Subscribe to our free, weekly email newsletter!


Security technology: Closing the vulnerability gap

Successful integration of technology into a supply chain security strategy will expedite border crossing wait times and reduce insurance costs. Fortunately, new technologies continue to be introduced that provide greater transparency at some of the critical junctures where security needs and vulnerability overlap.
By Suzanne Richer, President, Customs & Trade Solutions, Inc.
October 08, 2010

Securing the international supply chain continues to be a major challenge for global corporations.

The last decade has seen the development of cargo security programs from the U.S. Customs and Border Protection’s (CBP) C-TPAT program to the European AEO program and similar global initiatives. These well-intended global programs seek to add transparency to the international movement of goods, tying in the sharing of electronic data between governments to improve risk assessment and ultimately to reduce the possibility of tampering between the loading of the product at origin and the arrival into the receiving country.

Many of these programs take a common approach to securing the international supply chain by focusing on key components of internal controls—from the ordering process all the way through to the distribution of goods. However, most of the activity between these two points is outsourced to business partners who then become responsible for the safety and security of the freight while it’s in their possession.

Check below for related articles.

2010 Ocean Shipping Roundtable: Close quarters

100 percent air cargo screening off to smooth start so far

MANAGING Risk: An Interview with Gary Lynch

About the Author

Suzanne Richer
President, Customs & Trade Solutions, Inc.

Subscribe to Logistics Management magazine

Subscribe today. It's FREE!
Get timely insider information that you can use to better manage your
entire logistics operation.
Start your FREE subscription today!

Recent Entries

The high-volume warehouse or distribution center that supports B2B, Omni-channel activities, direct-to-consumer shipments, and the Internet of Things all require a flexible and scalable supply chain in order to function at optimal capacity. The problem is that most of today's supply chains are made up of fragmented silos of information that compromise their ability to compete, be responsive to customer demands or seize new business opportunities.

As customers' demands constantly evolve, transportation and logistics (T&L) operations are being put under growing pressure to offer more efficient delivery services, while not compromising on customer service. Using findings from a research survey conducted among transport and logistics managers around the world, this report explores how a combination of mobile technology implementations for mobile workers, and process re-engineering efforts can elevate operations to the next level.

It's a fact - most best-of-breed WMS providers force you to pay every time you require a system change. Uncover five more dirty secrets many warehouse management systems providers don't want you to know. Download the white paper 5 Dirty Secrets of Warehouse Management Systems to discover these hidden truths and gain valuable information on considerations for evaluating WMS vendors.

Not Sure? The Whitepaper "Stay or Switch" Provides the Research Necessary for You to See How Well Your Provider Stacks Up!

Too many companies invest in ERP systems but do not achieve the business benefits they anticipated. Sometimes, the ERP solution never fits the way your people and processes work.

Article Topics

Features · Supply Chain · Security · All topics

Comments

Post a comment
Commenting is not available in this channel entry.


© Copyright 2015 Peerless Media LLC, a division of EH Publishing, Inc • 111 Speen Street, Ste 200, Framingham, MA 01701 USA