Security technology: Closing the vulnerability gap
Successful integration of technology into a supply chain security strategy will expedite border crossing wait times and reduce insurance costs. Fortunately, new technologies continue to be introduced that provide greater transparency at some of the critical junctures where security needs and vulnerability overlap.
in the NewsNew FedEx offering focuses on high-volume returns U.S. trade with Canada and Mexico sees annual gain in 2016, BTS reports Knight-Swift to add 400 trucks, drivers with Abilene tuck-in acquisition Panjiva says trade fundamentals are strong, despite concerns over tariffs NEXT Trucking and Mitsui O.S.K. Lines partner to service SMEs More News
Securing the international supply chain continues to be a major challenge for global corporations.
The last decade has seen the development of cargo security programs from the U.S. Customs and Border Protection’s (CBP) C-TPAT program to the European AEO program and similar global initiatives. These well-intended global programs seek to add transparency to the international movement of goods, tying in the sharing of electronic data between governments to improve risk assessment and ultimately to reduce the possibility of tampering between the loading of the product at origin and the arrival into the receiving country.
Many of these programs take a common approach to securing the international supply chain by focusing on key components of internal controls—from the ordering process all the way through to the distribution of goods. However, most of the activity between these two points is outsourced to business partners who then become responsible for the safety and security of the freight while it’s in their possession.
Check below for related articles.
About the AuthorSusan Richer President, Customs & Trade Solutions, Inc.
Subscribe to Logistics Management Magazine!Subscribe today. It's FREE!
Get timely insider information that you can use to better manage your entire logistics operation.
Start your FREE subscription today!
Reverse Logistics in the “Age of Entitlement” Logistics Management’s Viewpoint on E-commerce: Leveraging available tools View More From this Issue