Communication Is Critical

Communication Is Critical

Improving public facilities ensures the economic impact to the nation

Ports serve a vital role in the health of a national economy and a critical role in many regions. As an example, according to many in Texas, “Houston is the town that built the port that built the city.” According to its website, The Port of Houston is the nation’s largest port for foreign waterborne tonnage. The port is an economic engine for the Houston region, the state of Texas and the nation. It supports the creation of more than 1.175 million statewide jobs and more than 2.1 million jobs nationwide, and the generation of economic activit y totaling more than $265 billion in Texas. That is roughly 16 percent of Texas’ total gross domestic product. As well, it generated more than $617 billion in economic impact across the nation.

The Port of Houston exemplifies how vital ports are to the local, state and national economy. Maintaining and improving the public facilities ensures the economic impact of ports. Correspondingly, keeping ports secure so that business can flow freely is also an essential responsibility. Many ports synthesize the activities of Health, Safety, Security & Emergency Management as a critical priority alongside the operational flow of the business. If an event did occur, ports count on the ability to respond, recover and then maintain the continuity of port operations. One of the keys to making this possible is critical communications technology.

Critical Communications can take the form of audio and data solutions that can be applied in any environment that requires the protection of human life, and property as well as the management of critical operational tasks. Many of these solutions depend on IP-based Intercom and public address solutions to deliver clear, intelligible audio in highly noisy environments using standard power over Ethernet connections. These audio solutions often require the seamless integration into other commonly used technologies so a virtual presence can be achieved.

Critical communications technology vendor Vingtor-Stentofon has supported many port security programs. They partner with integrators that have experience and expertise in port operations. Texas Technical Services Inc. is one example.

Paul Rux, director of the South Central Region for Vingtor-Stentofon shared his experience in partnering with Texas Technical on a number of port applications around their critical communication needs. Here is what he found to be the key pillars of a critical communications scorecard for ports:

Intelligibility is a priority and it cannot be validated by a brochure. One of the largest ports purchased a communications solution from a perceived leader in the communications market. It was eventually displaced because of its inability to produce sound that could be heard and understood. “Intelligibility” reorients your priorities by establishing a benchmark that communication must be able to be heard, to be scaled, and to be understood. From a single person within range of an intercom station to the ability to broadcast critical instructions during an emergency across a substantial distance and in competition with noise from operations, environment or the chaos of an emergency, no technology company is successful without having audio expertise as a cornerstone of their strategy.

Interoperability is critical because communication systems must integrate seamlessly with other mission critical port systems such as access control, networked intercom systems, intrusion detection, remote monitoring and video surveillance. Ports recognize that its ecosystem depends on security having a voice as well as eyes, ears and feet on the ground. To test this, you must assess your overall infrastructure and your future path and benchmark other implementations in your sector. An integrator can help with this.

The “Ilities”. The port is subject to standards and regulations. How it addresses these can be from a compliance perspective. But better yet, are the ports that drive maintainability, sustainability, reliability, and availability as competitive differentiators. An example that can be accessed from the Port of Houston’s website: On March 27, 2008, the Port Security & Emergency Operations Department Security Management System (SMS) was certified to ISO 28000:2007, making it the first port authority in the world to receive this international security designation. Since the port is composed of people performing roles in a process using technology, the ISO standard provided a response to the market demand for enhanced supply chain security.

From a specification perspective, the following elements are often called out in requests of proposals from ports.

  1. Deter, detect, document, delay and respond.
  2. Access entry/exit audit trail.
  3. Mustering points.
  4. Emergency notifications.
  5. Command and control.
  6. Crisis management.
  7. Constant monitoring via CCTV, access control and alarms.
  8. Access rights are highly controlled, managed, recorded and monitored.

As is evident here, many ports are looking for advanced integrations with other applications within their environment. A critical focus in on the integration with their access control systems.

According to Dan Rothrock, Vice President of Strategic Alliances for Vingtor- Stentofon, this demand for interoperability cannot be addressed by simply announcing integration.

“The true test for integrated solutions that stand the test of time is the ability to identify the leaders in the market, collaborate with them to ensure full functionality and performance, and then develop core processes for maintaining and sustaining that integration over time,” Rothrock said. “This is not trivial but can be tested by organizations through the due diligence process.”

The lessons from addressing port demands for predictable, reliable and sustainable communications are transferrable to other industries. The business of the port involves many people, processes and technology elements. Success of its core business depends on how optimized these elements become. What ports have learned applies to every business. Communication is critical and cannot be compromised. Intelligibility, Interoperability and the “Ilities” must be the key foundation for establishing the measures of performance before and after the deployment.

This article originally appeared in the July 2016 issue of Security Today.

Featured

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.