Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    Supply Chain Security Poses Opportunities, Obstacles

    By
    Jacqueline Emigh
    -
    September 23, 2005
    Share
    Facebook
    Twitter
    Linkedin

      With hurricanes and transit bombings top-of-mind, vendors at this weeks Maritime Security Conference talked up supply chain security technologies, while customers pointed to implementation hurdles that include costs, complexities, and the still emerging status of industry standards and regulations.

      As Hurricane Rita geared up to strike the Texas shoreline, speakers at the show in New York peppered their presentations with remarks around the urgent need to develop supply chain and other IT systems capable of dealing with all types of natural and manmade disasters.

      On the one hand, the success of video surveillance cameras in catching four of the London subway bombers represents a great recent example of how technology can help, according to several attendees.

      /zimages/1/28571.gifIBMs Intelligent Trade Lane provides security and supply chain efficiencies to customers shipping products beyond national borders. Click here to read more.

      But needs for new technologies remain rampant, and some customers expressed very specific requirements. At the close of one session, for instance, Harold W. Neil Jr., director of transportation for the state of New Jersey, said that sensor technologies available today still arent adequate for sniffing out the sorts of stuff that might show up in biochemical terrorist attacks.

      By and large, corporate customers want supply chain security technology that will let them comply with government requests for information sharing, while at the same time protecting product data from their competitors, said Thomas Wilson, managing director of Global Trade Management for systems integrator BearingPoint.

      “[Some companies believe that] this data is sensitive [if it lands] in the wrong hands, and that it shouldnt become part of the public domain,” according to Wilson.

      But at the same time, growing numbers of corporations are working with each other and government agencies to create a single “truly end-to-end solution” for port and supply chain security, said Sandra Scott, director of international relations for logistics specialist Yellow Roadway Corp.

      “One goal [for corporations] would be to get their shipments expedited [through customs agencies],” according to Scott. “Companies also want to be able to provide their data in any format.”

      /zimages/1/28571.gifTerrorism fears spawn a new global standard for cargo security. Click here to read more.

      As one effort along these lines, Scott cited ADTA (Advanced Trade Data Initiative), a program launched by the U.S. Customs and Border Protection agency.

      Also at the show, Jerry Cook, vice president for government and trade relations at Sara Lee Branded Apparel, said he sees an opportunity for the IT community to create an “integrated system for understanding risk [and] threat.”

      Next Page: Future security requirements.

      page 2

      Daniel Collins, a government solutions executive at IBM, detailed some of the complexities associated with creating workable solutions.

      “What do the London subway bombing and Hurricane Katrina tell us about future security requirements?” he asked. Although “a natural disaster is not the same thing” as a manmade disaster, natural disasters “give us some opportunities to observe mechanisms [present in manmade disasters],” Collins said in a presentation.

      The mechanics of supply chain security combine physical security and logical (or computer) security elements with a process orientation, for making decisions about what actions to take, according to the IBM executive.

      In its research labs, he said, IBM is exploring new technologies in areas such as risk management and decision support to assist customers in preparing for and coping with disasters.

      Although its important to practice the use of technology in non-disaster settings, “practice” implementations may turn out differently than actual deployments “out in the wild.”

      Supply chain security technology also faces challenges in the areas of cost concerns, resistance to change and lack of awareness—particularly in some countries outside the United States—that it can do more than just “stop pilferage and theft,” according to Collins.

      /zimages/1/28571.gifThe National Cargo Security Council helps supply chain security pros explore new technologies for fighting terrorism and theft. Click here to read more.

      But, he said, all companies need to step up to the responsibility of supply chain security, whether theyre involved at the front or back end of the supply chain.

      Some technologies and other initiatives discussed at the conference tried to answer complexity by meeting the increasing convergence between public safety and supply chain concerns.

      For example, Homeland Integrated Security Systems demod Cyber Tracker, a portable detection device designed for real-time tracking of people as well as vehicles and other movable objects.

      In other show news, Hewlett-Packard Co. and BearingPoint showcased their mutually developed Maritime Port Integrated Management and Security Solution.

      L-3 Communications Security & Detection Systems announced the delivery of cargo X-ray screening systems to customs agencies in both Saudi Arabia and the UAE (United Arab Emirates).

      Ironically, the ongoing threat of disaster these days came to life dramatically near the end of the Maritime Security Conference on Wednesday.

      Vividly cognizant of the devastation wrought by Katrina earlier this month, exhibitors from Texas and surrounding areas rushed to the airport to go back home and secure their personal belongings before Rita could get there first.

      /zimages/1/28571.gifCheck out eWEEK.coms for the latest news and analysis of enterprise supply chains.

      Jacqueline Emigh
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×