<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interviews Archive - NOX SYSTEMS | Security beyond limits</title>
	<atom:link href="https://noxsystems.com/en/category/interviews-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://noxsystems.com/en/category/interviews-en/</link>
	<description></description>
	<lastBuildDate>Mon, 27 Oct 2025 16:27:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</title>
		<link>https://noxsystems.com/en/increased-risks-for-kritis/</link>
					<comments>https://noxsystems.com/en/increased-risks-for-kritis/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 13:45:53 +0000</pubDate>
				<category><![CDATA[EMA]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[alarm management]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Hybrid Threats]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=10471</guid>

					<description><![CDATA[<p>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well? Torsten Hiermann: "The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: "We are not at  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-1" style="--awb-text-color:#000000;"><p><strong><em>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> &#8220;The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: &#8220;We are not at war, but we are no longer at peace either.&#8221; Malicious manipulation is no longer a marginal phenomenon but rather a strategic method of disrupting economic, political, and social processes. The office for the protection of the constitution and the federal office for civil protection define this approach as deliberately impairing or destroying structures to weaken or influence them. This is not just about &#8220;classic&#8221; attacks on buildings, but also subtle attacks, such as disruptions to supply chains, targeted espionage, manipulation of public perception, and spreading uncertainty to influence political decision-making or encourage anti-state attitudes.</p>
<p>Therefore, the perpetrator landscape is broad. According to police statistics, left-wing extremist groups in particular tend to carry out attacks on infrastructure and provide instructions on how to build incendiary devices online. We also see state actors working through &#8220;proxies,&#8221; or recruited helpers who appear inconspicuous at first but are actually pursuing foreign interests. We must also not underestimate the danger from within. Employees who are frustrated or feel unfairly treated can become saboteurs.</p>
<p>Additionally, we are now dealing with hybrid threats. These attacks are not only physical, such as cutting a cable or attacking a transformer station, but also combine cyberattacks, social engineering, and classic physical attacks. Perpetrators intercept data, manipulate processes, or use social media to obtain information. That&#8217;s why I say the protection of objects doesn&#8217;t end at the fence.</p>
<p><em><strong>You mentioned the importance of information. Could you elaborate on that?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> Many people underestimate how valuable publicly available information is to a potential attacker. Social media profiles often reveal interesting information: For example, LinkedIn profiles often reveal not only where someone works, but also the projects and technologies they are involved in. This information is an excellent recruitment and evaluation tool for external services. The fact that Google Earth can be used to evaluate the initial vulnerabilities of a location is nothing new.</p>
<p>Added to this is careless handling of internal information. For example: In a critical infrastructure facility, tradespeople and service providers are given a detailed site plan with corresponding facility designations as part of their safety training. This provides potential perpetrators with precise information for planning an attack. This illustrates that protection against saboteurs also requires preventive information protection. What data should I publish? How restrictive should I be when naming contact persons? Is there a social media policy? How do I educate employees so they understand they are part of the security chain?</p>
<p><em><strong>Drones have recently come into focus as a security risk. How do you see the role of airspace in the overall concept?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> The threat posed by drones has reached a new dimension. They can film, collect reconnaissance data—for example, on processes or response times—record digital signatures, and transport objects and &#8220;weapons,&#8221; which they can drop. The war in Ukraine has shown how rapidly technology and its applications are advancing.</p>
<p>Nevertheless, I advocate a differentiated approach. Not every company needs to invest in expensive anti-drone systems right away. The key factor is risk analysis. A &#8220;normal&#8221; production facility without drones poses a lower risk than an energy supplier, chemical plant, airport, or military property, for example. In particular, KRITIS operators must now &#8220;take airspace into account&#8221; in their security concepts.</p>
<p>Remember that drones often complete their task before being detected. Therefore, the key questions are: How do we detect drones, and how do we respond to them? Rather, the security concept must be thought out from the perspective of the perpetrator. What information will a drone be able to see and access? How can that be prevented &#8220;on the ground&#8221;?</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-1 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img fetchpriority="high" decoding="async" width="300" height="200" title="TH_Porttrait_1" src="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-300x200.jpg" class="img-responsive wp-image-8604 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-200x133.jpg 200w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-400x267.jpg 400w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-600x400.jpg 600w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-800x534.jpg 800w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1.jpg 1000w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-2 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p>&#8220;Comprehensive protection is not just about defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.&#8221;</p>
<p><strong>Torsten Hiermann</strong><br />
CriseConsult</p>
</div></div></div></div><div class="fusion-text fusion-text-3" style="--awb-text-color:#000000;"><p><em><strong>What specific countermeasures do you recommend in terms of organization and technology?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It&#8217;s about a holistic approach. First, the organizational side: prohibitions on filming and photography on company premises, employee training, and checking vehicles and people for items they are carrying. Access controls must also be reliable and effective. Depending on the level of protection, this may involve biometric procedures. In short, if I don&#8217;t check at the gate to see if a service provider is bringing in something undesirable, I don&#8217;t need to worry about drones above.</p>
<p>Technically, we have a wide range of options, including perimeter sensors, video surveillance, motion detectors, and tamper-proof devices. Drone detection systems can also be useful. In critical areas, active defense measures, such as jammers or interceptor drones, may be considered. At the same time, however, it&#8217;s important to consider resilience, such as redundant power supplies, emergency generators, and secure supply chains. Business continuity is always part of overall protection!</p>
<p><em><strong>What role does integrated alarm and security management play in this context?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> A crucial one. We can introduce as many individual measures as we like, but if they are not integrated, we will end up with a patchwork again. To create an effective 360-degree security concept, all vectors must be taken into account.</p>
<p><em><strong>Does that mean that, in the future, all companies—not just KRITIS operators—will have to address attacks more intensively?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It depends on the risk analysis and the level of protection. A medium-sized mechanical engineering company may not face the same threats as a network operator. However, they can still be crippled by physical or IT attacks. Just think of cyberattacks, disrupted supply chains, or power outages. Production at the Tesla Gigafactory was crippled not by a highly complex operation but by a simple arson attack on a supply line. So, the question is, &#8220;How vulnerable am I?&#8221; How resilient are my processes? Have I taken precautions to remain operational in the event of an attack or minimize damage?</p>
<p>This is precisely why business continuity is important. Comprehensive protection is about more than just defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-10471-1"><div class="fusion-panel panel-default panel-dd1174c726c71b95d fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_dd1174c726c71b95d"><a aria-expanded="false" aria-controls="dd1174c726c71b95d" role="button" data-toggle="collapse" data-parent="#accordion-10471-1" data-target="#dd1174c726c71b95d" href="#dd1174c726c71b95d"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">CriseConsult</span></a></div></div><div id="dd1174c726c71b95d" class="panel-collapse collapse " aria-labelledby="toggle_dd1174c726c71b95d"><div class="panel-body toggle-content fusion-clearfix">
<p>Torsten Hiermann is the founder of CrisisConsult, a consulting firm that specializes in crisis and security management. He advises companies, local authorities, and government institutions, drawing on his extensive experience in operational roles within emergency and crisis management teams. Torsten is also a lecturer at the Academy for Crisis Management (AKNZ) and at the University of Münster. He is also an officer in the German Armed Forces. In security management, he takes a holistic, 360-degree approach to ensure that the level of security and the potential threat are proportionate.<br />
www.criseconsult.de</p>
</div></div></div></div></div></div></div></div><div class="fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-with-title content-left" style="--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);--awb-item-margin-bottom:40px;" data-animationOffset="top-into-view"><div style="--awb-backgroundcolor:rgba(255,255,255,0);" class="fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper link-area-link-icon link-type-text content-icon-wrapper-yes icon-hover-animation-fade" data-animationOffset="top-into-view"><div class="heading icon-left"><a class="heading-link" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self"><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:24px;--fontSize:24;line-height:1.4;">NOX SYS</h2></a></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Systems like NOX SYS integrate intrusion detection technology, access control, video surveillance, and alarm management onto one platform. This allows events to be recorded and evaluated holistically and targeted measures to be initiated. NOX SYS is EN 50131 Grade 3 certified and suitable for use in KRITIS environments. The modular system can easily be supplemented with new technologies, such as drone detection. Additionally, encrypted communication between components and a high level of tamper protection ensure manipulation is detected and prevented.</p>
</div><div class="fusion-clearfix"></div><a class=" fusion-read-more" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self">Read More</a><div class="fusion-clearfix"></div></div></div><div class="fusion-clearfix"></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/increased-risks-for-kritis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Detecting and Preventing Manipulation: How Companies Shield Themselves from Hybrid Threats</title>
		<link>https://noxsystems.com/en/hybrid-threat-protection/</link>
					<comments>https://noxsystems.com/en/hybrid-threat-protection/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 11:33:42 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cyberangriffe Unternehmen]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hybrid Attacks]]></category>
		<category><![CDATA[Physical Security]]></category>
		<guid isPermaLink="false">https://noxsystems.com/schutz-vor-hybrider-sabotage/</guid>

					<description><![CDATA[<p>Physical breaches are one of the most underestimated — yet potentially devastating — threats to modern organizations. It’s hard to predict, often strikes without warning, and can leave lasting damage. While cyberattacks like ransomware or phishing dominate the headlines, physical disruptions often go unnoticed. Yet the real danger lies in their combination: digital and  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/hybrid-threat-protection/">Detecting and Preventing Manipulation: How Companies Shield Themselves from Hybrid Threats</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-4" style="--awb-text-color:#000000;"><h5>Physical breaches are one of the most underestimated — yet potentially devastating — threats to modern organizations. It’s hard to predict, often strikes without warning, and can leave lasting damage. While cyberattacks like ransomware or phishing dominate the headlines, physical disruptions often go unnoticed. Yet the real danger lies in their combination: digital and physical attacks are increasingly intertwined.</h5>
<h5>In this expert interview, Björn Hawlitschka from MACONIA GmbH shares what businesses need to know now — and how to build real resilience against hybrid threats.</h5>
<p><em><strong>Mr. Hawlitschka, what types of digital or physical interference are most common today?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> According to the German digital industry association Bitkom, digital attacks have significantly increased in recent years. Ransomware, phishing, targeted malware infections, and other forms of cybercrime are often much easier for attackers to carry out than physical attacks. They don’t require physical presence, can be controlled remotely and anonymously, and usually involve lower risk. The rise of remote work and the growing connectivity of critical systems have accelerated this trend.<br />
But that doesn’t mean physical disruption is losing relevance – quite the opposite. Although less frequent, physical attacks often have more far-reaching consequences, especially when critical infrastructure is involved. A recent example is the suspected left-wing extremist arson attack on the Tesla factory in Grünheide, which severely impacted the regional power supply.</p>
<p><em><strong>Why is the combination of digital and physical threats particularly dangerous?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Combined digital and physical attack strategies represent a particularly complex and challenging risk scenario. The digital component can be used for reconnaissance – reading building plans, disabling alarm systems, or manipulating access control. These vulnerabilities pave the way for targeted physical attacks that cause real damage. A cyberattack becomes the entry ticket for a physical assault. Attackers use this synergy to maximize impact and bypass defenses that are often only prepared for one type of threat.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-2 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="300" title="portrait_hawlitschka" src="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-300x300.jpeg" class="img-responsive wp-image-8498 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-200x200.jpeg 200w, https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka.jpeg 400w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-5 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>“A cyberattack becomes the entry ticket for a physical assault.”</em></p>
<p><strong>Björn Hawlitschka</strong><br />
MACONIA GmbH</p>
</div></div></div></div><div class="fusion-text fusion-text-6" style="--awb-text-color:#000000;"><p><em><strong>Which internal weaknesses make companies vulnerable to targeted disruptions?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> One of the biggest weak points is one-sided focus – either on IT security or on physical protection. A company that installs firewalls and antivirus tools but has no access control system is just as vulnerable as one that does the opposite.<br />
Often, basic organizational structures are missing – like a functioning crisis response team or clearly defined emergency processes. These gaps make it easy for attackers to create chaos through targeted actions. A lack of clearly communicated reporting channels and responsibilities also hinders effective responses to suspicious incidents. In the end, it’s the fragmentation of security structures that leaves many organizations exposed.</p>
<p><em><strong>How can the human factor be strengthened to prevent targeted interference?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Despite all the technology, people remain one of the biggest vulnerabilities – but also one of the strongest lines of defense when empowered correctly. What’s crucial is a lived security culture: Employees need to know how to act, what the risks are, and who to report to in case of suspicion. Real protection emerges only when basic awareness is integrated into everyday behavior – when it becomes second nature to challenge strangers in the hallway or to lock screens when leaving desks unattended. It’s also essential that awareness programs don’t just focus on IT. Physical aspects – like visitor protocols, USB port controls, or screen filters in sensitive areas – need to be trained and communicated just as regularly. Technical tools like video surveillance or access control systems are important – but without employee vigilance, they’re not enough.</p>
</div><div class="fusion-text fusion-text-7" style="--awb-text-color:#000000;"><p><em><strong>How does today’s geopolitical climate influence the risk of targeted disruption?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> The current global political climate is significantly increasing the risk of targeted interference. The Russian invasion of Ukraine marked a new level of hybrid conflict, in which Western infrastructure has become a clear target – whether via state-sponsored hacking groups like APT28 or covert operatives on the ground. What’s striking is the rise of “low-level agents”: not trained spies, but individuals acting on orders to carry out simple but effective attacks.<br />
Tensions with China could also drive an increase in industrial espionage and targeted disruptions, especially if economic isolation or tech sanctions take effect.<br />
We also need to consider domestic threats – environmental activists or radicalized groups can become actors themselves, especially when political frustration grows.</p>
<p><em><strong>How important is the integration of IT and physical security for comprehensive protection?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Effective protection requires integrated strategies combining both digital and physical security. These two areas must be aligned not just technically but also organizationally. Modern security systems should enable centralized and modular management of intrusion detection, access control, video surveillance, and backup power. In hybrid attack scenarios, digital alerts must trigger physical responses – for example, when a perimeter breach is detected, a response team must be dispatched automatically. Without this integration, companies risk falling into dangerous response gaps.</p>
<p><em><strong>What are best practices for handling suspected security incidents or disruptions within an organization?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Companies must establish clear and well-communicated reporting procedures. Employees should know exactly who to contact in case of a suspicious incident – and feel confident that their report will be taken seriously. It’s also smart to build relationships with security authorities, such as national security agencies or cybercrime units, well before an emergency occurs. If targeted disruption is suspected, external specialists like IT forensic experts or corporate security consultants should be brought in early. And when in doubt – for instance, if someone is acting suspiciously or photographing sensitive areas – it’s better to overreact than underreact. A professional and level-headed approach builds trust. Organizations that conduct regular crisis drills, assign dedicated emergency teams, and work with external partners are far better prepared. And let’s be clear: Preparedness costs money – but nowhere near as much as a successful security breach.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8733-2"><div class="fusion-panel panel-default panel-877967eba8ec5ca2c fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_877967eba8ec5ca2c"><a aria-expanded="false" aria-controls="877967eba8ec5ca2c" role="button" data-toggle="collapse" data-parent="#accordion-8733-2" data-target="#877967eba8ec5ca2c" href="#877967eba8ec5ca2c"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">MACONIA GmbH</span></a></div></div><div id="877967eba8ec5ca2c" class="panel-collapse collapse " aria-labelledby="toggle_877967eba8ec5ca2c"><div class="panel-body toggle-content fusion-clearfix">
<p>MACONIA stands for independent, neutral security consulting with real depth – driven by an experienced team that combines expert knowledge with hands-on experience, integrity, and a commitment to the highest quality standards. Learn more: <a class="" href="http://www.maconia.de" target="_new" rel="noopener" data-start="296" data-end="335" data-is-last-node="">www.maconia.de</a></p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/hybrid-threat-protection/">Detecting and Preventing Manipulation: How Companies Shield Themselves from Hybrid Threats</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/hybrid-threat-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>From Signal to Action: Rethinking Alarm Management</title>
		<link>https://noxsystems.com/en/rethinking-alarm-management/</link>
					<comments>https://noxsystems.com/en/rethinking-alarm-management/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Tue, 20 May 2025 12:05:07 +0000</pubDate>
				<category><![CDATA[EMA]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[360-degree security]]></category>
		<category><![CDATA[alarm management]]></category>
		<category><![CDATA[Critical Infrastructure Security]]></category>
		<category><![CDATA[intrusion detection system]]></category>
		<category><![CDATA[KRITIS-Sicherheit]]></category>
		<category><![CDATA[security system integration]]></category>
		<guid isPermaLink="false">https://noxsystems.com/alarmprozesse-in-der-praxis/</guid>

					<description><![CDATA[<p>Intrusion detection systems are often the first technical component of a security infrastructure, but without an effective alarm management process, they remain limited in their effectiveness. In a fully integrated, 360-degree security approach, it is essential to combine detection, evaluation and response to create a seamless process. This is the only way to avoid  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/rethinking-alarm-management/">From Signal to Action: Rethinking Alarm Management</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-8" style="--awb-text-color:#000000;"><h5>Intrusion detection systems are often the first technical component of a security infrastructure, but without an effective alarm management process, they remain limited in their effectiveness. In a fully integrated, 360-degree security approach, it is essential to combine detection, evaluation and response to create a seamless process. This is the only way to avoid fragmented solutions and manage security efficiently.</h5>
<h5>Torsten Hiermann of CriseConsult explains how intrusion detection can be embedded into an effective alarm management strategy, and why regular alarm drills are a frequently overlooked success factor.</h5>
<p><em><strong>How should effective alarm management be incorporated into a 360-degree security framework, and how can it prevent the development of isolated solutions?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>In military settings, we use the term &#8216;actionable intelligence&#8217;, which means: Information must be reliable and timely enough to be processed and acted upon. In this context: There is no such thing as a 360-degree security approach without functional alarm management. What use is precise detection if the downstream structures don&#8217;t work? The process begins with planning a system that aligns with the defined protection level. Only then can the technical components be considered. Most importantly, detection must be linked to predefined actions, whether technical, such as building automation, or organisational, such as deploying security personnel.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-3 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="200" title="TH_Porttrait_1" src="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-300x200.jpg" class="img-responsive wp-image-8604 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-200x133.jpg 200w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-400x267.jpg 400w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-600x400.jpg 600w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-800x534.jpg 800w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1.jpg 1000w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-9 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>“If the alarm chain fails as a single point of failure, the entire process behind it loses its effectiveness.”</em></p>
<p><strong>Torsten Hiermann</strong><br />
CriseConsult</p>
</div></div></div></div><div class="fusion-text fusion-text-10" style="--awb-text-color:#000000;"><p><em><strong>What are the most common weaknesses of intrusion detection systems, particularly in critical infrastructure environments?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>The issue rarely lies with the technology itself. The challenge lies in ensuring that detection leads to action, ideally in the form of timely intervention. However, when personnel are required to respond on site, security teams quickly reach their limits. Response times and available manpower are key constraints. Intruders don’t wait. Therefore, their movement patterns must be tracked and relayed in real time to internal responders. Ideally, their movement should also be restricted, for example via lockdowns. This is technically feasible, but requires investment. This brings us back to the point that technical capabilities must be aligned with risk assessments. Let me add this: Alarm management deals with what happens after an incident is detected. However, the ultimate goal should always be to prevent – or at least delay – the incident from happening in the first place.</p>
<p><em><strong>Can intrusion detection systems actually increase risk, for example by triggering false alarms?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>Even the best systems can be rendered ineffective by poorly coordinated processes. Frequent false alarms can reduce situational awareness. Consider, for instance, a fire alarm that goes off every week – people will eventually stop reacting. Reliability is paramount: if your system triggers unnecessary alarms, the real ones may be overlooked. This undermines the entire subsequent response process.</p>
</div><div class="fusion-text fusion-text-11" style="--awb-text-color:#000000;"><p><em><strong>So, how can modern technologies like AI-based detection improve alarm management?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>We’re seeing rapid technological advances, especially in AI. This is already shaping security systems. Behaviour-based video analytics is one example. Predictive policing is another example. In short, the earlier a threat is detected, even in its early or potential phase, the sooner you can respond or take preventive action. That’s the good news. The bad news is that bad actors are evolving too. Modern technologies are powerful tools. However, they should never replace physical protection, but rather enhance it.</p>
<p><em><strong>How important is regular testing of alarm procedures (e.g., alarm drills) for the real-world effectiveness of a security concept?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>That’s easy to answer – with Benjamin Franklin: <em>“If you are failing to prepare, you’re preparing to fail.”</em> Special forces train. So do emergency physicians, pilots, security teams, and industrial site operators. Alarm drills are among the easiest exercises to conduct – and yet, if the alarm chain fails as a single point of failure, the entire response process collapses. In short: practice matters.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8632-3"><div class="fusion-panel panel-default panel-e2366a33fad4871ad fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_e2366a33fad4871ad"><a aria-expanded="false" aria-controls="e2366a33fad4871ad" role="button" data-toggle="collapse" data-parent="#accordion-8632-3" data-target="#e2366a33fad4871ad" href="#e2366a33fad4871ad"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">CriseConsult</span></a></div></div><div id="e2366a33fad4871ad" class="panel-collapse collapse " aria-labelledby="toggle_e2366a33fad4871ad"><div class="panel-body toggle-content fusion-clearfix">
<p>Torsten Hiermann is the founder of CriseConsult, a consulting firm that specializes in crisis and security management. He advises companies, municipalities, and government institutions, drawing on his extensive experience in operational roles within emergency and crisis response teams. He is also a lecturer at the Academy for Crisis Management (AKNZ) and at the University of Münster. Additionally, he is an officer in the German Armed Forces. In security management, he takes a holistic, 360-degree approach to ensure that the level of security and potential threat are proportionate. www.criseconsult.de</p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/rethinking-alarm-management/">From Signal to Action: Rethinking Alarm Management</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/rethinking-alarm-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Making Integration Work: Practical Insights into Open Security Systems</title>
		<link>https://noxsystems.com/en/system-openness-in-security-integration/</link>
					<comments>https://noxsystems.com/en/system-openness-in-security-integration/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 19 May 2025 13:23:34 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Access & Control Solutions]]></category>
		<category><![CDATA[Integrated Security Solutions]]></category>
		<category><![CDATA[Open Security Architecture]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=8562</guid>

					<description><![CDATA[<p>Why System Openness Is Becoming the New Standard  Few terms are used as frequently – or interpreted as differently – in the security market as 'system openness'. But what does it really mean when real-world projects begin, public tenders demand integration and five systems suddenly need to communicate with each other? We spoke  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/system-openness-in-security-integration/">Making Integration Work: Practical Insights into Open Security Systems</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two">
<h2>Why System Openness Is Becoming the New Standard</h2>
</div>
<div class="fusion-text fusion-text-1"></div></h2></div><div class="fusion-text fusion-text-12" style="--awb-text-color:#000000;"><h5>Few terms are used as frequently – or interpreted as differently – in the security market as &#8216;system openness&#8217;. But what does it really mean when real-world projects begin, public tenders demand integration and five systems suddenly need to communicate with each other?</h5>
<h5>We spoke to Antoine Evertze, Product Manager at ARAS Security Netherlands and long-standing NOX SYSTEMS partner, about this very issue. The result is a candid discussion about what true integration looks like, where the pitfalls lie, and why you don&#8217;t need to integrate everything — just the right things.</h5>
<p><em><strong>Antoine, why is system openness becoming more important in today’s security projects?</strong></em></p>
<p><strong>Antoine Evertze: </strong>Openness isn’t just becoming more important – it’s becoming the standard. Buildings are getting smarter, users are becoming more digital, and IT environments are becoming more complex. No system operates in isolation anymore, whether it&#8217;s access control, video surveillance, human resources or fire safety – everything needs to communicate. Not someday, but in real time and in a controllable and auditable way.</p>
<p>To stay relevant, a system needs to fulfil two criteria. First, it must provide a well-documented API with practical use cases, not just abstract documentation. Second, it must be able to adapt flexibly to changing environments using standardised protocols such as OSDP(v2) for access control, ESPA or Modbus, through custom connectors such as SQL or with an API.</p>
<p>We are seeing more and more that customers aren’t buying features anymore – they’re buying integration capability. This determines whether a system can be scaled up for real-world projects or whether it will fail at the interface.</p>
<p><em><strong>In which projects does NOX really make a difference?</strong></em></p>
<p><strong>Antoine Evertze: </strong>Whenever intrusion and access control need to be unified within a single system, the need for simplicity and consistency becomes obvious – especially in the public sector. No one wants to operate five different systems with five separate interfaces anymore. In a recent government project, we supported the implementation of a solution that not only combined access control and intrusion detection, but also offered a modular, scalable architecture with seamless integrations for video management, elevator systems, and parking management – all controlled from a single platform.<br />
In scenarios like this, fragmented solutions simply aren’t an option.</p>
</div><div class="fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated">Simplifying Complex Infrastructures Through Integration</h3></h3></div><div class="fusion-text fusion-text-13" style="--awb-text-color:#000000;"><p><em><strong>Which systems do you consider essential for integration today?</strong></em></p>
<p><strong>Antoine Evertze: </strong>In my experience, three areas tend to feature in almost every project: video surveillance, fire alarm systems and identity/user management. When it comes to video, customers expect access and intrusion events to be automatically linked with camera footage. For fire protection, standardised interfaces for evacuation and alert forwarding are essential. When it comes to user management, it is essential that roles, permissions and validity periods can be synchronised from existing systems, such as HR or credential platforms. In short, systems that identify people, track movement or handle critical events must be able to communicate with each other reliably.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:44% 47%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-4 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="300" title="Antoine-Evertze-no-background" src="https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background-300x300.png" class="img-responsive wp-image-8582 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background-200x200.png 200w, https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background-400x400.png 400w, https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background.png 500w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-14 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>&#8220;True integration reduces complexity. It doesn&#8217;t create new layers.&#8221;</em></p>
<p><strong>Antoine Evertze</strong><br />
ARAS Security</p>
</div></div></div></div><div class="fusion-text fusion-text-15" style="--awb-text-color:#000000;"><p><em><strong>So, what is the difference between &#8216;connecting a system&#8217; and &#8216;truly integrating it&#8217;?</strong></em></p>
<p><strong>Antoine Evertze: </strong>When integration is done right, users don&#8217;t even notice it&#8217;s happening. Processes run logically, automatically and consistently. No one has to think about which interface to use – it just works. If I have to manually extract or copy data, that’s not integration; that’s extra work. True integration reduces complexity. It doesn&#8217;t create new layers.</p>
<p><strong>Thank you, Antoine, for your clear view on what openness really means.</strong></p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Partner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8562-4"><div class="fusion-panel panel-default panel-c320a3e5083fd2651 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_c320a3e5083fd2651"><a aria-expanded="false" aria-controls="c320a3e5083fd2651" role="button" data-toggle="collapse" data-parent="#accordion-8562-4" data-target="#c320a3e5083fd2651" href="#c320a3e5083fd2651"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">ARAS Security</span></a></div></div><div id="c320a3e5083fd2651" class="panel-collapse collapse " aria-labelledby="toggle_c320a3e5083fd2651"><div class="panel-body toggle-content fusion-clearfix">
<p><a href="https://www.aras.nl/">ARAS Security</a> provides installers and integrators in the Benelux with modular, scalable electronic security systems—including access control, intrusion detection, video surveillance, and system integration support.</p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/system-openness-in-security-integration/">Making Integration Work: Practical Insights into Open Security Systems</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/system-openness-in-security-integration/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Only Those Who Know Their Critical Processes Can Protect Them</title>
		<link>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/</link>
					<comments>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Thu, 24 Apr 2025 13:24:53 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Enterprise Security]]></category>
		<category><![CDATA[Hybrid Threats]]></category>
		<category><![CDATA[Hybride Bedrohungen]]></category>
		<category><![CDATA[Kritische Infrastrukturen]]></category>
		<category><![CDATA[Physische Sicherheit]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Sicherheitsstrategie]]></category>
		<category><![CDATA[Systemintegration]]></category>
		<category><![CDATA[Systems Integration]]></category>
		<category><![CDATA[Unternehmenssicherheit]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=8506</guid>

					<description><![CDATA[<p>Geopolitics, hybrid threats and vulnerable supply chains have made corporate security more strategic than ever. In this interview, Björn Hawlitschka of MACONIA GmbH provides insight into current threat scenarios and practical recommendations. Mr Hawlitschka, to what extent are companies more exposed to geopolitical risks today than they were ten years ago? Björn Hawlitschka: I  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/">Only Those Who Know Their Critical Processes Can Protect Them</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-16" style="--awb-text-color:#000000;"><h5>Geopolitics, hybrid threats and vulnerable supply chains have made corporate security more strategic than ever. In this interview, Björn Hawlitschka of MACONIA GmbH provides insight into current threat scenarios and practical recommendations.</h5>
<p><em><strong>Mr Hawlitschka, to what extent are companies more exposed to geopolitical risks today than they were ten years ago?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> I studied political science and then worked for a long time at the Federal Academy for Security Policy. Even then, we were working with an expanded concept of security in which networking and strategic thinking played a major role. Today we can clearly see that geopolitical risks have become more complex. In the past, companies could afford the luxury of keeping IT and security strictly separate. Conflicts such as the war in Ukraine, the pandemic and supply chain issues have shown us how vulnerable our systems are. It only takes one freighter stuck in the Suez Canal to bring entire production chains to a standstill.</p>
<p><em><strong>Why are critical infrastructures and companies increasingly being targeted by states or non-state actors?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> On the one hand, we see classic, economically motivated cybercrime &#8211; such as the Darkside attack on the Colonial Pipeline in 2021. On the other hand, politically motivated sabotage is also on the rise. Both are dangerous. It becomes particularly perfidious when attacks take on hybrid forms, combining physical and digital sabotage. The motives range from economic blackmail to the deliberate destabilisation of entire societies.</p>
<p><em><strong>Which sectors are particularly at risk, and which threat scenarios do you see as most critical at the moment?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>Traditional industries such as energy, chemicals and technology are of course in the spotlight. But small and medium-sized enterprises or municipal institutions are also vulnerable, for example to ransomware. It is particularly critical if social services can no longer be paid out in the event of such attacks. This undermines trust in government and can exacerbate social tensions.</p>
<p><em><strong>Do you see a trend towards targeted hybrid threats, i.e. a combination of physical sabotage and cyberattacks?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>Absolutely. In Ukraine, we have already seen a combination of cyber attacks and physical sabotage in 2015. This type of threat will increase because it is particularly effective.</p>
<p><em><strong>What basic security measures should companies take to protect themselves against digital threats?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>A solid risk analysis that maps all business processes is important. This includes a business impact analysis: Which processes are most critical? How long can they be down? And patch management! This sounds banal, but many vulnerabilities arise because available security updates have not been installed. Employee awareness also plays a major role &#8211; after all, people are both the biggest vulnerability and the most important resource.</p>
<p><em><strong>How can physical security measures be effectively integrated with cyber defence strategies?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>The zero-trust approach is very helpful here &#8211; not only in IT, but also physically: don&#8217;t blindly trust anyone, even if they are in the building. Awareness has to be trained in all areas. Many companies protect the outer ring very well &#8211; but once someone is inside, they can move around freely. That is a risk.</p>
<p><em><strong>Are there any best practices or specific examples from the corporate world that can serve as models for security strategies?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>Microsoft&#8217;s Zero Trust model is a good example. Or Toyota, which revised its supply chain strategies after Fukushima and is now planning with more redundancy. It is important not just to react, but to learn from crises.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-8 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:44% 47%;--awb-margin-bottom:24px;--awb-max-width:250px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:250px;"><span class=" fusion-imageframe imageframe-none imageframe-5 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="300" title="portrait_hawlitschka" src="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-300x300.jpeg" class="img-responsive wp-image-8498 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-200x200.jpeg 200w, https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka.jpeg 400w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-17 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>&#8220;The first step is to know your own processes. If you don&#8217;t know what your own &#8216;castle&#8217; looks like, you can&#8217;t protect it.”</em></p>
<p><strong>Björn Hawlitschka</strong>, MACONIA GmbH</p>
</div></div></div></div><div class="fusion-text fusion-text-18" style="--awb-text-color:#000000;"><p><em><strong>What measures would you recommend to companies that are at the beginning of a professional security strategy?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>The first step is to know your own processes. If you don&#8217;t know what your &#8220;castle&#8221; looks like, you can&#8217;t protect it. Then comes a business impact analysis. And finally, you should carry out realistic emergency exercises. Red team tests &#8211; i.e. external attacks to identify vulnerabilities &#8211; are also highly recommended.</p>
<p><em><strong>How should companies deal with the challenge that security measures are often seen as a cost factor rather than an investment?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>I recommend two calculation models: Firstly, how much would real damage cost? Second, what business will I miss out on if I don&#8217;t have certifications or ISMS/BCM systems in place? More and more customers, especially in the banking sector, are demanding proof of security. If you have nothing to show, you will lose business.</p>
<p><em><strong>What physical security measures are particularly important for companies with distributed locations or hybrid working models?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>If there are several sites, it should be clearly defined who is responsible in which situation &#8211; especially at what level of severity the &#8220;head office&#8221; takes over: Already in an emergency or only in a crisis? This requires defined escalation levels. And, of course, regular emergency drills &#8211; both local and central. The important thing to remember is that even small incidents can have a big impact. That&#8217;s why preparation is everything.</p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-19" style="--awb-text-color:#000000;"><p>Security begins with the right system. NOX systems stand for flexible and economical solutions &#8211; for security infrastructures that grow with your needs. <a href="https://noxsystems.com/en/security-solutions/">&gt; Learn More</a></p>
</div><div class="accordian fusion-accordian" style="--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color2);--awb-background-color:var(--awb-color2);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:20px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8506-5"><div class="fusion-panel panel-default panel-ef57aa7734aca28ab fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><h4 class="panel-title toggle" id="toggle_ef57aa7734aca28ab"><a aria-expanded="false" aria-controls="ef57aa7734aca28ab" role="button" data-toggle="collapse" data-parent="#accordion-8506-5" data-target="#ef57aa7734aca28ab" href="#ef57aa7734aca28ab"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">Interview partner </span></a></h4></div><div id="ef57aa7734aca28ab" class="panel-collapse collapse " aria-labelledby="toggle_ef57aa7734aca28ab"><div class="panel-body toggle-content fusion-clearfix">
<p>MACONIA stands for independent, impartial, in-depth security consulting &#8211; backed by an experienced team that combines in-depth expertise with practical relevance, integrity and the highest quality standards. Find out more: <a href="http://www.maconia.de">www.maconia.de</a></p>
</div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/">Only Those Who Know Their Critical Processes Can Protect Them</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security as a Cost Factor? Why It Ultimately Comes Down to Business Continuity</title>
		<link>https://noxsystems.com/en/360-degree-security/</link>
					<comments>https://noxsystems.com/en/360-degree-security/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Wed, 26 Mar 2025 15:18:34 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-Sicherheit]]></category>
		<category><![CDATA[Ganzheitliche Sicherheitskonzepte]]></category>
		<category><![CDATA[KRITIS-Sicherheit]]></category>
		<category><![CDATA[NIS2]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Physische Sicherheit]]></category>
		<guid isPermaLink="false">https://noxsystems.com/360-grad-sicherheit/</guid>

					<description><![CDATA[<p>The threat landscape for companies and institutions has grown significantly in recent years. Sabotage, industrial espionage and ransomware attacks are now among the most common risks. Companies that are part of critical infrastructure (CI) are required by law to take special precautions to protect themselves from a wide range of attacks and disruptions. In  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/360-degree-security/">Security as a Cost Factor? Why It Ultimately Comes Down to Business Continuity</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-20" style="--awb-text-color:var(--awb-custom_color_2);"><h5>The threat landscape for companies and institutions has grown significantly in recent years. Sabotage, industrial espionage and ransomware attacks are now among the most common risks. Companies that are part of critical infrastructure (CI) are required by law to take special precautions to protect themselves from a wide range of attacks and disruptions. In this interview, Torsten Hiermann of CriseConsult provides key insights into the challenges companies face in terms of both physical and cyber security.</h5>
<p><strong><em>Why is a 360-degree approach to security so important for critical infrastructure? Where in practice do you see security measures being treated in isolation rather than as part of a bigger picture?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> A 360-degree approach is always essential &#8211; especially when it comes to protecting corporate assets or even human lives. That doesn&#8217;t mean that every area requires the same level of security. Protection goals and measures can vary, even within the same company or facility. The key is to view security as an integrated, holistic concept. As a practical example, companies may invest heavily in drone detection and defence, but allow contractor vehicles onto the premises with little or no control. It&#8217;s a clear mismatch and illustrates why looking at security in isolation is ineffective.</p>
<p><strong><em>What are the most common physical security vulnerabilities you&#8217;ve seen? And how often are they the result of a lack of integration with other areas of security?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> From a technical point of view, there are many effective physical security measures available. However, vulnerabilities often arise from two main factors: a lack of security awareness and a reluctance to invest. Awareness is particularly critical &#8211; it determines whether and how consistently an organisation protects its assets in a professional and up-to-date manner. It&#8217;s also important to remain realistic: not every theoretically possible measure is economically viable. A 360-degree approach means making targeted risk assessments.</p>
<p>A typical example from the field: companies train their employees extensively on social engineering threats. Meanwhile, the staff car park is open to the public, or employee parking permits clearly indicate that a vehicle belongs to someone from company XY. Associating a private car with a specific employee makes that car a potential target: access cards, transponders, laptops&#8230; Corporate security doesn&#8217;t start at the perimeter &#8211; it starts in the parking lot of a hardware store. In the worst-case scenario, a casual encounter becomes a &#8220;target&#8221; because the black Audi A6 with its company-branded parking sticker or licence plate frame signals: this car belongs to someone in the top management of company XY. From the attacker&#8217;s point of view, the person who gets in or out of that car is my person of interest.</p>
<p><strong><em>How does the separation of IT and physical security create problems? Would you say this is a structural problem?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> IT and physical security are two separate domains with different approaches and requirements. Each requires specific risk assessments, protective measures and response strategies. However, these two areas must ultimately work together. A holistic view doesn&#8217;t mean you need an all-powerful corporate security department or a super-CISO. But one thing is clear: complex threats are best addressed with integrated security approaches. The overall security of an organisation depends on a holistic strategy. Security is a shared responsibility &#8211; and it starts with something as basic as preventing tailgating.</p>
<p><strong><em>What are your best practices for implementing a holistic approach to critical infrastructure security? Are there proven measures or checklists that have worked well?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> I&#8217;d suggest taking a look at the security measures at the German Chancellery. But seriously, depending on the threat scenario and protection objectives, security concepts can be so complex that simple checklists are no longer sufficient. The more demanding the requirements, the more it makes sense to involve professional security consultants or planners. It&#8217;s a bit like medicine: there&#8217;s a big difference between hospitals that occasionally perform a certain procedure and those that specialise in it.</p>
<p><strong><em>What&#8217;s the most common misconception you see when it comes to critical infrastructure security?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> The most fundamental misconception is the failure to recognise the need for integrated security measures due to a lack of visible incidents &#8211; the idea that &#8220;nothing has happened so far, so we must be OK&#8221;. While this attitude may be tolerable in less critical areas, critical infrastructure operators must apply much stricter standards. Security cannot be reactive &#8211; it must be preventative and strategically planned.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-9 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(73,140,216,0.05);--awb-bg-color-hover:rgba(73,140,216,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color7);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-21 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>“A one-dimensional approach to security inevitably leads to gaps in the system, to vulnerabilities. The protection of corporate assets becomes effective through integrated approaches. Holistic security is the key. Cyber security protects digital structures, physical security protects the hardware or users &#8216;around&#8217; them.”</em></p>
<p><strong>Torsten Hiermann</strong>, CriseConsult</p>
</div></div></div></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-22" style="--awb-text-color:var(--awb-custom_color_2);"><p><strong><em>What technologies or new security concepts do you see as being particularly forward-looking?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> The key is system integration and connectivity. Detection and response are increasingly linked, often through the use of artificial intelligence. However, experience shows that professional attackers are always finding new ways to bypass defences. If technical security is strong, the organisation&#8217;s internal security culture may be the weak link &#8211; and vice versa. Again, a 360-degree approach is the only viable solution.</p>
<p><strong><em>What are your top three recommendations for critical infrastructure operators to make their security strategy more sustainable and effective?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> Sustainable means long-term effectiveness. Effective means it actually works. Opportunistic attackers can be deterred. Professional attackers adapt. The takeaway: security measures must be aligned with protection objectives, represent state-of-the-art solutions, and be continuously updated based on current risk analyses and threat scenarios. Security is a process &#8211; not a stand-alone technology or a static concept.</p>
</div><div class="fusion-text fusion-text-23" style="--awb-text-color:var(--awb-custom_color_2);"><p>NOX SYSTEMS is dedicated to helping critical infrastructure owners, designers and integrators achieve smart, future-proof security by providing scalable, integrated security solutions. <a href="https://noxsystems.com/en/security-solutions/">&gt; Our Solutions</a></p>
</div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/360-degree-security/">Security as a Cost Factor? Why It Ultimately Comes Down to Business Continuity</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/360-degree-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>One System for Everything: How Integrated Security Solutions Protect Businesses</title>
		<link>https://noxsystems.com/en/integrated-security-interview-2/</link>
					<comments>https://noxsystems.com/en/integrated-security-interview-2/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Tue, 18 Mar 2025 12:51:54 +0000</pubDate>
				<category><![CDATA[Integration]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Hybride Alarm- und Zutrittskontrolle]]></category>
		<category><![CDATA[Hyprid Access & Intrusion Controll]]></category>
		<category><![CDATA[Integrated Security Solutions]]></category>
		<category><![CDATA[Integrierte Sicherheitslösungen]]></category>
		<category><![CDATA[Partnerschaft]]></category>
		<category><![CDATA[Partnership]]></category>
		<category><![CDATA[Profitability]]></category>
		<category><![CDATA[Scalability]]></category>
		<category><![CDATA[Skalierbarkeit]]></category>
		<category><![CDATA[Wirtschaftlichkeit]]></category>
		<guid isPermaLink="false">https://noxsystems.com/integrierte-sicherheitsloesungen-interview/</guid>

					<description><![CDATA[<p>Why the Integration of Alarm and Access Control Systems Is Essential  Whether in industry, government or critical infrastructure, security is one of the key challenges facing organisations today. But how can alarm systems and access control best be combined to minimise security risks in an increasingly connected world? We spoke to Kjell Svensson,  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/integrated-security-interview-2/">One System for Everything: How Integrated Security Solutions Protect Businesses</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two">
<h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated">Why the Integration of Alarm and Access Control Systems Is Essential</h2>
</div>
<div class="fusion-text fusion-text-1"></div></h2></div><div class="fusion-text fusion-text-24" style="--awb-text-color:var(--awb-custom_color_2);"><h5>Whether in industry, government or critical infrastructure, security is one of the key challenges facing organisations today. But how can alarm systems and access control best be combined to minimise security risks in an increasingly connected world? We spoke to Kjell Svensson, Technical Sales Manager at Swedish security integrator Monitor Larm, to find out why integrated security solutions are the future. By working with a wide range of customers with high security requirements, Monitor Larm has gained deep insight into specific customer needs and can develop tailor-made security solutions.</h5>
<p><em><strong>How does the integration of alarm and access control systems help minimize security risks?</strong></em></p>
<p><strong>Kjell Svensson:</strong> Having a single system makes it much easier for security managers to monitor all users and ensure that the system is kept up to date. Since all logs are consolidated into one central log, tracking security-related events is much easier. This means less manual work, greater efficiency and more control over all aspects of security.</p>
</div><div class="fusion-text fusion-text-25" style="--awb-text-color:var(--awb-custom_color_2);"><p><em><strong>How does the integration of these systems affect the end-user experience?</strong></em></p>
<p><strong>Kjell Svensson:</strong> Once again, the key word is simplicity. Users only need to remember one code instead of managing multiple passwords and credentials for different systems. At the same time, the system prevents unauthorised access if someone forgets their code – eliminating false alarms caused by employees. This not only reduces complexity, but also increases security.</p>
</div><div class="fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated">Scalability: A Critical Requirement for Growing Businesses</h3></h3></div><div class="fusion-text fusion-text-26" style="--awb-text-color:var(--awb-custom_color_2);"><p><em><strong>What role does scalability play in integrated security solutions, especially for companies with growing needs?</strong></em></p>
<p><strong>Kjell Svensson:</strong> NOX offers a flexible solution that suits both small and large companies. A key advantage is that companies do not have to commit to a specific system size from the outset. NOX can grow with the business without the need to replace the core unit. This makes our solution the ideal choice for expanding businesses.</p>
<p><em><strong>Are there any specific technical aspects that need to be considered during implementation?</strong></em></p>
<p><strong>Kjell Svensson:</strong> The most important thing is to listen carefully. We work with our customers to understand their long-term goals and ensure that the system is designed to grow with their needs. This flexibility allows us to expand the system as the company grows.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-10 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:44% 47%;--awb-margin-bottom:24px;--awb-max-width:100px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:100px;"><span class=" fusion-imageframe imageframe-none imageframe-6 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="400" height="400" title="Kjell Svensson" src="https://noxsystems.com/wp-content/uploads/2025/03/Kjell-Svensson.jpeg" class="img-responsive wp-image-7833 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/03/Kjell-Svensson-200x200.jpeg 200w, https://noxsystems.com/wp-content/uploads/2025/03/Kjell-Svensson.jpeg 400w" sizes="(max-width: 850px) 100vw, 400px" /></span></div></div><div class="fusion-text fusion-text-27 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>“Security needs to be simple, efficient and scalable. Integrated systems are the key to achieving this. Those who still rely on siloed solutions today not only increase costs, but also create security vulnerabilities.“</em></p>
<p><strong>Kjell Svensson</strong><br />
Monitor Larm</p>
</div></div></div></div><div class="fusion-text fusion-text-28" style="--awb-text-color:var(--awb-custom_color_2);"><p><em><strong>What cost savings can be achieved by implementing an integrated alarm and access control system?</strong></em></p>
<p><strong>Kjell Svensson:</strong> The answer is simple: a lot! A single integrated system is always more cost effective than two separate systems. With NOX, companies benefit from an open system with flexible hardware options. For example, customers can choose from different card readers in different price categories, rather than being forced to choose the most expensive option.</p>
</div><div class="fusion-text fusion-text-29" style="--awb-text-color:var(--awb-custom_color_2);"><p><em><strong>What technological developments will shape the future of security?</strong></em></p>
<p><strong>Kjell Svensson:</strong> The future belongs to open systems powered by AI. Imagine being able to control the system using natural language commands, such as: <em>Hello NOX, can you tell me if anyone accessed the back door after 10pm last week?</em> or <em>Hi NOX, can you create a user named Carl Johansen who can only access the front door on Wednesdays between 8am and 6pm? </em>This kind of voice control will make working with security systems much easier in the future.</p>
</div><div class="fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated">Security as a Competitive Advantage</h3></h3></div><div class="fusion-text fusion-text-30" style="--awb-text-color:var(--awb-custom_color_2);"><p>Integrating alarm and access control systems is not just about security – it is also about efficiency and cost savings. Organisations benefit from an easy-to-use, scalable and future-proof solution that adapts to their specific needs.</p>
<p>Companies that proactively adopt integrated security solutions gain a competitive advantage while ensuring that their people, data and operations are protected against growing threats.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-11 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Partner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8051-6"><div class="fusion-panel panel-default panel-0b23220b3100f9bd5 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_0b23220b3100f9bd5"><a aria-expanded="false" aria-controls="0b23220b3100f9bd5" role="button" data-toggle="collapse" data-parent="#accordion-8051-6" data-target="#0b23220b3100f9bd5" href="#0b23220b3100f9bd5"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">Monitor Larm</span></a></div></div><div id="0b23220b3100f9bd5" class="panel-collapse collapse " aria-labelledby="toggle_0b23220b3100f9bd5"><div class="panel-body toggle-content fusion-clearfix">
<p><a href="http://www.monitor-larm.se/">Monitor Larm &amp; Bevakning AB</a> is a 30-year-old company based in Gothenburg. The company offers comprehensive solutions for the protection of people, buildings and valuables. These include intruder alarm systems, access control, CCTV, fire alarm systems, locks and complementary services such as guard services and alarm receiving centres. All under one roof, making it easy for our customers to stay safe.</p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/integrated-security-interview-2/">One System for Everything: How Integrated Security Solutions Protect Businesses</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/integrated-security-interview-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Secret of a Good Security Partnership</title>
		<link>https://noxsystems.com/en/the-secret-of-a-good-security-partnership/</link>
					<comments>https://noxsystems.com/en/the-secret-of-a-good-security-partnership/#respond</comments>
		
		<dc:creator><![CDATA[Niklas_Schroeder]]></dc:creator>
		<pubDate>Sat, 07 Dec 2024 16:40:26 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Partnership]]></category>
		<category><![CDATA[Profitability]]></category>
		<category><![CDATA[Strategic Business Development]]></category>
		<guid isPermaLink="false">https://noxsystems.com/the-secret-of-a-good-security-partnership/</guid>

					<description><![CDATA[<p>Interview with Sandro Kengelbacher of ES Sicherheit AG  In the fast-moving world of security technology, NOX SYSTEMS AG and ES Sicherheit AG have formed a strong partnership. We talk to Sandro Kengelbacher of ES Sicherheit AG about the benefits of this collaboration and the future of security solutions. Question: Mr. Kengelbacher, what distinguishes the  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/the-secret-of-a-good-security-partnership/">The Secret of a Good Security Partnership</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;">Interview with Sandro Kengelbacher of ES Sicherheit AG</h2></div><div class="fusion-text fusion-text-31 fusion-text-no-margin" style="--awb-text-color:#000000;--awb-margin-bottom:0px;"><p><span style="color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);">In the fast-moving world of security technology, NOX SYSTEMS AG and ES Sicherheit AG have formed a strong partnership. We talk to Sandro Kengelbacher of ES Sicherheit AG about the benefits of this collaboration and the future of security solutions. </span></p>
<p><b><span data-contrast="auto">Question:</span></b><span data-contrast="auto"> Mr. Kengelbacher, what distinguishes the partnership between NOX SYSTEMS and ES Sicherheit?</span></p>
<p><b><span data-contrast="auto">Sandro Kengelbacher:</span></b><span data-contrast="auto"> It is the combination of integrated systems, flexibility and future-proofing. NOX solutions are characterized by the fact that they can seamlessly cover different security areas. This integrity was a decisive factor in our choice of manufacturer. NOX SYSTEMS&#8217; ability to respond quickly to customer-specific requirements underlines the flexibility of this partnership. Another key advantage is future-proofing: thanks to regular software updates, the systems are always up to date without the need for expensive hardware replacements. </span></p>
<p><b><span data-contrast="auto">Question:</span></b><span data-contrast="auto"> What special solutions do you offer your customers through this partnership?</span></p>
<p><b><span data-contrast="auto">Sandro Kengelbacher:</span></b><span data-contrast="auto"> An excellent example of the efficiency of this cooperation is a project for an autonomous data center. The NOX XL version was used here, an integrated solution that combines security, safety, access control and building automation in a single system. The integration of special temperature and humidity monitoring was particularly impressive &#8211; a customer-specific requirement that was easily implemented thanks to the flexibility of NOX SYSTEMS AG. </span></p>
<p><b><span data-contrast="auto">Question:</span></b><span data-contrast="auto"> How does this partnership affect the economics of your projects?</span></p>
<p><b><span data-contrast="auto">Sandro Kengelbacher:</span></b><span data-contrast="auto"> The economic benefits of this partnership are also remarkable. Investing in NOX solutions pays off, especially for large systems. The longevity of the systems and the ability to keep them up to date with software updates significantly reduce the total cost of ownership. This is in line with ES Sicherheit AG&#8217;s understanding of customer orientation and service &#8211; not only looking at the initial investment costs, but also keeping an eye on the long-term follow-up costs. </span></p>
<p><b><span data-contrast="auto">Question:</span></b><span data-contrast="auto"> What new business opportunities have resulted from the collaboration?</span></p>
<p><b><span data-contrast="auto">Sandro Kengelbacher:</span></b><span data-contrast="auto"> NOX SYSTEMS is a strategic supplier to us. The partnership has opened up many business opportunities for us. In fact, the cooperation has helped ES Sicherheit AG to penetrate new business areas &#8211; from high-end residential construction to high-security sectors such as state-owned enterprises, the financial sector, public administration, etc. The stability of the system and the reputation of NOX SYSTEMS AG have enabled us to position ourselves as a strong partner in these demanding areas. </span></p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-12 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:44% 47%;--awb-margin-bottom:24px;--awb-max-width:100px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:100px;"><span class=" fusion-imageframe imageframe-none imageframe-7 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="400" height="400" title="68c36185-398c-4489-ab34-039ebedfac35" src="https://noxsystems.com/wp-content/uploads/2024/11/68c36185-398c-4489-ab34-039ebedfac35.jpeg" class="img-responsive wp-image-6538 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2024/11/68c36185-398c-4489-ab34-039ebedfac35-200x200.jpeg 200w, https://noxsystems.com/wp-content/uploads/2024/11/68c36185-398c-4489-ab34-039ebedfac35.jpeg 400w" sizes="(max-width: 850px) 100vw, 400px" /></span></div></div><div class="fusion-text fusion-text-32 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><i>&#8220;The partnership has opened up many business opportunities for us. In fact, the cooperation has helped ES Sicherheit AG to enter new business areas.&#8221;</i></p>
<p><strong>Sandro Kengelbacher, </strong>ES Sicherheit AG</p>
</div></div></div></div><div class="fusion-text fusion-text-33" style="--awb-text-color:#000000;"><p><b><span data-contrast="auto">Question:</span></b><span data-contrast="auto"> What is your vision for the future of this partnership?</span></p>
<p><b><span data-contrast="auto">Sandro Kengelbacher:</span></b><span data-contrast="auto"> We see tremendous potential in the evolution of our security solutions. The combination of innovative technologies and a strong customer focus will help us meet the ever-changing demands of the future. Our cooperation with NOX SYSTEMS will be crucial in order to continue to offer future-oriented security solutions. </span></p>
<p><span data-contrast="auto">Thank you very much for taking the time to talk with us. </span></p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-13 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Partner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-6716-7"><div class="fusion-panel panel-default panel-8cef3e48a9ed5bdcf fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_8cef3e48a9ed5bdcf"><a aria-expanded="false" aria-controls="8cef3e48a9ed5bdcf" role="button" data-toggle="collapse" data-parent="#accordion-6716-7" data-target="#8cef3e48a9ed5bdcf" href="#8cef3e48a9ed5bdcf"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">ES Sicherheit</span></a></div></div><div id="8cef3e48a9ed5bdcf" class="panel-collapse collapse " aria-labelledby="toggle_8cef3e48a9ed5bdcf"><div class="panel-body toggle-content fusion-clearfix">
<p><span data-contrast="auto">ES Sicherheit AG is an installation company with three locations in Switzerland and Liechtenstein. As a local expert, ES Sicherheit AG offers a comprehensive portfolio that includes fire protection solutions, alarm systems, surveillance systems and access control. </span><a href="http://www.es-sicherheit.ch/"><span data-contrast="none">www.es-sicherheit.ch</span></a><span data-ccp-props="{}"> </span></p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/the-secret-of-a-good-security-partnership/">The Secret of a Good Security Partnership</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/the-secret-of-a-good-security-partnership/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
