Security technology: Closing the vulnerability gap
Successful integration of technology into a supply chain security strategy will expedite border crossing wait times and reduce insurance costs. Fortunately, new technologies continue to be introduced that provide greater transparency at some of the critical junctures where security needs and vulnerability overlap.
in the NewsFedEx rolls out 2018 rate increases Cass Freight Index posts solid August gains August ATA truck tonnage volumes show decent growth Boost your retail performance with an integrated solution The Digital Supply Chain: The Future has Arrived More News
Securing the international supply chain continues to be a major challenge for global corporations.
The last decade has seen the development of cargo security programs from the U.S. Customs and Border Protection’s (CBP) C-TPAT program to the European AEO program and similar global initiatives. These well-intended global programs seek to add transparency to the international movement of goods, tying in the sharing of electronic data between governments to improve risk assessment and ultimately to reduce the possibility of tampering between the loading of the product at origin and the arrival into the receiving country.
Many of these programs take a common approach to securing the international supply chain by focusing on key components of internal controls—from the ordering process all the way through to the distribution of goods. However, most of the activity between these two points is outsourced to business partners who then become responsible for the safety and security of the freight while it’s in their possession.
Check below for related articles.
About the AuthorSusan Richer President, Customs & Trade Solutions, Inc.
Subscribe to Logistics Management Magazine!Subscribe today. It's FREE!
Get timely insider information that you can use to better manage your entire logistics operation.
Start your FREE subscription today!
Improving 3PL Management: Glanbia Adds Muscle to Logistics Why Retail Supply Chain Transformations Fail - and how to get it right View More From this Issue