – and personal identification being high on the list when I think about securing our many, many different areas – the facilities that we occupy.

It’s become quite a challenge and this is not only within our own facilities, but positive ID as you pass through an airport or through any place that requires some sort of identification check. It becomes important to know who you are and what business you have being there associated with being who you are.

Thomas Wojciechowski: From our point of view, the technology’s going to keep enhancing. I look for the future for the different government-sponsored security programs to be enhanced even more and evolve even better over the next couple years. We watched the TWIC program come in. We watched the C-TPAT.

We’re watching the Canadian Partners in Protection.

The best way to put it is we are in a world economy in that different countries are going to be joining, writing their own programs, enhancing and then possibly one day… when you ask for a wish list, I guess for all of them to come together for one program, so the requirements or the guidelines aren’t different from different country to different country.


Bill Zalud: That would be an excellent consolidation.

Bernie Jacobs: I would like to see a concentration of government money put into facial recognition enhancement, because when you’re dealing with the humongous volumes of people that most of our clients deal with, identification via a mag stripe card or a photo image or whatever, it just doesn’t work. It slows the process down too greatly. Facial recognition carried to the extreme would be an excellent, excellent tool for us and would greatly enhance the security potential at a lot of our facilities.

Jim Henry: I think the new catch phase, which is kind of a synonym to interoperability, is the term “situational awareness.” That really has taken on some steam here in the last year, year-and-a-half. It really points to the functional viability of being able to make intelligent decisions from a lot of triangulated information – that you’re using the computing power of the edge devices and the processors to enable the human element to make faster, more intelligent decisions. That’s really where the whole industry is driving.

At the end of the day it’s not about which card reader has the slickest feature set or which individual biometric technology or which camera has the greatest level of resolution to detail at 1,000 feet.

You have to pull all that information in, triangulate it, overlay it and then have a fairly complex processing, a crunching of that information to provide that situational awareness to the end users so they can make informed decisions. We’re seeing a lot of advancements in systems that are providing those kinds of fusion engines to triangulate that.


Laura Stepanek: We’re seeing a lot of cities deploying situational awareness.

Jim Henry: That’s correct.


Laura Stepanek:
Rob, what is on your wish list for future technologies?

Rob Hile: I agree 100 percent with what Jim said. Open standards and interoperability in the security industry is our No. 1 – my No. 1 – wish list. The use of CCTV cameras is expanding. The video analytics engines are getting stronger. Situation awareness, situation management is here. Look at the passenger-screening devices with millimeter wave and backscatter computer tomography and enhanced trace detection. RFID tagging is being expanded and GPS tracking. Now we’ve got DNA spray for cargo seals.

Another area that we’re looking at, because we’re doing some things internationally, is bioscience technology. We’re taking a hard look at brain waves and different non-evasive sensors that are measuring facial expressions and heart rate. The sensors are becoming more geospatially aware; they’re almost intelligent.

The bottom line is every sensor needs to work together to identify a threat before the threat becomes reality. And the only way to do that is to have an open standard of communication, interoperability in industry. We need it; our customers are demanding it and it’s a must. We have to have it.


Bill Zalud: But that’s going to be the biggest challenge, don’t you think? If we have really open standards then why do we need 55 access control companies and 120 camera companies?

Rob Hile: I can answer that on a high level, but I agree with what you’re saying. I think that the bottom line is interoperability is going to give us the ability to communicate across a network at a data level. But when you’re talking about the features and benefits, you still might need some different cameras. You’re going to have those manufacturers that are going to offer it better in low light. You’re going to have some at 35x versus, 23x or whatever.

When I’m talking about inoperability – and I’m keeping it very simple because these manufacturers are beating us up every day over this – let’s communicate at a data level. What you guys do at the binding levels I’m okay with because that’s why I’m an integrator.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5mw Bai Cortese

    5 minutes with Tony Bai and Joe Cortese - The future of supply chain security

    See More
  • First-ever Girls Scouts Supply Chain Patch for future female executives

    Future female executives earn first-ever Girl Scouts' supply-chain patch

    See More
  • warehouse.jpg

    The need for robust supply chain defenses to protect sensitive data

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing