<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NOX SYSTEMS | Security beyond limits</title>
	<atom:link href="https://noxsystems.com/en/feed/" rel="self" type="application/rss+xml" />
	<link>https://noxsystems.com/en/</link>
	<description></description>
	<lastBuildDate>Thu, 11 Dec 2025 07:02:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Security Concept for Shipyards: Increased Safety and Efficiency at Ö-varvet</title>
		<link>https://noxsystems.com/en/security-concept-shipyard/</link>
					<comments>https://noxsystems.com/en/security-concept-shipyard/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 11:19:24 +0000</pubDate>
				<category><![CDATA[All-in-one management]]></category>
		<category><![CDATA[Case studies]]></category>
		<category><![CDATA[Integration]]></category>
		<category><![CDATA[Kombi]]></category>
		<category><![CDATA[Kombinierte Zutrittskontroll- und Alarmmeldesysteme]]></category>
		<category><![CDATA[SIMS]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=10644</guid>

					<description><![CDATA[<p>Realisieren Sie Ihr nächstes Projekt mit uns! Kontaktieren Sie uns       Security Concept for Shipyards: Ö-varvet   How can a historic shipyard with multiple buildings and workshops implement a modern, integrated security concept?  Ö-varvet, a shipyard operating since 1916, had developed a grown infrastructure over the years—multiple workshops, halls, and  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/security-concept-shipyard/">Security Concept for Shipyards: Increased Safety and Efficiency at Ö-varvet</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_4 3_4 fusion-flex-column fusion-flex-align-self-flex-start fusion-no-medium-visibility fusion-no-large-visibility" style="--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:8;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column"><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch fusion-animated" style="--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:30px;--awb-padding-left:30px;--awb-padding-right-small:20px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color7);--awb-bg-color-hover:var(--awb-color7);--awb-bg-image:linear-gradient(180deg, var(--awb-color7) 0%,var(--awb-color8) 100%);--awb-bg-size:cover;--awb-border-color:rgba(43,146,226,0);--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-transform:translateY(0px);--awb-transform-hover:translateY(-5px);--awb-width-large:33.333333333333%;--awb-margin-top-large:1%;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:1%;--awb-spacing-left-large:2.88%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;" data-animationType="fadeInUp" data-animationDuration="1.5" data-animationOffset="top-into-view"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element sm-text-align-left" style="text-align:center;--awb-margin-bottom-small:20px;--awb-max-width:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><span class=" fusion-imageframe imageframe-none imageframe-1 hover-type-none"><img decoding="async" width="40" height="38" title="icon-connect" src="https://noxsystems.com/wp-content/uploads/2024/11/icon-connect.png" alt class="img-responsive wp-image-6595"/></span></div><div class="fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-paragraph" style="--awb-text-color:var(--awb-color1);--awb-margin-top:36px;--awb-margin-bottom:12px;--awb-font-size:18px;"><p class="fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated" style="font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;font-size:1em;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:var(--awb-typography2-text-transform);--fontSize:18;line-height:var(--awb-typography2-line-height);">Realisieren Sie Ihr nächstes Projekt mit uns!</p></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:var(--awb-color1);--button_border_color:var(--awb-color8);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(73,140,216,0);--button_gradient_bottom_color_hover:rgba(73,140,216,0);--button_font_size:16px;--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:0px;--button_padding-left:0px;--button_typography-font-family:&quot;Lato&quot;;--button_typography-font-style:normal;--button_typography-font-weight:400;--button_margin-top:24px;" target="_self" data-hover="icon_rotate" href="#kontakt"><span class="fusion-button-text">Kontaktieren Sie uns</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div></div></div></div></div></div></div></div><div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_3_5 3_5 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;"><h3><span class="TextRun SCXW35545594 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SCXW35545594 BCX8" data-ccp-parastyle="heading 2">Security Concept </span><span class="NormalTextRun SpellingErrorV2Themed SCXW35545594 BCX8" data-ccp-parastyle="heading 2">for</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW35545594 BCX8" data-ccp-parastyle="heading 2">Shipyards</span><span class="NormalTextRun SCXW35545594 BCX8" data-ccp-parastyle="heading 2">: Ö-</span><span class="NormalTextRun SpellingErrorV2Themed SCXW35545594 BCX8" data-ccp-parastyle="heading 2">varvet</span></span><span class="EOP SCXW35545594 BCX8" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3></h2></div><div class="fusion-text fusion-text-1" style="--awb-text-color:var(--awb-custom_color_2);--awb-margin-top:0px;"><p><span data-contrast="auto">How can a historic shipyard with multiple buildings and workshops implement a modern, integrated security concept?</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Ö-varvet, a shipyard operating since 1916, had developed a grown infrastructure over the years—multiple workshops, halls, and buildings. Several independent security systems were in place side by side: access control, intrusion alarm, and fire protection were not connected.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">The head of security describes the situation as a significant challenge with high requirements: customers from different areas of the maritime industry set strict expectations regarding safety and operational procedures.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">In cooperation with <a href="https://monitor-larm.se/">Monitor Larm</a> and <a href="https://www.aras.dk/">Aras Security</a>, a modular security concept was implemented that connects all areas of the shipyard within one unified system.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_5 2_5 fusion-flex-column fusion-flex-align-self-flex-start" style="--awb-padding-top:8px;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:28.8%;--awb-width-medium:40%;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:28.8%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:24px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><h3><span class="TextRun SCXW234664705 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SCXW234664705 BCX8" data-ccp-parastyle="heading 2">Solutions </span><span class="NormalTextRun SpellingErrorV2Themed SCXW234664705 BCX8" data-ccp-parastyle="heading 2">Implemented</span></span><span class="EOP SCXW234664705 BCX8" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3></h4></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/security-solutions/"><span class="fusion-button-text">Hybrid Systems</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-3 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/sicherheitsloesungen/"><span class="fusion-button-text">Integrations</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-4 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/sicherheitsloesungen/"><span class="fusion-button-text">All-in-One-Management</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div class="fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:24px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><h3>NOX Products</h3></h4></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-5 fusion-button-default-span fusion-button-default-type button_nopointer" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_self" href="#"><span class="fusion-button-text">NOX CPU</span></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-6 fusion-button-default-span fusion-button-default-type button_nopointer" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_self" href="#"><span class="fusion-button-text">NOX PSU5</span></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-7 fusion-button-default-span fusion-button-default-type button_nopointer" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_self" href="https://noxsystems.com/en/nox-re4/"><span class="fusion-button-text">NOX RE4</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-8 fusion-button-default-span fusion-button-default-type button_nopointer" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_self" href="#"><span class="fusion-button-text">NOX CMU</span></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-9 fusion-button-default-span fusion-button-default-type button_nopointer" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_self" href="https://noxsystems.com/en/nox-cmo/"><span class="fusion-button-text">NOX CMO</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-10 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/produkte/"><span class="fusion-button-text">NOX SIMS</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;"><h3><span class="TextRun SCXW167826043 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SCXW167826043 BCX8" data-ccp-parastyle="heading 2">Interview with Head of Security about the Security Solution</span></span></h3></h2></div><div class="fusion-video fusion-selfhosted-video" style="max-width:100%;"><div class="video-wrapper"><video playsinline="true" width="100%" style="object-fit: cover;" muted="true" loop="true" poster="https://noxsystems.com/wp-content/uploads/2025/12/Oe-varvet_tumbnail-1.png" preload="metadata" controls="1"><source src="https://noxsystems.com/wp-content/uploads/2025/12/251127-Referenzvideogoeteborg-Interview-2_EN_KOMPRIMIERT.mp4" type="video/mp4">Sorry, your browser doesn&#039;t support embedded videos.</video></div></div><div class="fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Insights from the Head of Security</h3></h3></div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:24px;--awb-margin-bottom:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><span class="TextRun SCXW176211025 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SCXW176211025 BCX8" data-ccp-parastyle="heading 2">Challenges</span></span></h4></div><div class="fusion-text fusion-text-2" style="--awb-text-color:var(--awb-custom_color_2);"><ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Integration into existing building structures</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Parallel operation of several security systems</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">High requirements for fire and intrusion protection</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Complex logistics for access rights (gates, halls, workshops)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
</div></div></div><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_2 1_2 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:24px;--awb-margin-bottom:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><span class="TextRun SCXW237286036 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SCXW237286036 BCX8" data-ccp-parastyle="heading 2">Initial Situation</span></span><span class="EOP SCXW237286036 BCX8" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h4></div><div class="fusion-text fusion-text-3" style="--awb-text-color:var(--awb-custom_color_2);"><ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Multiple buildings and workshops across the shipyard site</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Existing alarm systems and access control without central management</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Different security-relevant areas with high requirements</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1">Need for a unified platform for security and logistics</li>
</ul>
</div></div></div></div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_2 1_2 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:24px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><span class="TextRun SCXW192777709 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SCXW192777709 BCX8" data-ccp-parastyle="heading 2">Security Solution </span><span class="NormalTextRun SpellingErrorV2Themed SCXW192777709 BCX8" data-ccp-parastyle="heading 2">for</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW192777709 BCX8" data-ccp-parastyle="heading 2">the</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW192777709 BCX8" data-ccp-parastyle="heading 2">Shipyard</span></span><span class="EOP SCXW192777709 BCX8" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h4></div><div class="fusion-text fusion-text-4" style="--awb-text-color:var(--awb-custom_color_2);"><p><span class="TextRun SCXW116530643 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW116530643 BCX8">Ö-</span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">varvet</span><span class="NormalTextRun SCXW116530643 BCX8"> wanted to combine all security-relevant functions into a single system. </span></span><span class="TextRun SCXW116530643 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="auto"><span class="NormalTextRun SCXW116530643 BCX8">The Head </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">of</span><span class="NormalTextRun SCXW116530643 BCX8"> Security </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">explains</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">that</span><span class="NormalTextRun SCXW116530643 BCX8"> Monitor </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">Larm</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">solved</span><span class="NormalTextRun SCXW116530643 BCX8"> all </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">issues</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">that</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">arose</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">during</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">the</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">project</span><span class="NormalTextRun SCXW116530643 BCX8">.</span></span> <span class="TextRun SCXW116530643 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="auto"><span class="NormalTextRun SCXW116530643 BCX8">Today, </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">door</span><span class="NormalTextRun SCXW116530643 BCX8"> and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">gate</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">control</span><span class="NormalTextRun SCXW116530643 BCX8">, </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">intrusion</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">alarm</span><span class="NormalTextRun SCXW116530643 BCX8">, and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">fire</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">alarm</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">are</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">managed</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">through</span><span class="NormalTextRun SCXW116530643 BCX8"> a </span><span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">central</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW116530643 BCX8">platform</span><span class="NormalTextRun SCXW116530643 BCX8">.</span></span><span class="EOP SCXW116530643 BCX8" data-ccp-props="{"> </span></p>
</div></div></div><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_1_2 1_2 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:24px;--awb-margin-bottom:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><span class="TextRun SCXW117567053 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW117567053 BCX8" data-ccp-parastyle="heading 2">Results</span></span></h4></div><div class="fusion-text fusion-text-5" style="--awb-text-color:var(--awb-custom_color_2);"><ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Centralization:</span></b><span data-contrast="auto"> all security functions in one system</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Transparency:</span></b><span data-contrast="auto"> clear management of doors, gates, and alarm areas</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Safety:</span></b><span data-contrast="auto"> combination of access control, intrusion, and fire alarm</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="auto">Integration:</span></b><span data-contrast="auto"> open interfaces for existing systems</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
</div></div></div></div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(73,140,216,0.05);--awb-bg-color-hover:rgba(73,140,216,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color7);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-6 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em><span class="NormalTextRun SCXW127176381 BCX8">“</span><span class="NormalTextRun SCXW127176381 BCX8">Of</span> <span class="NormalTextRun SCXW127176381 BCX8">course</span><span class="NormalTextRun SCXW127176381 BCX8">, I </span><span class="NormalTextRun SCXW127176381 BCX8">would</span> <span class="NormalTextRun SCXW127176381 BCX8">recommend</span> <span class="NormalTextRun SCXW127176381 BCX8">it</span> <span class="NormalTextRun SCXW127176381 BCX8">to</span> <span class="NormalTextRun SCXW127176381 BCX8">other</span> <span class="NormalTextRun SCXW127176381 BCX8">customers</span><span class="NormalTextRun SCXW127176381 BCX8"> – </span><span class="NormalTextRun SCXW127176381 BCX8">mainly</span> <span class="NormalTextRun SCXW127176381 BCX8">because</span> <span class="NormalTextRun SCXW127176381 BCX8">it</span> <span class="NormalTextRun SCXW127176381 BCX8">is</span><span class="NormalTextRun SCXW127176381 BCX8"> an open </span><span class="NormalTextRun SCXW127176381 BCX8">system</span> <span class="NormalTextRun SCXW127176381 BCX8">that</span> <span class="NormalTextRun SCXW127176381 BCX8">enables</span> <span class="NormalTextRun SCXW127176381 BCX8">solutions</span><span class="NormalTextRun SCXW127176381 BCX8"> and </span><span class="NormalTextRun SCXW127176381 BCX8">supports</span> <span class="NormalTextRun SCXW127176381 BCX8">new</span> <span class="NormalTextRun SCXW127176381 BCX8">ideas</span><span class="NormalTextRun SCXW127176381 BCX8">.”</span></em></p>
<p><strong>Dan Lovrén</strong>, Head of Security Ö-varvet</p>
</div></div></div></div><div class="fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><span class="TextRun SCXW191798527 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SpellingErrorV2Themed SCXW191798527 BCX8" data-ccp-parastyle="heading 2">Conclusion</span></span></h3></div><div class="fusion-text fusion-text-7" style="--awb-text-color:var(--awb-custom_color_2);"><p><span data-contrast="auto">Ö-varvet demonstrates how a historically developed site can implement a modern security concept without interrupting ongoing operations.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">By integrating all relevant security functions into a single system, the shipyard gains efficiency and transparency. Open interfaces enable the continued use of existing technology and gradual expansion over time.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion_builder_column_inner_1_1 1_1 fusion-flex-column fusion-flex-align-self-stretch fusion-animated" style="--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:30px;--awb-padding-left:30px;--awb-padding-right-small:20px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color7);--awb-bg-color-hover:var(--awb-color7);--awb-bg-image:linear-gradient(344deg, rgba(73,140,216,0.79) 0%,rgba(22,51,97,0.95) 100%),url(https://noxsystems.com/wp-content/uploads/2025/01/NOX-SYSTEMS-Headerbild-1.webp);;--awb-bg-position:center center;--awb-bg-size:cover;--awb-border-color:rgba(43,146,226,0);--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-transform:translateY(0px);--awb-transform-hover:translateY(-5px);--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;" data-animationType="fadeInUp" data-animationDuration="1.5" data-animationOffset="top-into-view"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-column-has-bg-image" data-bg-url="https://noxsystems.com/wp-content/uploads/2025/01/NOX-SYSTEMS-Headerbild-1.webp"><div class="fusion-image-element " style="text-align:left;--awb-margin-bottom:0px;--awb-max-width:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><span class=" fusion-imageframe imageframe-none imageframe-2 hover-type-none"><img decoding="async" width="40" height="38" title="icon-connect" src="https://noxsystems.com/wp-content/uploads/2024/11/icon-connect.png" alt class="img-responsive wp-image-6595"/></span></div><div class="fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-paragraph" style="--awb-text-color:var(--awb-color1);--awb-margin-top:36px;--awb-margin-bottom:36px;--awb-font-size:32px;"><p class="fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated" style="font-family:&quot;Lato&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:32;line-height:var(--awb-typography4-line-height);"><span class="NormalTextRun SCXW221783897 BCX8">Do </span><span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">you</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">want</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">to</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">develop</span><span class="NormalTextRun SCXW221783897 BCX8"> a security </span><span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">concept</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">for</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">your</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">shipyard</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">or</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">industrial</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW221783897 BCX8">facility</span><span class="NormalTextRun SCXW221783897 BCX8">?</span></p></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-11 fusion-button-default-span fusion-button-default-type" style="--button_bevel_color:var(--awb-color5);--button_bevel_color_hover:var(--awb-color8);--button_accent_color:#00539f;--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:rgba(255,255,255,0);--button_border_width-top:2px;--button_border_width-right:2px;--button_border_width-bottom:2px;--button_border_width-left:2px;--button-border-radius-top-left:10px;--button-border-radius-top-right:10px;--button-border-radius-bottom-right:10px;--button-border-radius-bottom-left:10px;--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:hsla(var(--awb-color7-h),calc(var(--awb-color7-s) - 5%),calc(var(--awb-color7-l) - 10%),var(--awb-color7-a));--button_gradient_bottom_color_hover:hsla(var(--awb-color7-h),calc(var(--awb-color7-s) - 5%),calc(var(--awb-color7-l) - 10%),var(--awb-color7-a));--button_text_transform:none;--button_font_size:16px;--button_line_height:var(--awb-typography3-line-height);--button_padding-top:10px;--button_padding-right:40px;--button_padding-bottom:10px;--button_padding-left:40px;--button_typography-font-family:&quot;Lato&quot;;--button_typography-font-style:normal;--button_typography-font-weight:400;" target="_self" href="https://noxsystems.com/projektanfrage/"><span class="fusion-button-text">Start Your Project Inquiry Now</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div></div></div></div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><span class="TextRun SCXW186690761 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="none"><span class="NormalTextRun SCXW186690761 BCX8" data-ccp-parastyle="heading 1">FAQ: Security </span><span class="NormalTextRun SpellingErrorV2Themed SCXW186690761 BCX8" data-ccp-parastyle="heading 1">Concepts</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW186690761 BCX8" data-ccp-parastyle="heading 1">for</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW186690761 BCX8" data-ccp-parastyle="heading 1">Shipyards</span></span><span class="EOP SCXW186690761 BCX8" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322}"> </span></h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:#ffffff;--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-10644-1"><div class="fusion-panel panel-default panel-a5fcad948942097a6 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_a5fcad948942097a6"><a aria-expanded="false" aria-controls="a5fcad948942097a6" role="button" data-toggle="collapse" data-parent="#accordion-10644-1" data-target="#a5fcad948942097a6" href="#a5fcad948942097a6"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">What is a security concept for shipyards?</span></a></div></div><div id="a5fcad948942097a6" class="panel-collapse collapse " aria-labelledby="toggle_a5fcad948942097a6"><div class="panel-body toggle-content fusion-clearfix">
<p><span class="NormalTextRun SCXW262409084 BCX8"> A security </span><span class="NormalTextRun SCXW262409084 BCX8">concept</span> <span class="NormalTextRun SCXW262409084 BCX8">includes</span> <span class="NormalTextRun SCXW262409084 BCX8">measures</span><span class="NormalTextRun SCXW262409084 BCX8"> and </span><span class="NormalTextRun SCXW262409084 BCX8">systems</span> <span class="NormalTextRun SCXW262409084 BCX8">that</span> <span class="NormalTextRun SCXW262409084 BCX8">protect</span> <span class="NormalTextRun SCXW262409084 BCX8">personnel</span><span class="NormalTextRun SCXW262409084 BCX8">, </span><span class="NormalTextRun SCXW262409084 BCX8">materials</span><span class="NormalTextRun SCXW262409084 BCX8">, and </span><span class="NormalTextRun SCXW262409084 BCX8">buildings</span> <span class="NormalTextRun SCXW262409084 BCX8">from</span> <span class="NormalTextRun SCXW262409084 BCX8">risks</span><span class="NormalTextRun SCXW262409084 BCX8">,</span> <span class="NormalTextRun SCXW262409084 BCX8">including</span> <span class="NormalTextRun SCXW262409084 BCX8">access</span> <span class="NormalTextRun SCXW262409084 BCX8">control</span><span class="NormalTextRun SCXW262409084 BCX8"> and </span><span class="NormalTextRun SCXW262409084 BCX8">alarm</span><span class="NormalTextRun SCXW262409084 BCX8"> management.</span></p>
</div></div></div><div class="fusion-panel panel-default panel-013311d3f85d3a5c7 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_013311d3f85d3a5c7"><a aria-expanded="false" aria-controls="013311d3f85d3a5c7" role="button" data-toggle="collapse" data-parent="#accordion-10644-1" data-target="#013311d3f85d3a5c7" href="#013311d3f85d3a5c7"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">Which elements are part of a modern security concept?</span></a></div></div><div id="013311d3f85d3a5c7" class="panel-collapse collapse " aria-labelledby="toggle_013311d3f85d3a5c7"><div class="panel-body toggle-content fusion-clearfix">
<p><span class="NormalTextRun SCXW101345804 BCX8"> Access </span><span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">control</span><span class="NormalTextRun SCXW101345804 BCX8">, </span><span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">intrusion</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">alarm</span><span class="NormalTextRun SCXW101345804 BCX8">, </span><span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">fire</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">alarm</span><span class="NormalTextRun SCXW101345804 BCX8">, and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">interfaces</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">to</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">existing</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW101345804 BCX8">systems</span><span class="NormalTextRun SCXW101345804 BCX8">.</span></p>
</div></div></div><div class="fusion-panel panel-default panel-cd511fc7ed846ccd8 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_cd511fc7ed846ccd8"><a aria-expanded="false" aria-controls="cd511fc7ed846ccd8" role="button" data-toggle="collapse" data-parent="#accordion-10644-1" data-target="#cd511fc7ed846ccd8" href="#cd511fc7ed846ccd8"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">Why is integration important?</span></a></div></div><div id="cd511fc7ed846ccd8" class="panel-collapse collapse " aria-labelledby="toggle_cd511fc7ed846ccd8"><div class="panel-body toggle-content fusion-clearfix">
<p><span class="NormalTextRun SCXW98707189 BCX8"> Many </span><span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">shipyards</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">have</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">grown</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">organically</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">over</span><span class="NormalTextRun SCXW98707189 BCX8"> time and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">operate</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">several</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">systems</span><span class="NormalTextRun SCXW98707189 BCX8"> in parallel. Integrated security </span><span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">systems</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">create</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW98707189 BCX8">efficiency</span><span class="NormalTextRun SCXW98707189 BCX8">.</span></p>
</div></div></div><div class="fusion-panel panel-default panel-e21f8987a8b3c8f1e fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_e21f8987a8b3c8f1e"><a aria-expanded="false" aria-controls="e21f8987a8b3c8f1e" role="button" data-toggle="collapse" data-parent="#accordion-10644-1" data-target="#e21f8987a8b3c8f1e" href="#e21f8987a8b3c8f1e"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">What are the advantages of NOX?</span></a></div></div><div id="e21f8987a8b3c8f1e" class="panel-collapse collapse " aria-labelledby="toggle_e21f8987a8b3c8f1e"><div class="panel-body toggle-content fusion-clearfix">
<p><span class="TextRun SCXW4198564 BCX8" lang="DE-DE" xml:lang="DE-DE" data-contrast="auto"><span class="NormalTextRun SCXW4198564 BCX8">A </span><span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">single</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">platform</span><span class="NormalTextRun SCXW4198564 BCX8">, open </span><span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">interfaces</span><span class="NormalTextRun SCXW4198564 BCX8">, modular </span><span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">expandability</span><span class="NormalTextRun SCXW4198564 BCX8">, and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">the</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">ability</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">to</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">integrate</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">existing</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW4198564 BCX8">systems</span><span class="NormalTextRun SCXW4198564 BCX8">.</span></span><span class="EOP SCXW4198564 BCX8" data-ccp-props="{"> </span></p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/security-concept-shipyard/">Security Concept for Shipyards: Increased Safety and Efficiency at Ö-varvet</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/security-concept-shipyard/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://noxsystems.com/wp-content/uploads/2025/10/251009_Interview_edit_kurz_UT_DE_27mb.mp4" length="27818155" type="video/mp4" />

			</item>
		<item>
		<title>From a Patchwork Quilt to an Intelligent Security Architecture</title>
		<link>https://noxsystems.com/en/intelligent-security-architecture/</link>
					<comments>https://noxsystems.com/en/intelligent-security-architecture/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 13:55:22 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[Access & Control Solutions]]></category>
		<category><![CDATA[Integrated Security Solutions]]></category>
		<category><![CDATA[System Openess]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=10526</guid>

					<description><![CDATA[<p>Why integrated security architectures are crucial today  Over the years, many companies and institutions have developed security landscapes resembling patchwork quilts. Access control systems, fire and intrusion detection technology, video surveillance systems, and building management systems often come from different manufacturers and have been expanded as needed. However, these systems usually operate in  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/intelligent-security-architecture/">From a Patchwork Quilt to an Intelligent Security Architecture</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Why integrated security architectures are crucial today</h3></h3></div><div class="fusion-text fusion-text-8" style="--awb-text-color:var(--awb-custom_color_2);"><p><span style="color: #000000;">Over the years, many companies and institutions have developed security landscapes resembling patchwork quilts. Access control systems, fire and intrusion detection technology, video surveillance systems, and building management systems often come from different manufacturers and have been expanded as needed. However, these systems usually operate in isolation without a common database or consistent logging. What was once practical has become a security and efficiency problem. Separate systems mean double maintenance, complex interface management, and an inability to see the big picture in the control center. Alarm messages are received in parallel applications, and reports must be consolidated manually. This results in organizational and technical efforts that tie up human resources, costing time and money, and increasing risks, especially in critical infrastructures where failures can have far-reaching consequences. The complexity of the security environment is also steadily growing: IoT sensors, IP-based communication, cloud connections, and cybersecurity aspects require a higher degree of technical integration. Modern security is now an IT task and no longer solely the responsibility of building management.</span></p>
</div><div class="fusion-title title fusion-title-15 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Regulatory and geopolitical factors increase pressure</h3></h3></div><div class="fusion-text fusion-text-9" style="--awb-text-color:var(--awb-custom_color_2);"><p><span style="color: #000000;">As technical developments advance, the legal and organizational requirements for operators of security-relevant facilities are increasing. The european NIS2 directive and the new german KRITIS umbrella law establish the obligation to provide evidence of resilience, monitoring, and documentation as central tasks. Systems must be able to log activities, document events, and provide audit trails—requirements that many legacy, isolated solutions cannot meet. Geopolitical tensions, hybrid threats, and cyberattacks are also increasing the pressure to act. Attacks on energy suppliers, municipal utilities, and waterworks demonstrate the close link between physical and digital security. Those who fail to think in an integrated manner risk leaving security gaps at the interfaces between IT, OT, and building technology. Therefore, today&#8217;s security management means holistically assessing risks, networking systems, and consistently recording data. This is the only way to quickly detect and effectively defend against security incidents (https://gebaeudedigital.de/haus-und-gebaeudeautomation/sicherheitsmanagement-im-gebaeude/).</span></p>
</div><div class="fusion-title title fusion-title-16 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Open, hybrid systems as the key to the future</h3></h3></div><div class="fusion-text fusion-text-10" style="--awb-text-color:var(--awb-custom_color_2);"><p><span style="color: #000000;">Rather than replacing all systems, open, hybrid security architectures offer a future-proof solution. NOX SYS allows you to gradually integrate existing systems into a common platform. Access control, video surveillance, and fire and intrusion detection technology can be connected via standard interfaces, as can Internet of Things (IoT) components and building automation systems. At the heart of the system is a central dashboard that consolidates all information. Events, alarms, and statuses are displayed, analyzed, and documented in real time. This gives security managers the transparency they need to respond quickly and control processes effectively. At the same time, documentation is simplified, making it easier to comply with regulatory requirements. NOX SYS&#8217;s strength lies in its openness: existing hardware remains usable, and new components can be added modularly. The result is an intelligent security architecture that grows with your needs without system interruptions or high migration costs (https://noxsystems.com/systemoffenes-sicherheitskonzept/).</span></p>
</div><div class="fusion-title title fusion-title-17 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Uniform operation, higher efficiency</h3></h3></div><div class="fusion-text fusion-text-11" style="--awb-text-color:var(--awb-custom_color_2);"><p><span style="color: #000000;">A key factor in the success of integrated systems is a uniform user interface. Rather than monitoring several software solutions simultaneously, users access all security functions through one interface. This reduces training costs, prevents operating errors, and enables coordinated control. Additionally, operational efficiency improves because maintenance and diagnostics can be performed remotely, significantly reducing service times and operating costs. Predictive maintenance also becomes possible, as malfunctions are detected before they lead to failure. Operators benefit from significantly clearer processes in practice: events are documented in a traceable manner, statuses are displayed centrally, and security processes can be controlled across the board. This form of integration offers enormous advantages for complex buildings or distributed locations because it combines scalability and clarity.</span></p>
</div><div class="fusion-title title fusion-title-18 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Certified safety with a system</h3></h3></div><div class="fusion-text fusion-text-12" style="--awb-text-color:var(--awb-custom_color_2);"><p><span style="color: #000000;">NOX SYS stands for both integration and proven quality. Our systems are certified according to EN 50131 Grade 3 and VdS Class C, which are the highest standards for intrusion detection technology and tamper protection. These certifications make the systems suitable for demanding applications in banks, industrial facilities, museums, and critical infrastructures. Additionally, NOX SYS impresses with its high reliability. Local controls ensure that security-related functions remain operational even during connection interruptions. At the same time, access via secure IP networks ensures convenient remote maintenance and diagnostics, a decisive advantage for large, distributed systems. Thanks to its modular architecture, NOX SYS can be configured individually: from access control and video to complex alarm management systems. Each system can be integrated and expanded individually as needed.</span></p>
</div><div class="fusion-title title fusion-title-19 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Practice and outlook: Security architectures with a future</h3></h3></div><div class="fusion-text fusion-text-13" style="--awb-text-color:var(--awb-custom_color_2);"><p><span style="color: #000000;">Practical examples demonstrate that operators with open systems, such as NOX SYS, can reduce costs in the long term while improving the professionalism of their security organization. Rather than maintaining several isolated solutions, a uniform platform is used that encompasses all operations. This saves resources and strengthens KRITIS security because alarms, logs, and statuses can be recorded and checked centrally. It also increases flexibility. New locations or parts of buildings can be seamlessly connected. User rights can be defined individually. Emergency plans can be mapped directly in the system. Security technology grows with operational requirements without losing existing infrastructure. The future of building security clearly lies in interoperability, transparency, and adaptability.</span></p>
</div><div class="fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-with-title content-left" style="--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);--awb-item-margin-bottom:40px;" data-animationOffset="top-into-view"><div style="--awb-backgroundcolor:rgba(255,255,255,0);" class="fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper link-area-link-icon link-type-text content-icon-wrapper-yes icon-hover-animation-fade" data-animationOffset="top-into-view"><div class="heading icon-left"><a class="heading-link" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self"><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:24px;--fontSize:24;line-height:1.4;">NOX SYS/XL</h2></a></div><div class="fusion-clearfix"></div><a class=" fusion-read-more" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self">Read More</a><div class="fusion-clearfix"></div></div></div><div class="fusion-clearfix"></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/intelligent-security-architecture/">From a Patchwork Quilt to an Intelligent Security Architecture</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/intelligent-security-architecture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</title>
		<link>https://noxsystems.com/en/increased-risks-for-kritis/</link>
					<comments>https://noxsystems.com/en/increased-risks-for-kritis/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 13:45:53 +0000</pubDate>
				<category><![CDATA[EMA]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[alarm management]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Hybrid Threats]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=10471</guid>

					<description><![CDATA[<p>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well? Torsten Hiermann: "The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: "We are not at  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-14" style="--awb-text-color:#000000;"><p><strong><em>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> &#8220;The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: &#8220;We are not at war, but we are no longer at peace either.&#8221; Malicious manipulation is no longer a marginal phenomenon but rather a strategic method of disrupting economic, political, and social processes. The office for the protection of the constitution and the federal office for civil protection define this approach as deliberately impairing or destroying structures to weaken or influence them. This is not just about &#8220;classic&#8221; attacks on buildings, but also subtle attacks, such as disruptions to supply chains, targeted espionage, manipulation of public perception, and spreading uncertainty to influence political decision-making or encourage anti-state attitudes.</p>
<p>Therefore, the perpetrator landscape is broad. According to police statistics, left-wing extremist groups in particular tend to carry out attacks on infrastructure and provide instructions on how to build incendiary devices online. We also see state actors working through &#8220;proxies,&#8221; or recruited helpers who appear inconspicuous at first but are actually pursuing foreign interests. We must also not underestimate the danger from within. Employees who are frustrated or feel unfairly treated can become saboteurs.</p>
<p>Additionally, we are now dealing with hybrid threats. These attacks are not only physical, such as cutting a cable or attacking a transformer station, but also combine cyberattacks, social engineering, and classic physical attacks. Perpetrators intercept data, manipulate processes, or use social media to obtain information. That&#8217;s why I say the protection of objects doesn&#8217;t end at the fence.</p>
<p><em><strong>You mentioned the importance of information. Could you elaborate on that?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> Many people underestimate how valuable publicly available information is to a potential attacker. Social media profiles often reveal interesting information: For example, LinkedIn profiles often reveal not only where someone works, but also the projects and technologies they are involved in. This information is an excellent recruitment and evaluation tool for external services. The fact that Google Earth can be used to evaluate the initial vulnerabilities of a location is nothing new.</p>
<p>Added to this is careless handling of internal information. For example: In a critical infrastructure facility, tradespeople and service providers are given a detailed site plan with corresponding facility designations as part of their safety training. This provides potential perpetrators with precise information for planning an attack. This illustrates that protection against saboteurs also requires preventive information protection. What data should I publish? How restrictive should I be when naming contact persons? Is there a social media policy? How do I educate employees so they understand they are part of the security chain?</p>
<p><em><strong>Drones have recently come into focus as a security risk. How do you see the role of airspace in the overall concept?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> The threat posed by drones has reached a new dimension. They can film, collect reconnaissance data—for example, on processes or response times—record digital signatures, and transport objects and &#8220;weapons,&#8221; which they can drop. The war in Ukraine has shown how rapidly technology and its applications are advancing.</p>
<p>Nevertheless, I advocate a differentiated approach. Not every company needs to invest in expensive anti-drone systems right away. The key factor is risk analysis. A &#8220;normal&#8221; production facility without drones poses a lower risk than an energy supplier, chemical plant, airport, or military property, for example. In particular, KRITIS operators must now &#8220;take airspace into account&#8221; in their security concepts.</p>
<p>Remember that drones often complete their task before being detected. Therefore, the key questions are: How do we detect drones, and how do we respond to them? Rather, the security concept must be thought out from the perspective of the perpetrator. What information will a drone be able to see and access? How can that be prevented &#8220;on the ground&#8221;?</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-8 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-3 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="200" title="TH_Porttrait_1" src="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-300x200.jpg" class="img-responsive wp-image-8604 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-200x133.jpg 200w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-400x267.jpg 400w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-600x400.jpg 600w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-800x534.jpg 800w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1.jpg 1000w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-15 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p>&#8220;Comprehensive protection is not just about defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.&#8221;</p>
<p><strong>Torsten Hiermann</strong><br />
CriseConsult</p>
</div></div></div></div><div class="fusion-text fusion-text-16" style="--awb-text-color:#000000;"><p><em><strong>What specific countermeasures do you recommend in terms of organization and technology?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It&#8217;s about a holistic approach. First, the organizational side: prohibitions on filming and photography on company premises, employee training, and checking vehicles and people for items they are carrying. Access controls must also be reliable and effective. Depending on the level of protection, this may involve biometric procedures. In short, if I don&#8217;t check at the gate to see if a service provider is bringing in something undesirable, I don&#8217;t need to worry about drones above.</p>
<p>Technically, we have a wide range of options, including perimeter sensors, video surveillance, motion detectors, and tamper-proof devices. Drone detection systems can also be useful. In critical areas, active defense measures, such as jammers or interceptor drones, may be considered. At the same time, however, it&#8217;s important to consider resilience, such as redundant power supplies, emergency generators, and secure supply chains. Business continuity is always part of overall protection!</p>
<p><em><strong>What role does integrated alarm and security management play in this context?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> A crucial one. We can introduce as many individual measures as we like, but if they are not integrated, we will end up with a patchwork again. To create an effective 360-degree security concept, all vectors must be taken into account.</p>
<p><em><strong>Does that mean that, in the future, all companies—not just KRITIS operators—will have to address attacks more intensively?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It depends on the risk analysis and the level of protection. A medium-sized mechanical engineering company may not face the same threats as a network operator. However, they can still be crippled by physical or IT attacks. Just think of cyberattacks, disrupted supply chains, or power outages. Production at the Tesla Gigafactory was crippled not by a highly complex operation but by a simple arson attack on a supply line. So, the question is, &#8220;How vulnerable am I?&#8221; How resilient are my processes? Have I taken precautions to remain operational in the event of an attack or minimize damage?</p>
<p>This is precisely why business continuity is important. Comprehensive protection is about more than just defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-9 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-20 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-10471-2"><div class="fusion-panel panel-default panel-9587beb22eaa85290 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_9587beb22eaa85290"><a aria-expanded="false" aria-controls="9587beb22eaa85290" role="button" data-toggle="collapse" data-parent="#accordion-10471-2" data-target="#9587beb22eaa85290" href="#9587beb22eaa85290"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">CriseConsult</span></a></div></div><div id="9587beb22eaa85290" class="panel-collapse collapse " aria-labelledby="toggle_9587beb22eaa85290"><div class="panel-body toggle-content fusion-clearfix">
<p>Torsten Hiermann is the founder of CrisisConsult, a consulting firm that specializes in crisis and security management. He advises companies, local authorities, and government institutions, drawing on his extensive experience in operational roles within emergency and crisis management teams. Torsten is also a lecturer at the Academy for Crisis Management (AKNZ) and at the University of Münster. He is also an officer in the German Armed Forces. In security management, he takes a holistic, 360-degree approach to ensure that the level of security and the potential threat are proportionate.<br />
www.criseconsult.de</p>
</div></div></div></div></div></div></div></div><div class="fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-2 content-boxes-icon-with-title content-left" style="--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);--awb-item-margin-bottom:40px;" data-animationOffset="top-into-view"><div style="--awb-backgroundcolor:rgba(255,255,255,0);" class="fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper link-area-link-icon link-type-text content-icon-wrapper-yes icon-hover-animation-fade" data-animationOffset="top-into-view"><div class="heading icon-left"><a class="heading-link" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self"><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:24px;--fontSize:24;line-height:1.4;">NOX SYS</h2></a></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Systems like NOX SYS integrate intrusion detection technology, access control, video surveillance, and alarm management onto one platform. This allows events to be recorded and evaluated holistically and targeted measures to be initiated. NOX SYS is EN 50131 Grade 3 certified and suitable for use in KRITIS environments. The modular system can easily be supplemented with new technologies, such as drone detection. Additionally, encrypted communication between components and a high level of tamper protection ensure manipulation is detected and prevented.</p>
</div><div class="fusion-clearfix"></div><a class=" fusion-read-more" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self">Read More</a><div class="fusion-clearfix"></div></div></div><div class="fusion-clearfix"></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/increased-risks-for-kritis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Detecting and Preventing Manipulation: How Companies Shield Themselves from Hybrid Threats</title>
		<link>https://noxsystems.com/en/hybrid-threat-protection/</link>
					<comments>https://noxsystems.com/en/hybrid-threat-protection/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 11:33:42 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cyberangriffe Unternehmen]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hybrid Attacks]]></category>
		<category><![CDATA[Physical Security]]></category>
		<guid isPermaLink="false">https://noxsystems.com/schutz-vor-hybrider-sabotage/</guid>

					<description><![CDATA[<p>Physical breaches are one of the most underestimated — yet potentially devastating — threats to modern organizations. It’s hard to predict, often strikes without warning, and can leave lasting damage. While cyberattacks like ransomware or phishing dominate the headlines, physical disruptions often go unnoticed. Yet the real danger lies in their combination: digital and  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/hybrid-threat-protection/">Detecting and Preventing Manipulation: How Companies Shield Themselves from Hybrid Threats</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-17" style="--awb-text-color:#000000;"><h5>Physical breaches are one of the most underestimated — yet potentially devastating — threats to modern organizations. It’s hard to predict, often strikes without warning, and can leave lasting damage. While cyberattacks like ransomware or phishing dominate the headlines, physical disruptions often go unnoticed. Yet the real danger lies in their combination: digital and physical attacks are increasingly intertwined.</h5>
<h5>In this expert interview, Björn Hawlitschka from MACONIA GmbH shares what businesses need to know now — and how to build real resilience against hybrid threats.</h5>
<p><em><strong>Mr. Hawlitschka, what types of digital or physical interference are most common today?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> According to the German digital industry association Bitkom, digital attacks have significantly increased in recent years. Ransomware, phishing, targeted malware infections, and other forms of cybercrime are often much easier for attackers to carry out than physical attacks. They don’t require physical presence, can be controlled remotely and anonymously, and usually involve lower risk. The rise of remote work and the growing connectivity of critical systems have accelerated this trend.<br />
But that doesn’t mean physical disruption is losing relevance – quite the opposite. Although less frequent, physical attacks often have more far-reaching consequences, especially when critical infrastructure is involved. A recent example is the suspected left-wing extremist arson attack on the Tesla factory in Grünheide, which severely impacted the regional power supply.</p>
<p><em><strong>Why is the combination of digital and physical threats particularly dangerous?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Combined digital and physical attack strategies represent a particularly complex and challenging risk scenario. The digital component can be used for reconnaissance – reading building plans, disabling alarm systems, or manipulating access control. These vulnerabilities pave the way for targeted physical attacks that cause real damage. A cyberattack becomes the entry ticket for a physical assault. Attackers use this synergy to maximize impact and bypass defenses that are often only prepared for one type of threat.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-10 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-4 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="300" title="portrait_hawlitschka" src="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-300x300.jpeg" class="img-responsive wp-image-8498 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-200x200.jpeg 200w, https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka.jpeg 400w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-18 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>“A cyberattack becomes the entry ticket for a physical assault.”</em></p>
<p><strong>Björn Hawlitschka</strong><br />
MACONIA GmbH</p>
</div></div></div></div><div class="fusion-text fusion-text-19" style="--awb-text-color:#000000;"><p><em><strong>Which internal weaknesses make companies vulnerable to targeted disruptions?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> One of the biggest weak points is one-sided focus – either on IT security or on physical protection. A company that installs firewalls and antivirus tools but has no access control system is just as vulnerable as one that does the opposite.<br />
Often, basic organizational structures are missing – like a functioning crisis response team or clearly defined emergency processes. These gaps make it easy for attackers to create chaos through targeted actions. A lack of clearly communicated reporting channels and responsibilities also hinders effective responses to suspicious incidents. In the end, it’s the fragmentation of security structures that leaves many organizations exposed.</p>
<p><em><strong>How can the human factor be strengthened to prevent targeted interference?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Despite all the technology, people remain one of the biggest vulnerabilities – but also one of the strongest lines of defense when empowered correctly. What’s crucial is a lived security culture: Employees need to know how to act, what the risks are, and who to report to in case of suspicion. Real protection emerges only when basic awareness is integrated into everyday behavior – when it becomes second nature to challenge strangers in the hallway or to lock screens when leaving desks unattended. It’s also essential that awareness programs don’t just focus on IT. Physical aspects – like visitor protocols, USB port controls, or screen filters in sensitive areas – need to be trained and communicated just as regularly. Technical tools like video surveillance or access control systems are important – but without employee vigilance, they’re not enough.</p>
</div><div class="fusion-text fusion-text-20" style="--awb-text-color:#000000;"><p><em><strong>How does today’s geopolitical climate influence the risk of targeted disruption?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> The current global political climate is significantly increasing the risk of targeted interference. The Russian invasion of Ukraine marked a new level of hybrid conflict, in which Western infrastructure has become a clear target – whether via state-sponsored hacking groups like APT28 or covert operatives on the ground. What’s striking is the rise of “low-level agents”: not trained spies, but individuals acting on orders to carry out simple but effective attacks.<br />
Tensions with China could also drive an increase in industrial espionage and targeted disruptions, especially if economic isolation or tech sanctions take effect.<br />
We also need to consider domestic threats – environmental activists or radicalized groups can become actors themselves, especially when political frustration grows.</p>
<p><em><strong>How important is the integration of IT and physical security for comprehensive protection?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Effective protection requires integrated strategies combining both digital and physical security. These two areas must be aligned not just technically but also organizationally. Modern security systems should enable centralized and modular management of intrusion detection, access control, video surveillance, and backup power. In hybrid attack scenarios, digital alerts must trigger physical responses – for example, when a perimeter breach is detected, a response team must be dispatched automatically. Without this integration, companies risk falling into dangerous response gaps.</p>
<p><em><strong>What are best practices for handling suspected security incidents or disruptions within an organization?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> Companies must establish clear and well-communicated reporting procedures. Employees should know exactly who to contact in case of a suspicious incident – and feel confident that their report will be taken seriously. It’s also smart to build relationships with security authorities, such as national security agencies or cybercrime units, well before an emergency occurs. If targeted disruption is suspected, external specialists like IT forensic experts or corporate security consultants should be brought in early. And when in doubt – for instance, if someone is acting suspiciously or photographing sensitive areas – it’s better to overreact than underreact. A professional and level-headed approach builds trust. Organizations that conduct regular crisis drills, assign dedicated emergency teams, and work with external partners are far better prepared. And let’s be clear: Preparedness costs money – but nowhere near as much as a successful security breach.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-11 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-21 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8733-3"><div class="fusion-panel panel-default panel-951cabf99052a72ef fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_951cabf99052a72ef"><a aria-expanded="false" aria-controls="951cabf99052a72ef" role="button" data-toggle="collapse" data-parent="#accordion-8733-3" data-target="#951cabf99052a72ef" href="#951cabf99052a72ef"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">MACONIA GmbH</span></a></div></div><div id="951cabf99052a72ef" class="panel-collapse collapse " aria-labelledby="toggle_951cabf99052a72ef"><div class="panel-body toggle-content fusion-clearfix">
<p>MACONIA stands for independent, neutral security consulting with real depth – driven by an experienced team that combines expert knowledge with hands-on experience, integrity, and a commitment to the highest quality standards. Learn more: <a class="" href="http://www.maconia.de" target="_new" rel="noopener" data-start="296" data-end="335" data-is-last-node="">www.maconia.de</a></p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/hybrid-threat-protection/">Detecting and Preventing Manipulation: How Companies Shield Themselves from Hybrid Threats</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/hybrid-threat-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Roll Film: A Security Solution for Warner Brothers</title>
		<link>https://noxsystems.com/en/security-solution-warner-brothers-film-studio/</link>
					<comments>https://noxsystems.com/en/security-solution-warner-brothers-film-studio/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Wed, 11 Jun 2025 14:03:57 +0000</pubDate>
				<category><![CDATA[Case studies]]></category>
		<category><![CDATA[Combined access control and alarm systems]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Access Control]]></category>
		<category><![CDATA[Film Studio Security]]></category>
		<category><![CDATA[Integrated Security System]]></category>
		<category><![CDATA[Intrusion Detection]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=8706</guid>

					<description><![CDATA[<p>In large, sprawling new buildings, such as a modern 24/7 film studio, a comprehensive security concept is essential. Different user groups require finely graded access authorisations, while valuable technology, sensitive data and people must also be effectively protected. Implementing such a networked security concept in new buildings ensures a high level of security for  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/security-solution-warner-brothers-film-studio/">Roll Film: A Security Solution for Warner Brothers</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-21" style="--awb-text-color:#000000;"><h5>In large, sprawling new buildings, such as a modern 24/7 film studio, a comprehensive security concept is essential. Different user groups require finely graded access authorisations, while valuable technology, sensitive data and people must also be effectively protected.</h5>
<p>Implementing such a networked security concept in new buildings ensures a high level of security for many user groups without compromising usability. Centralising all systems and information shortens response times, minimises false alarms and simplifies processes. Overall, integrated alarm and intrusion management provides the foundation for efficient, future-proof building protection.</p>
<h3>Access controll</h3>
<p>Electronic access control forms the basis of the security concept. Unlike mechanical key systems, it enables access rights to be assigned with great precision according to person, area, and time. For instance, each team is granted access only to their own work areas, while other zones remain locked to prevent unauthorised access &#8211; and thus theft, sabotage or misuse of data. Authorisations are managed centrally and can be adjusted or revoked immediately if necessary.</p>
<p>Although access control and fire safety systems must work together, local regulations vary. In Sweden, for instance, systems must always permit evacuation when people are in the building. NOX meets this need by monitoring escape route doors and triggering an immediate alert in the event of an issue. Locks must also comply with local regulations, which often require separate day and night modes for access and security. Elsewhere, simpler standards may apply, such as requiring only one compliant lock. NOX adapts to all cases, ensuring secure escape routes without compromising access control.</p>
<h3>Burglary protection</h3>
<p>The burglar alarm system protects the property during and outside of operating hours. Alarms are triggered by unauthorized access after hours and by forced entry attempts, such as broken windows or forced doors, at any time. Valid access credentials prevent false alarms. When an alarm is triggered, the system activates IP cameras to provide visual verification and an appropriate response.</p>
<h3>Central security management</h3>
<p>The close networking of all components enables efficient security management. Central alarm management: all alarms converge in a central security management platform. Security personnel can operate all connected systems uniformly via the control centre, controlling doors, acknowledging alarms and initiating measures. Predefined alarm plans automatically trigger stored measures. This integrated alarm management system enables a fast, coordinated response as all relevant information is available centrally. Practical example: Warner Brothers Film Studio</p>
<h3>Use Case: film studio Warner Brothers</h3>
<p>A comprehensive security solution from NOX SYSTEMS was successfully implemented in a new Warner Brothers film studio in Sweden, planned in collaboration with Monitor Larm, who were responsible for its realisation. All access readers, cameras and detectors are networked on a single platform. User frequency ranged from regular to sporadic – many of the registered users only accessed the premises a few times a year. Against this background, it was essential to have a particularly user-friendly and fault-tolerant system design.</p>
<p>The security approach included installing an access control and intrusion detection solution with NOX SYSTEMS components. Great importance was attached to automated user guidance and an intuitive user interface to enable users with little technical expertise to safely and easily operate the system.</p>
<h3>A flexible and expandable solution was sought and found</h3>
<p>The installed systems included the NOX SYS, a hybrid intrusion alarm and access control panel, and various expansion modules for connecting additional systems, such as access control readers. These combine all systems (access, intrusion, fire and building technology) and offer open interfaces for third-party systems. This eliminates the need for isolated solutions, with a common control panel and cabling covering all functions. The system is flexibly scalable. Thanks to modern IP technology, the platform remains open for expansion — new sensors or automation functions can be integrated at any time. The system is characterised by its user-friendliness and automation. Processes such as time-controlled arming/disarming or lighting control can be programmed, and the intuitive user interface makes operation easy. The solution also meets the highest security standards (e.g. EN 50131 Grade 3 and VdS Class C). This makes it ideal for a film studio, which has sensitive data and valuables. In the film studio, the solution was supplemented with electronic door handles, a video surveillance system and a separate fire alarm system. Electric locks and automatic door openers were also integrated to ensure a high degree of automation and barrier-free access.</p>
<h3>Conclusion: scalable and flexible</h3>
<p>The systems could be tailored directly to the architectural and technical requirements of the new building without any complications. Close communication with the facility manager meant that individual requests could be taken into account and implemented at an early stage, and the integration went smoothly. The customer&#8217;s feedback was consistently positive – the systems not only met, but exceeded, expectations.</p>
<p>Overall, this project demonstrates that well-thought-out planning, modular technology and close communication with the operator Monitor Alarm  can create a security solution that meets complex requirements in terms of user-friendliness, functionality and scalability. NOX SYSTEMS proved to be a central technological component in the successful implementation.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-12 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-22 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Partner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8706-4"><div class="fusion-panel panel-default panel-91c4d65cf331432b8 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_91c4d65cf331432b8"><a aria-expanded="false" aria-controls="91c4d65cf331432b8" role="button" data-toggle="collapse" data-parent="#accordion-8706-4" data-target="#91c4d65cf331432b8" href="#91c4d65cf331432b8"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">Monitor Larm</span></a></div></div><div id="91c4d65cf331432b8" class="panel-collapse collapse " aria-labelledby="toggle_91c4d65cf331432b8"><div class="panel-body toggle-content fusion-clearfix">
<p><a href="https://monitor-larm.se/">Monitor Larm &amp; Bevakning AB</a>, a part of CERTEGO Group, is a 30-year-old company based in Gothenburg. The company offers comprehensive solutions for the protection of people, buildings and valuables. These include intruder alarm systems, access control, CCTV, fire alarm systems, locks and complementary services such as guard services and alarm receiving centres. All under one roof, making it easy for our customers to stay safe.</p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/security-solution-warner-brothers-film-studio/">Roll Film: A Security Solution for Warner Brothers</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/security-solution-warner-brothers-film-studio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>From Signal to Action: Rethinking Alarm Management</title>
		<link>https://noxsystems.com/en/rethinking-alarm-management/</link>
					<comments>https://noxsystems.com/en/rethinking-alarm-management/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Tue, 20 May 2025 12:05:07 +0000</pubDate>
				<category><![CDATA[EMA]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[360-degree security]]></category>
		<category><![CDATA[alarm management]]></category>
		<category><![CDATA[Critical Infrastructure Security]]></category>
		<category><![CDATA[intrusion detection system]]></category>
		<category><![CDATA[KRITIS-Sicherheit]]></category>
		<category><![CDATA[security system integration]]></category>
		<guid isPermaLink="false">https://noxsystems.com/alarmprozesse-in-der-praxis/</guid>

					<description><![CDATA[<p>Intrusion detection systems are often the first technical component of a security infrastructure, but without an effective alarm management process, they remain limited in their effectiveness. In a fully integrated, 360-degree security approach, it is essential to combine detection, evaluation and response to create a seamless process. This is the only way to avoid  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/rethinking-alarm-management/">From Signal to Action: Rethinking Alarm Management</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-22" style="--awb-text-color:#000000;"><h5>Intrusion detection systems are often the first technical component of a security infrastructure, but without an effective alarm management process, they remain limited in their effectiveness. In a fully integrated, 360-degree security approach, it is essential to combine detection, evaluation and response to create a seamless process. This is the only way to avoid fragmented solutions and manage security efficiently.</h5>
<h5>Torsten Hiermann of CriseConsult explains how intrusion detection can be embedded into an effective alarm management strategy, and why regular alarm drills are a frequently overlooked success factor.</h5>
<p><em><strong>How should effective alarm management be incorporated into a 360-degree security framework, and how can it prevent the development of isolated solutions?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>In military settings, we use the term &#8216;actionable intelligence&#8217;, which means: Information must be reliable and timely enough to be processed and acted upon. In this context: There is no such thing as a 360-degree security approach without functional alarm management. What use is precise detection if the downstream structures don&#8217;t work? The process begins with planning a system that aligns with the defined protection level. Only then can the technical components be considered. Most importantly, detection must be linked to predefined actions, whether technical, such as building automation, or organisational, such as deploying security personnel.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-13 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-5 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="200" title="TH_Porttrait_1" src="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-300x200.jpg" class="img-responsive wp-image-8604 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-200x133.jpg 200w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-400x267.jpg 400w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-600x400.jpg 600w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-800x534.jpg 800w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1.jpg 1000w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-23 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>“If the alarm chain fails as a single point of failure, the entire process behind it loses its effectiveness.”</em></p>
<p><strong>Torsten Hiermann</strong><br />
CriseConsult</p>
</div></div></div></div><div class="fusion-text fusion-text-24" style="--awb-text-color:#000000;"><p><em><strong>What are the most common weaknesses of intrusion detection systems, particularly in critical infrastructure environments?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>The issue rarely lies with the technology itself. The challenge lies in ensuring that detection leads to action, ideally in the form of timely intervention. However, when personnel are required to respond on site, security teams quickly reach their limits. Response times and available manpower are key constraints. Intruders don’t wait. Therefore, their movement patterns must be tracked and relayed in real time to internal responders. Ideally, their movement should also be restricted, for example via lockdowns. This is technically feasible, but requires investment. This brings us back to the point that technical capabilities must be aligned with risk assessments. Let me add this: Alarm management deals with what happens after an incident is detected. However, the ultimate goal should always be to prevent – or at least delay – the incident from happening in the first place.</p>
<p><em><strong>Can intrusion detection systems actually increase risk, for example by triggering false alarms?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>Even the best systems can be rendered ineffective by poorly coordinated processes. Frequent false alarms can reduce situational awareness. Consider, for instance, a fire alarm that goes off every week – people will eventually stop reacting. Reliability is paramount: if your system triggers unnecessary alarms, the real ones may be overlooked. This undermines the entire subsequent response process.</p>
</div><div class="fusion-text fusion-text-25" style="--awb-text-color:#000000;"><p><em><strong>So, how can modern technologies like AI-based detection improve alarm management?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>We’re seeing rapid technological advances, especially in AI. This is already shaping security systems. Behaviour-based video analytics is one example. Predictive policing is another example. In short, the earlier a threat is detected, even in its early or potential phase, the sooner you can respond or take preventive action. That’s the good news. The bad news is that bad actors are evolving too. Modern technologies are powerful tools. However, they should never replace physical protection, but rather enhance it.</p>
<p><em><strong>How important is regular testing of alarm procedures (e.g., alarm drills) for the real-world effectiveness of a security concept?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>That’s easy to answer – with Benjamin Franklin: <em>“If you are failing to prepare, you’re preparing to fail.”</em> Special forces train. So do emergency physicians, pilots, security teams, and industrial site operators. Alarm drills are among the easiest exercises to conduct – and yet, if the alarm chain fails as a single point of failure, the entire response process collapses. In short: practice matters.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-14 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-23 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8632-5"><div class="fusion-panel panel-default panel-b9f8e2ee0b7b0452d fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_b9f8e2ee0b7b0452d"><a aria-expanded="false" aria-controls="b9f8e2ee0b7b0452d" role="button" data-toggle="collapse" data-parent="#accordion-8632-5" data-target="#b9f8e2ee0b7b0452d" href="#b9f8e2ee0b7b0452d"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">CriseConsult</span></a></div></div><div id="b9f8e2ee0b7b0452d" class="panel-collapse collapse " aria-labelledby="toggle_b9f8e2ee0b7b0452d"><div class="panel-body toggle-content fusion-clearfix">
<p>Torsten Hiermann is the founder of CriseConsult, a consulting firm that specializes in crisis and security management. He advises companies, municipalities, and government institutions, drawing on his extensive experience in operational roles within emergency and crisis response teams. He is also a lecturer at the Academy for Crisis Management (AKNZ) and at the University of Münster. Additionally, he is an officer in the German Armed Forces. In security management, he takes a holistic, 360-degree approach to ensure that the level of security and potential threat are proportionate. www.criseconsult.de</p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/rethinking-alarm-management/">From Signal to Action: Rethinking Alarm Management</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/rethinking-alarm-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Making Integration Work: Practical Insights into Open Security Systems</title>
		<link>https://noxsystems.com/en/system-openness-in-security-integration/</link>
					<comments>https://noxsystems.com/en/system-openness-in-security-integration/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 19 May 2025 13:23:34 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Access & Control Solutions]]></category>
		<category><![CDATA[Integrated Security Solutions]]></category>
		<category><![CDATA[Open Security Architecture]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=8562</guid>

					<description><![CDATA[<p>Why System Openness Is Becoming the New Standard  Few terms are used as frequently – or interpreted as differently – in the security market as 'system openness'. But what does it really mean when real-world projects begin, public tenders demand integration and five systems suddenly need to communicate with each other? We spoke  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/system-openness-in-security-integration/">Making Integration Work: Practical Insights into Open Security Systems</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-24 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two">
<h2>Why System Openness Is Becoming the New Standard</h2>
</div>
<div class="fusion-text fusion-text-1"></div></h2></div><div class="fusion-text fusion-text-26" style="--awb-text-color:#000000;"><h5>Few terms are used as frequently – or interpreted as differently – in the security market as &#8216;system openness&#8217;. But what does it really mean when real-world projects begin, public tenders demand integration and five systems suddenly need to communicate with each other?</h5>
<h5>We spoke to Antoine Evertze, Product Manager at ARAS Security Netherlands and long-standing NOX SYSTEMS partner, about this very issue. The result is a candid discussion about what true integration looks like, where the pitfalls lie, and why you don&#8217;t need to integrate everything — just the right things.</h5>
<p><em><strong>Antoine, why is system openness becoming more important in today’s security projects?</strong></em></p>
<p><strong>Antoine Evertze: </strong>Openness isn’t just becoming more important – it’s becoming the standard. Buildings are getting smarter, users are becoming more digital, and IT environments are becoming more complex. No system operates in isolation anymore, whether it&#8217;s access control, video surveillance, human resources or fire safety – everything needs to communicate. Not someday, but in real time and in a controllable and auditable way.</p>
<p>To stay relevant, a system needs to fulfil two criteria. First, it must provide a well-documented API with practical use cases, not just abstract documentation. Second, it must be able to adapt flexibly to changing environments using standardised protocols such as OSDP(v2) for access control, ESPA or Modbus, through custom connectors such as SQL or with an API.</p>
<p>We are seeing more and more that customers aren’t buying features anymore – they’re buying integration capability. This determines whether a system can be scaled up for real-world projects or whether it will fail at the interface.</p>
<p><em><strong>In which projects does NOX really make a difference?</strong></em></p>
<p><strong>Antoine Evertze: </strong>Whenever intrusion and access control need to be unified within a single system, the need for simplicity and consistency becomes obvious – especially in the public sector. No one wants to operate five different systems with five separate interfaces anymore. In a recent government project, we supported the implementation of a solution that not only combined access control and intrusion detection, but also offered a modular, scalable architecture with seamless integrations for video management, elevator systems, and parking management – all controlled from a single platform.<br />
In scenarios like this, fragmented solutions simply aren’t an option.</p>
</div><div class="fusion-title title fusion-title-25 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated">Simplifying Complex Infrastructures Through Integration</h3></h3></div><div class="fusion-text fusion-text-27" style="--awb-text-color:#000000;"><p><em><strong>Which systems do you consider essential for integration today?</strong></em></p>
<p><strong>Antoine Evertze: </strong>In my experience, three areas tend to feature in almost every project: video surveillance, fire alarm systems and identity/user management. When it comes to video, customers expect access and intrusion events to be automatically linked with camera footage. For fire protection, standardised interfaces for evacuation and alert forwarding are essential. When it comes to user management, it is essential that roles, permissions and validity periods can be synchronised from existing systems, such as HR or credential platforms. In short, systems that identify people, track movement or handle critical events must be able to communicate with each other reliably.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-15 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:44% 47%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-6 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="300" title="Antoine-Evertze-no-background" src="https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background-300x300.png" class="img-responsive wp-image-8582 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background-200x200.png 200w, https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background-400x400.png 400w, https://noxsystems.com/wp-content/uploads/2025/05/Antoine-Evertze-no-background.png 500w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-28 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>&#8220;True integration reduces complexity. It doesn&#8217;t create new layers.&#8221;</em></p>
<p><strong>Antoine Evertze</strong><br />
ARAS Security</p>
</div></div></div></div><div class="fusion-text fusion-text-29" style="--awb-text-color:#000000;"><p><em><strong>So, what is the difference between &#8216;connecting a system&#8217; and &#8216;truly integrating it&#8217;?</strong></em></p>
<p><strong>Antoine Evertze: </strong>When integration is done right, users don&#8217;t even notice it&#8217;s happening. Processes run logically, automatically and consistently. No one has to think about which interface to use – it just works. If I have to manually extract or copy data, that’s not integration; that’s extra work. True integration reduces complexity. It doesn&#8217;t create new layers.</p>
<p><strong>Thank you, Antoine, for your clear view on what openness really means.</strong></p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-16 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-26 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Partner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8562-6"><div class="fusion-panel panel-default panel-276d6ee473e710385 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_276d6ee473e710385"><a aria-expanded="false" aria-controls="276d6ee473e710385" role="button" data-toggle="collapse" data-parent="#accordion-8562-6" data-target="#276d6ee473e710385" href="#276d6ee473e710385"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">ARAS Security</span></a></div></div><div id="276d6ee473e710385" class="panel-collapse collapse " aria-labelledby="toggle_276d6ee473e710385"><div class="panel-body toggle-content fusion-clearfix">
<p><a href="https://www.aras.nl/">ARAS Security</a> provides installers and integrators in the Benelux with modular, scalable electronic security systems—including access control, intrusion detection, video surveillance, and system integration support.</p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/system-openness-in-security-integration/">Making Integration Work: Practical Insights into Open Security Systems</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/system-openness-in-security-integration/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Only Those Who Know Their Critical Processes Can Protect Them</title>
		<link>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/</link>
					<comments>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Thu, 24 Apr 2025 13:24:53 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Enterprise Security]]></category>
		<category><![CDATA[Hybrid Threats]]></category>
		<category><![CDATA[Hybride Bedrohungen]]></category>
		<category><![CDATA[Kritische Infrastrukturen]]></category>
		<category><![CDATA[Physische Sicherheit]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Sicherheitsstrategie]]></category>
		<category><![CDATA[Systemintegration]]></category>
		<category><![CDATA[Systems Integration]]></category>
		<category><![CDATA[Unternehmenssicherheit]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=8506</guid>

					<description><![CDATA[<p>Geopolitics, hybrid threats and vulnerable supply chains have made corporate security more strategic than ever. In this interview, Björn Hawlitschka of MACONIA GmbH provides insight into current threat scenarios and practical recommendations. Mr Hawlitschka, to what extent are companies more exposed to geopolitical risks today than they were ten years ago? Björn Hawlitschka: I  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/">Only Those Who Know Their Critical Processes Can Protect Them</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-30" style="--awb-text-color:#000000;"><h5>Geopolitics, hybrid threats and vulnerable supply chains have made corporate security more strategic than ever. In this interview, Björn Hawlitschka of MACONIA GmbH provides insight into current threat scenarios and practical recommendations.</h5>
<p><em><strong>Mr Hawlitschka, to what extent are companies more exposed to geopolitical risks today than they were ten years ago?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> I studied political science and then worked for a long time at the Federal Academy for Security Policy. Even then, we were working with an expanded concept of security in which networking and strategic thinking played a major role. Today we can clearly see that geopolitical risks have become more complex. In the past, companies could afford the luxury of keeping IT and security strictly separate. Conflicts such as the war in Ukraine, the pandemic and supply chain issues have shown us how vulnerable our systems are. It only takes one freighter stuck in the Suez Canal to bring entire production chains to a standstill.</p>
<p><em><strong>Why are critical infrastructures and companies increasingly being targeted by states or non-state actors?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> On the one hand, we see classic, economically motivated cybercrime &#8211; such as the Darkside attack on the Colonial Pipeline in 2021. On the other hand, politically motivated sabotage is also on the rise. Both are dangerous. It becomes particularly perfidious when attacks take on hybrid forms, combining physical and digital sabotage. The motives range from economic blackmail to the deliberate destabilisation of entire societies.</p>
<p><em><strong>Which sectors are particularly at risk, and which threat scenarios do you see as most critical at the moment?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>Traditional industries such as energy, chemicals and technology are of course in the spotlight. But small and medium-sized enterprises or municipal institutions are also vulnerable, for example to ransomware. It is particularly critical if social services can no longer be paid out in the event of such attacks. This undermines trust in government and can exacerbate social tensions.</p>
<p><em><strong>Do you see a trend towards targeted hybrid threats, i.e. a combination of physical sabotage and cyberattacks?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>Absolutely. In Ukraine, we have already seen a combination of cyber attacks and physical sabotage in 2015. This type of threat will increase because it is particularly effective.</p>
<p><em><strong>What basic security measures should companies take to protect themselves against digital threats?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>A solid risk analysis that maps all business processes is important. This includes a business impact analysis: Which processes are most critical? How long can they be down? And patch management! This sounds banal, but many vulnerabilities arise because available security updates have not been installed. Employee awareness also plays a major role &#8211; after all, people are both the biggest vulnerability and the most important resource.</p>
<p><em><strong>How can physical security measures be effectively integrated with cyber defence strategies?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>The zero-trust approach is very helpful here &#8211; not only in IT, but also physically: don&#8217;t blindly trust anyone, even if they are in the building. Awareness has to be trained in all areas. Many companies protect the outer ring very well &#8211; but once someone is inside, they can move around freely. That is a risk.</p>
<p><em><strong>Are there any best practices or specific examples from the corporate world that can serve as models for security strategies?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>Microsoft&#8217;s Zero Trust model is a good example. Or Toyota, which revised its supply chain strategies after Fukushima and is now planning with more redundancy. It is important not just to react, but to learn from crises.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-17 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:44% 47%;--awb-margin-bottom:24px;--awb-max-width:250px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:250px;"><span class=" fusion-imageframe imageframe-none imageframe-7 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="300" title="portrait_hawlitschka" src="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-300x300.jpeg" class="img-responsive wp-image-8498 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-200x200.jpeg 200w, https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka.jpeg 400w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-31 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>&#8220;The first step is to know your own processes. If you don&#8217;t know what your own &#8216;castle&#8217; looks like, you can&#8217;t protect it.”</em></p>
<p><strong>Björn Hawlitschka</strong>, MACONIA GmbH</p>
</div></div></div></div><div class="fusion-text fusion-text-32" style="--awb-text-color:#000000;"><p><em><strong>What measures would you recommend to companies that are at the beginning of a professional security strategy?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>The first step is to know your own processes. If you don&#8217;t know what your &#8220;castle&#8221; looks like, you can&#8217;t protect it. Then comes a business impact analysis. And finally, you should carry out realistic emergency exercises. Red team tests &#8211; i.e. external attacks to identify vulnerabilities &#8211; are also highly recommended.</p>
<p><em><strong>How should companies deal with the challenge that security measures are often seen as a cost factor rather than an investment?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>I recommend two calculation models: Firstly, how much would real damage cost? Second, what business will I miss out on if I don&#8217;t have certifications or ISMS/BCM systems in place? More and more customers, especially in the banking sector, are demanding proof of security. If you have nothing to show, you will lose business.</p>
<p><em><strong>What physical security measures are particularly important for companies with distributed locations or hybrid working models?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>If there are several sites, it should be clearly defined who is responsible in which situation &#8211; especially at what level of severity the &#8220;head office&#8221; takes over: Already in an emergency or only in a crisis? This requires defined escalation levels. And, of course, regular emergency drills &#8211; both local and central. The important thing to remember is that even small incidents can have a big impact. That&#8217;s why preparation is everything.</p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-33" style="--awb-text-color:#000000;"><p>Security begins with the right system. NOX systems stand for flexible and economical solutions &#8211; for security infrastructures that grow with your needs. <a href="https://noxsystems.com/en/security-solutions/">&gt; Learn More</a></p>
</div><div class="accordian fusion-accordian" style="--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color2);--awb-background-color:var(--awb-color2);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:20px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8506-7"><div class="fusion-panel panel-default panel-bb764be49f870da73 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><h4 class="panel-title toggle" id="toggle_bb764be49f870da73"><a aria-expanded="false" aria-controls="bb764be49f870da73" role="button" data-toggle="collapse" data-parent="#accordion-8506-7" data-target="#bb764be49f870da73" href="#bb764be49f870da73"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">Interview partner </span></a></h4></div><div id="bb764be49f870da73" class="panel-collapse collapse " aria-labelledby="toggle_bb764be49f870da73"><div class="panel-body toggle-content fusion-clearfix">
<p>MACONIA stands for independent, impartial, in-depth security consulting &#8211; backed by an experienced team that combines in-depth expertise with practical relevance, integrity and the highest quality standards. Find out more: <a href="http://www.maconia.de">www.maconia.de</a></p>
</div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/">Only Those Who Know Their Critical Processes Can Protect Them</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Efficient and Secure: How Öckerökronan Manages Its Properties</title>
		<link>https://noxsystems.com/en/oekerokronan-property-management/</link>
					<comments>https://noxsystems.com/en/oekerokronan-property-management/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Tue, 15 Apr 2025 15:00:22 +0000</pubDate>
				<category><![CDATA[All-in-one management]]></category>
		<category><![CDATA[Case studies]]></category>
		<category><![CDATA[Combined access control and alarm systems]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=8273</guid>

					<description><![CDATA[<p>Fast Facts  Company: Öckerökronan Fastighets AB Location: Öckerö, Sweden Industry: Industrial property management System scope: Multiple properties, centrally managed Solution: Access control, alarm integration, management system Partner: Monitor Larm &amp; Bevakning  Solution Used Combined Access Control and Alarm Systems All-in-One-Management   NOX Products NOX SIMS NOX SYS/XL NOX PS5 NOX IO4  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/oekerokronan-property-management/">Efficient and Secure: How Öckerökronan Manages Its Properties</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-27 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Fast Facts</h4></div><div class="fusion-text fusion-text-34" style="--awb-text-color:#000000;"><ul>
<li>Company: Öckerökronan Fastighets AB</li>
<li>Location: Öckerö, Sweden</li>
<li>Industry: Industrial property management</li>
<li>System scope: Multiple properties, centrally managed</li>
<li>Solution: Access control, alarm integration, management system</li>
<li>Partner: <a href="http://Monitor Larm &amp; Bevakning">Monitor Larm &amp; Bevakning</a></li>
</ul>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_4 1_4 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-28 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Solution Used</h4></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-12 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/security-solutions/"><span class="fusion-button-text">Combined Access Control and Alarm Systems</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-13 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/security-solutions/"><span class="fusion-button-text">All-in-One-Management</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_4 1_4 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-29 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">NOX Products</h4></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-14 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/produkte/"><span class="fusion-button-text">NOX SIMS</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-15 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/produkte/"><span class="fusion-button-text">NOX SYS/XL</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-16 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/produkte/"><span class="fusion-button-text">NOX PS5</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-17 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/produkte/"><span class="fusion-button-text">NOX IO4</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-18 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/produkte/"><span class="fusion-button-text">NOX RE4</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-19 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/produkte/"><span class="fusion-button-text">NOX CMO</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-30 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><h3><strong>Initial Situation</strong></h3></h4></div><div class="fusion-text fusion-text-35" style="--awb-text-color:#000000;"><p>Öckerökronan Fastighets AB is a Swedish real estate company based in Öckerö. Since 1975, the company has been managing and leasing both owned and leased industrial properties, including facilities on the premises of Ö-Varvet, its largest tenant.</p>
<p>Managing a wide variety of properties, changing user groups and maintaining high standards of operation and safety places considerable demands on both organization and security.</p>
<p>COO Andreas Djerf, together with Facility Manager Anders Hagman, is responsible for overseeing operations. Their responsibilities include maintenance, expansion projects, financial oversight, and coordination of security technology &#8211; including modernization and upgrading of alarm systems, access control, and locking systems.</p>
</div><div class="fusion-title title fusion-title-31 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><h3 class="fusion-responsive-typography-calculated" data-fontsize="20" data-lineheight="26px"><strong>Challenge</strong></h3></h4></div><div class="fusion-text fusion-text-36" style="--awb-text-color:#000000;"><p>The company operates a wide range of buildings and facilities at various addresses, supplemented by extensive outdoor areas and numerous docking points. In addition to its permanent staff, the company regularly employs temporary workers. This complex infrastructure requires a highly organized approach, particularly with regard to the consistent implementation of standardized security processes.</p>
</div><div class="fusion-title title fusion-title-32 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><h3 class="fusion-responsive-typography-calculated" data-fontsize="20" data-lineheight="26px"><strong>Solution</strong></h3></h4></div><div class="fusion-text fusion-text-37" style="--awb-text-color:#000000;"><p>Tenant Ö-Varvet uses a centralized system that links all security-related components across the property portfolio. This greatly simplifies administration and improves efficiency.</p>
<p>The NOX system used offers a flexible combination of alarm and access control functionality and also supports various site monitoring tasks &#8211; features that are actively used.</p>
<p>The decision to implement NOX was based amongst others on these practical benefits. With the integrated Security Information Management System (SIMS), all properties can be visualized &#8211; including interactive floor plans for easy navigation.</p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-33 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><h3 class="fusion-responsive-typography-calculated" data-fontsize="20" data-lineheight="26px"><strong>Result</strong></h3></h4></div><div class="fusion-text fusion-text-38" style="--awb-text-color:#000000;"><p>The current level of security is considered adequate. Traditional keys are increasingly being replaced by flexible access readers that allow precise control and traceability. It&#8217;s easy to verify who entered what area and when. The investment has paid off.</p>
<p>These improvements reflect Öckerökronan Fastighets AB&#8217;s ongoing commitment to securing its properties and ensuring the safety of its tenants and users &#8211; now and in the future.</p>
</div><div class="fusion-title title fusion-title-34 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;"><h3> <strong>NOX Top 3 Benefits According to Öckerökronan</strong></h3></h4></div><div class="fusion-text fusion-text-39" style="--awb-text-color:#000000;"><ol>
<li>In SIMS (Security Information Management System), we can see all our addresses visually &#8211; complete with interactive maps that make navigation easy.</li>
<li>The system has little, or none limitations regarding size and special functionality.</li>
<li>It&#8217;s an advanced system that&#8217;s still easy to understand and use.</li>
</ol>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/oekerokronan-property-management/">Efficient and Secure: How Öckerökronan Manages Its Properties</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/oekerokronan-property-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NIS2 Requirements: Challenges and Opportunities for Critical Infrastructure Operators</title>
		<link>https://noxsystems.com/en/nis2-requirements-critical-infrastructure-security/</link>
					<comments>https://noxsystems.com/en/nis2-requirements-critical-infrastructure-security/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Thu, 27 Mar 2025 18:47:32 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Energy and Water Supply Security]]></category>
		<category><![CDATA[Hospital Security]]></category>
		<category><![CDATA[NIS2 Directive]]></category>
		<guid isPermaLink="false">https://noxsystems.com/nis2-anforderungen-kritis-krankenhaus-wasserversorgung/</guid>

					<description><![CDATA[<p>The cyber security landscape in Europe is evolving. The EU's new Network and Information Security Directive 2 (NIS2) imposes stricter security requirements on critical infrastructure (CI) operators. Sectors such as healthcare and energy, which provide essential services to society, are particularly affected. But what do these new regulations mean for CI operators such as  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/nis2-requirements-critical-infrastructure-security/">NIS2 Requirements: Challenges and Opportunities for Critical Infrastructure Operators</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-11 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-40 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-bottom:0px;"><p>The cyber security landscape in Europe is evolving. The EU&#8217;s new Network and Information Security Directive 2 (NIS2) imposes stricter security requirements on critical infrastructure (CI) operators. Sectors such as healthcare and energy, which provide essential services to society, are particularly affected. But what do these new regulations mean for CI operators such as hospitals and energy providers?</p>
</div></div></div></div></div><div class="fusion-fullwidth fullwidth-box fusion-builder-row-12 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-19 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-35 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;"><h3>Key Requirements of the NIS2 Directive – National Implementation Using Germany as an Example</h3></h2></div><div class="fusion-text fusion-text-41" style="--awb-text-color:var(--awb-custom_color_2);"><p>The NIS2 Directive sets new EU-wide standards for cyber security and the protection of critical infrastructure. However, implementation takes place at the national level. In Germany, this is being done through the upcoming NIS2 Implementation and Cybersecurity Strengthening Act (NIS2UmsuCG). Once enacted, this law will extend existing security obligations and is expected to affect tens of thousands of companies in Germany alone.</p>
<p>To comply, organizations must ensure a high level of cyber resilience, which includes:<br />
✅ Implementing robust risk and security management systems<br />
✅ Developing and testing contingency and business continuity plans<br />
✅ Ensuring real-time monitoring and rapid incident response capabilities</p>
<p>One of the most critical requirements is the obligation to report significant security incidents within 24 hours. Non-compliance can lead to severe penalties. Moreover, the directive now also applies to medium-sized and large enterprises across various sectors – significantly broadening its scope.</p>
</div><div class="fusion-title title fusion-title-36 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;"><h3>Hospitals: Cybersecurity in Healthcare</h3></h3></div><div class="fusion-text fusion-text-42" style="--awb-text-color:var(--awb-custom_color_2);"><p>Hospitals are among the most sensitive institutions &#8211; cyber threats not only cause financial damage, but also endanger lives and compromise the security of personal data. NIS2 significantly increases the responsibility of hospitals to develop and implement comprehensive IT security strategies.</p>
<p>CI hospitals will need to invest in systems that protect critical patient data while ensuring uninterrupted medical care, even in the event of a cyber-attack. Staff training also plays a crucial role &#8211; employees must be educated to minimise human error. The protection of sensitive patient data is particularly critical, as any breach could have serious legal consequences and undermine public confidence. For CI hospitals, implementing NIS2-compliant security strategies is no longer optional &#8211; it is essential.</p>
</div><div class="fusion-title title fusion-title-37 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top:24px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:28;line-height:1.3;">Water &amp; Energy Supply: Protection Against Cyber Threats</h3></div><div class="fusion-text fusion-text-43" style="--awb-text-color:var(--awb-custom_color_2);"><p>Beyond healthcare, the NIS2 Directive also has implications for the water and energy sectors. One of the biggest challenges in the energy sector is the secure integration of digital technologies. As smart grids and digital control systems become more embedded in the energy infrastructure, they also become more attractive and vulnerable to cyber-attacks.</p>
<p>NIS2 requires energy providers to adopt a more comprehensive security strategy that includes both preventive and reactive measures. This includes implementing redundant systems and promoting proactive cooperation with authorities and CERTs (Computer Emergency Response Teams). These efforts aim to identify potential cyber threats early and ensure the uninterrupted supply of water and energy.</p>
</div><div class="fusion-title title fusion-title-38 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top:24px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:32;line-height:1.4;">Challenges and Opportunities of NIS2</h2></div><div class="fusion-text fusion-text-44" style="--awb-text-color:var(--awb-custom_color_2);"><p>Implementing the requirements of NIS2 poses significant challenges, particularly in terms of financial and human resources. But the directive also offers opportunities. By strengthening their cyber security measures, hospitals and energy providers can become more resilient to cyber threats.</p>
<p>Companies that meet high security standards will position themselves as reliable partners and service providers. In addition, increased security requirements can drive innovation, leading to new security solutions and technologies.</p>
<p>The NIS2 Directive introduces significant changes for critical infrastructure operators. Hospitals and energy providers must now implement comprehensive security strategies to comply with the new regulations. Despite the challenges, NIS2 compliance offers a long-term opportunity to improve resilience to cyber-attacks and increase public confidence in essential services.</p>
<p>The clock is ticking &#8211; those who act now will gain a significant advantage in the future.</p>
</div><div style="text-align:center;"><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-20 fusion-button-default-span fusion-button-default-type" style="--button_bevel_color:var(--awb-color5);--button_bevel_color_hover:var(--awb-color8);--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:rgba(255,255,255,0);--button_border_width-top:2px;--button_border_width-right:2px;--button_border_width-bottom:2px;--button_border_width-left:2px;--button-border-radius-top-left:10px;--button-border-radius-top-right:10px;--button-border-radius-bottom-right:10px;--button-border-radius-bottom-left:10px;--button_gradient_top_color:var(--awb-color7);--button_gradient_bottom_color:var(--awb-color7);--button_gradient_top_color_hover:hsla(var(--awb-color7-h),calc(var(--awb-color7-s) - 5%),calc(var(--awb-color7-l) - 10%),var(--awb-color7-a));--button_gradient_bottom_color_hover:hsla(var(--awb-color7-h),calc(var(--awb-color7-s) - 5%),calc(var(--awb-color7-l) - 10%),var(--awb-color7-a));--button_text_transform:none;--button_font_size:16px;--button_line_height:var(--awb-typography3-line-height);--button_padding-top:10px;--button_padding-right:40px;--button_padding-bottom:10px;--button_padding-left:40px;--button_typography-font-family:&quot;Lato&quot;;--button_typography-font-style:normal;--button_typography-font-weight:400;--button_margin-top:20px;--button_margin-bottom:20px;" target="_self" href="https://noxsystems.com/en/security-solutions/"><span class="fusion-button-text">Find Your NIS2-Compliant Security Solution</span></a></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/nis2-requirements-critical-infrastructure-security/">NIS2 Requirements: Challenges and Opportunities for Critical Infrastructure Operators</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/nis2-requirements-critical-infrastructure-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
