Port Security ECT Delta Terminal Rotterdam, The Netherlands.

Slides:



Advertisements
Similar presentations
2011 NetIS Presentation The Complete ePublishing Platform Designed for the 21 st Century.
Advertisements

0 Communication Needs for a 21 st Century Railroad May 17, 2007 IEEE Communications Society CQR International Workshop 2007.
Encrypting Wireless Data with VPN Techniques
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Your All in 1 Logistics Solution. The Problem Problems that your business might be facing Delivery delay / mistake Facilities are not used effectively.
RFID Access Control System March, 2003 Softrónica.
IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA.
The Complete Visitor Management System
BELASTINGEN EN INVORDERINGEN Administratie der Douane en Accijnzen 19 October What is the Megaports Initiative and which are its objectives? The.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Leveraging RFID-Enhanced Networks for Ocean Cargo Visibility and Security: Vic Verma Chairman, President and CEO Savi Technology AIDC 100 "Truth in Technologies.
Weapons/Gear Accountability Utilizing Radio Waves (RFID)
Accurate Monitoring and Real Time Tracking of Visits Complete Visitor Management Solutions A Product of Copyright © ANGLER Technologieswww.angleritech.com.
Cyril Ovely CTO Vxceed Technologies FZ LLC
FenyaWM – Sales Picking is fully integrated with Pastel Accounting. This solution facilitates the accurate and efficient picking of customers orders with.
Rafrex LLC - RFID Solutions
11 Distributed Middleware for Container Transport: Lessons Learned (Klaas Thoelen, Sam Michiels, Wouter Joosen) 7th MiNEMA Workshop August 21, Lappeenranta,
Smart & Secure Trade lanes Rotterdam CSI project.
Smart and Secure Tradelanes (SST)
Gateplus Time Attendance and Access Control System.
RFID in Container Transportation
COPAS B.V. ICT specialists for the Container Handling Industry Company profile (October 2004) Home base: Rotterdam, The Netherlands We travel all over.
Uniqueness of user names is enforced Customer information logged to database Require contact information as well as address address will.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Scott Hoffpauir BroadSoft, Inc. Vice President, Engineering OPENSIG October 15, 1999 The Enhanced Services Layer in a Distributed Packet Network.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Predictive Maintenance: Condition monitoring Tools and Systems for asset management September 19, 2007.
What is Influx InfoTech ?. About Influx InfoTech IT products & services company Delivering technology driven business solutions Hi-end infrastructure,
Army Total Asset Visibility with Enhanced RFID Tracking November 15, 2010 Recorded Demonstration.
Use of RFID in Shipments between Shore Base Terminals and Oil Platforms in the Gulf of Mexico Yasemin Aksoy Tulane Consortium for Supply Chain Management.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Spread Logistics Service Introduction
Why load testing? Application insights.
Securing Microsoft® Exchange Server 2010
Information Technology Networked Computer Systems –Linking individual computers to create an organizational network for communication and information.
Monitoring for network security and management Cyber Solutions Inc.
A detailed look at the Microsoft Windows Infrastructure at UWE including Active Directory (AD), MIIS, Exchange, SMS, IIS, SQL Server, Terminal Services.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
1 The necessity of monitoring transport of goods An assessment on goods monitoring and its value for road authorities and users Civ.eng. Jan Erik Nilsen.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
I SO TC204 (Intelligent Transport Systems) – WG7 (General Fleet Management and Commercial Freight Operations) ( Meeting Barcelona 15 Sept 09) Presentation.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
IMPROVING HAZARDOUS WASTE MANAGEMENT COMPLIANCE USING RELATIONAL DATABASES Angela Cox and Larry Reynolds.
Desktop shipping application Desktop shipping application Web based shipping application Web based shipping application Track and trace web portal Track.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Lauren Olin Eastern Regional Mgr. Public Sector Government Solutions cell phone
Complete Visitor Management Solutions A Product of Accurate Monitoring and Real Time Tracking of Visits Complete Visitor Management Solutions.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Parent Portal The txConnect parent portal allows parent’s to monitor their student’s progress in school.
E-Michigan Web Development 1. 2 What Is It? A web based collaboration tool that is internal to state government and accessible only from within the state.
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
In and Out Time Systems Sean McReynolds Daniel Eaton Daniel Lofgren Seth Looysen.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Beavercreek High School BYOD Student Training: Wi-Fi Login and Authentication Portal.
RAPT RFID based Asset and Personnel Tracker Team 24.
1 Optimising Visibility and measuring Performance in Intermodal Container Supply Chains Dr. Nils Meyer-Larsen Institute of Shipping Economics and Logistics.
T H E M O D E L B O R D E R O F T H E 2 1 ST C E N T U R Y U N A F R O N T E R A D E S E G U R I D A D Y P R O S P E R I D A D © Copyright SecureOrigins,
Access Account Activation and Electronic Signature Web Application.
Truck Stock Phase 1 Goal: Johnstone customers or delivery drivers are provided with the ability to build orders with handheld devices. The order is created.
TxCONNECT TX connect is a Web Based application that can be accessed from anywhere using an internet connection Parents may access TX Connect from home,
Exe Related 2FA Functionality.
Securing the Network Perimeter with ISA 2004
Cloud Connect Seamlessly
Weapons/Gear Accountability Utilizing Radio Waves (RFID)
2nd Floor AMWSLAI Building Bayani Road, AFPOVAI Bonifacio Global City, Taguig 1634 phone: (+632) – 65 | Mobile Nos. (smart) | (globe)
MAPUTO PORT DEVELOPMENT COMPANY IT Projects Update Order to Cash - Completion of system development - User Training - Go Live (July 2018) - Post.
Presentation transcript:

Port Security ECT Delta Terminal Rotterdam, The Netherlands

Delta Terminal

Delta Terminal 2 3 4 6 34 5 ~~~ DDE DDW Rail Term East Barge Term. Gate ~~~ ECT Delta Terminal 32 33 34 52 51 50 49 47 56 46 45 44 43 42 41 40 39 38 64 65 71 72 48 22 23 24 25 26 27 28 DDN The dark (green) locations are equipped with SAVI-readers to identify e-sealed containers. On the ECT premises BreezeCom operated Hand held Terminals can be used. 37 Admin Pre-Gate Area Rail Term West 2 3 4 6 34 5

Assign, Lock, Seal Process

Hand Held Application Login Users with valid handheld user permissions can log into the TSS handheld software. User names and passwords are authenticated based on the user profiles stored in the security setup User profiles determine the level of access permissions in the TSS handheld software

Hand Held Screen

One Seal Tag on each Container Electronic Seals One Seal Tag on each Container

Signpost & Reader at Truck Gate

Reader at Rail Terminal

Reader at Rail Terminal

Reader on Quay Cranes Final confirmation of physical security integrity by a reader mounted on each quay crane at the point of loading

Reader on Quay Cranes

Site Manager

SST1 Backbone: Hutchison Deployment Customs Transportation Security System Legend Transportation R Savi Reader Handheld w/ Savi H Mobile Reader Security System Web Browser Terminal Operations System S Savi Signpost SM Open Network and Software Platform Site Manager SmartChain X X-Ray/Gamma Ray Scanner Platform Alerts Automated Security & Data Collection Secure Intranet SM SM SM S R H S R S R H S R Hong Kong Felixstowe Terminal Terminal H R H X H R Sealing Gate In Station Inspection Quay (BASF & Xerox (Barge Berth) Station Cranes Rotterdam - ECT Delta Terminal

SST1 baseline to: Current & Future Scope Technology Open Network and Software Platform Network connecting 11 trade lanes Data aggregation, normalization Distribute applications across network SST1 baseline to: Monitor location and security integrity of container traffic Demonstrate interoperability of different data capture mechanisms Do end-to-end security: point of origin to port of loading, in-bond, high-value and/or sensitive cargo Automated Security and Data Collection UDAP (plug-n-play protocol), Active RFID, GPS, Sensors, Bar Code, RTLS Integrated and Interoperable Transportation Security System Active RFID GPS/GSM SatComm Readers Open Network and Software Platform Hand Helds SmartSeal Tag UDAP Sign Posts Sensors Tags Gamma Ray RTLS BarCode RFID ISO E-Seals

System Review