__MAIN_TEXT__
feature-image

Page 1

SAFETY & SECURITY www.safetyandsecurityafrica.com April-June Issue 2021

REVIEW AFRICA


HOW SECURE ARE YOU WHEN YOU TRAVEL?

Cab n-Tech® SECURITY ON THE GO®

PERSONAL, SELF CONTAINED SECURITY MONITOR INTEGRATED SENSOR FAMILY: • • • •

Carbon-Monoxide, Temperature/Humidity,Motion, Power Loss and GPS Integrated Still and Video recording camera, active only when armed Optional Sensors: luggage movement, door open detected, panic button Web portal management access, Android and IOS app’s provided

TRACER TECHNOLOGY SYSTEMS, INC. www.tracertechnology.net

For more information, visit cabin-tech.net data provided by

Vodafone


Editor Collen Geza editor@safetyandsecurityafrica.com Sales conrad.sithole@safetyandsecurityafrica.com jack.archad@safetyandsecurityafrica.com david.brunn@safetyandsecurityafrica.com nicholas.mayo@safetyandsecurityafrica.com brian.hungwe@safetyandsecurityafrica.com Design & layout Black Heart Media Accounts Tatenda Hungwe admin@safetyandsecurityafrica.com Contact Details: info@safetyandsecurityafrica.com adver�sing@safetyandsecurityafrica.com Cell: +27 61 656 7791 / +27 60 408 2917 Address: 1852 Dodoma Crescent Northriding 2188, Gauteng, South Africa www.safetyandsecurityafrica.com

Editor’s Note COVID-19 has taken the concept of trust to a whole new level – one that none of us has ever experienced. Do you trust your employer when they tell you they do not intend to close the doors or make mass layoffs? Do you trust your employer is doing everything possible to keep you safe– that the office is clean, and everyone need not worry about coming back (or continuing) to work? Do you trust that the business you are visiting has done everything in its power to keep the virus from spreading? Now we are talking about your business and your customers – and yes, the security industry still has plenty of trusts, but reassurance and truthfulness are key to maintaining it. In this issue, we bring you brand names you can trust, Well-researched articles that a key in deciding in the security industry. While Safety & Security Africa is a forum where readers can engage with traditional topics in the security industry, it is also a forum where contemporary challenges to African security are addressed. For example, security issues related to environmental and demographic change, emerging technologies and transnational networks, will continue to test existing theories and push the boundaries of the discipline. We rely on our global network of authors, reviewers, and readers to help Safety & Security Africa identify and explore new frontiers of the security industry. Readers need I say more. Get into our Issue and find out more. Regards Editor Collen Geza editor@safetyandsecurityafrica.com

SAFETY & SECURITY PROMOTING A SAFE AND SECURE AFRICA

REVIEW AFRICA

Disclaimer: All material is strictly copyright. The magazine or any part thereof may not be reproduced or adapted without wri�en permission from the publisher: Safety and Security Review Africa welcomes material submi�ed for publica�on but retains the right to edit copy. The views expressed in the publica�on are not considered those of the publisher (Revival Media), which accepts no liability of any nature arising out of or in connec�on with the contents of this magazine. While every effort has been taken in compiling this publica�on, the publisher does not give warranty as to the completeness or accuracy of its content. The publisher and the editor cannot accept responsibility for any loss inconvenience & damage that may occur there from.

www.safetyandsecurityafrica.com | April-June 2021


Access Control Pg.6 Suprema Biostar 2 Acquires Data Protection Certifications ISO 27001 And ISO 27701 Pg.7 SALTO Neo Electronic Cylinder Gains BSI Enhanced Level Iot Kitemark™ Pg.8 Demand For Increased Security In Multi Tenanted Buildings Pg.10 Boon Edam Launches The Speedlane Compact Security Speed Gate Pg.12 Ethical Biometrics Tools Available Now, Education Needed, Valid Exec Says Pg.16 Precise Biometrics And Qualcomm In-Display Fingerprint Scanning Deployed In 5G Smartphones Pg.18 Contactless Access Control With Paxton10 Pg.20 FLIR Systems Announces Upgraded FLIR Identifinder R440 Fire Prevention Pg.22 TLX Technologies – Liquid Level Sensor For Fire-Suppression Systems Pg.24 Lithium X From Bavaria Firefighting – Effectively Extinguish Almost All Types Of Metal Fires Health & Safety Pg.26 Remote-Controlled Lifesaving Buoy Video Surveillance Pg.28 Comm Port’s New COMMBOX Adds Modular Versatility To Ease Design, Installation, And Integration Of UVIS Deployment Pg.30 VIVOTEK Upgrades Security At South Africa's BP Manor Garage Gas Station Pg.31 Hanwha Techwin Launches New PTZ PLUS Cameras, 65% Lighter Than Conventional PTZ Cameras. Pg.32 Dahua To Release Upgraded Ivss With Added Ai Functions Pg.33 Hikvision Releases New Colorvu Offerings Now With 4K And Varifocal Option Pg.34 Video Surveillance: Intelligent Video Analytics Pg.37 Seagate Unveils Lyve Cloud Built To Store, Activate, And Manage The Massive Surge In Data Perimeter Security Pg.40 Sightlogix Announces Dual-Sensor Video Analytics For Superior Outdoor Intruder Detection Pg.41 Lockdown Your Security Pg.42 Perimeter Security Design Approach Pg.44 Perimeter Fence Detection System - CHOOSE THE RIGHT TECHNOLOGY For Perimeter Security Pg.46 New Puretech Patent Affords More Accurate And Timely Man Overboard Detections Pg.47 Global Cosmetics Giant Installs Fire System From Advanced At South African HQ Pg.48 Motionprotect Outdoor — Wireless Outdoor Motion Detector With An Advanced Anti-Masking System And Pet-Immunity Pg.50 AGIL Fence Completes Integration With Milestone Xprotect 2020 R2 Pg.52 Winter Safeguards For Outdoor Sensors Pg.53 Perimeter Security In A Perimeter-Less Era

www.safetyandsecurityafrica.com | April-June 2021

C O N T E N T S


Access Control

6

Suprema BioStar 2 acquires data protection certifications ISO 27001 and ISO 27701

Suprema, a global leader in access control, biometrics and time & attendance solutions, announced today that its BioStar 2 platform acquired ISO 27001 and ISO 27701 certifications, internationally recognized privacy information and security standard. ISO 27001 ensures that appropriate measures are in place for data protection and management of information. ISO 27701, first established in August last year, is granted to systems compliant with the General Data Protection Regulation (GDPR) and other similar legislations like California

Consumer Privacy Act (CCPA). Both certifications are published and managed by the International Organization for Standardization (ISO). Suprema BioStar 2 that acquired the ISO certifications, is a web-based open platform with access control, time and attendance and visitor management features. Suprema offers API and SDK that enables BioStar 2’s easy integration with third party systems. Suprema BioStar 2 met all of the 26 data protection management standards, 114 data protection control and 18

www.safetyandsecurityafrica.com | April-June 2021

personal information management requirements for the certifications. “Suprema has been striving to strengthen the security level of not just our products and solutions but the company as a whole. We’ve expanded our security team and are running a data protection system in line with global security compliance standards, providing safe and secure solutions. I’m glad to have the ISO 27001 and 27701 certifications validate our efforts,” said Young S. Moon, the CEO of Suprema Inc.


7

Access Control

SALTO Neo electronic cylinder gains BSI Enhanced Level IoT Kitemark™

SALTO Systems, world leaders in wire-free networked, wireless, cloud, and smartphone based access control solutions, has announced that the SALTO Neo electronic cylinder is their latest product to gain the coveted BSI Enhanced Level IoT Kitemark™ certification for access control systems. Designed for doors where fitting an electronic escutcheon is not possible or required, the compact SALTO Neo Cylinder can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors, and more. It’s also available in an extensive range of models suitable for use on almost any kind of door – from Europe to ASIA to the Americas. British Standards Institution (BSI) has been part of the collaborative work to give clarity on best practices for IoT security, subsequently developing a scheme to assess connected/IoT devices. The scheme determines whether a product has the appropriate security controls for its intended use and is suitably supported throughout its intended life. This cyber/ physical security scheme forms the security element of the BSI

Kitemark for IoT/Connected products.

consumption is also reduced, further extending battery life.

The IoT is typically a network of smart devices and systems that can be connected, enabling data to be exchanged to provide services, efficiency, and innovation. Its technology can positively enhance lives and businesses, but the complexity of IoT also means that those with criminal intent may attempt to access it to steal data, hack cameras, enter buildings, or otherwise breach security.

Now IP66-rated, the SALTO Neo Cylinder is weatherresistant, making it especially suitable for outdoor use, even in the harshest of environments. Inside the tough SALTO Neo Cylinder exterior is the latest in electronic lock technology. Certified to the highest security standards, and incorporating ever-higher quality and reliability, the SALTO Neo Cylinder offers value far beyond security, however. It also provides greater control over the door by offering users access to audit trails, reports, alerts, and much more.

Like the already BSI certified SALTO XS4 One electronic lock product family, BLUEnet wireless peripherals, and SALTO controllers and readers, the SALTO Neo family of electronic cylinders had to undergo advanced security testing for vulnerabilities and security flaws in BSI’s state-ofthe-art IoT laboratory enduring BSI’s most in-depth and exacting testing and analysis. The SALTO Neo Cylinder provides an effective and convenient way of securing a building or assets. The clutch system is energy efficient, dropping power consumption to impressively low levels resulting in 100,000 / 130,000 operations from just one set of batteries. Standby power

“We’re proud that our SALTO Neo cylinder family now holds both ‘Secured by Design’ accreditation and IoT Kitemark™ status as both are increasingly important in the specification of access control systems. The award means we now exceed the market standard for a number of security products across our access range which provides SALTO customers with confidence that they are buying one of the most secure access control solutions available on the market today,” said SALTO Systems Limited MD Ramesh Gurdev.

www.safetyandsecurityafrica.com | April-June 2021


Access Control

8

DEMAND FOR INCREASED SECURITY IN MULTI TENANTED BUILDINGS Even during normal circumstances managing the security within the workplace comes with its own challenges. 2020 has been exceptional in more ways than one; the majority of employees are working from home or on flexible working hours and companies are now looking into the viability of reducing their office space and subletting space within their building. Whist this is a good opportunity for multi tenanted building owners it also comes with its own security challenges. Security risks both inside and outside the building will need to be reviewed and addressed. Considering that tenants will have different working cultures this only adds to the demand for increased security measures. With the right approach property owners can ensure a secure working environment

suitable for both their tenants and visitors. As a specialist in the automation of access control, Automatic Systems is well aware of the issues faced, especially in the light of recent events, and can offer tailored solutions that not only meet staff and visitor security needs but also the health and wellbeing of all. This guide looks at the advantages for installing access control whilst outlining the different equipment possibilities. SECURING ACCESS TO YOUR FACILITY 24/7 Having an office building open 24/7 without the need for 24 hour manned staffing not only reduces costs but is also a big advantage to the tenants. Expanding operational times mean staff and visitor attendance is more evenly distributed which in turn,

www.safetyandsecurityafrica.com | April-June 2021

greatly improves their experience and gives them the flexibility to work at their own convenience. In this health crisis all facilities with large attendees are also required to implement social distancing measures and to restrict access to a reduced number of people. By extending your opening hours these office buildings can welcome more individuals over a longer period. HOW DO I KNOW WHICH EQUIPMENT TO CHOOSE? When selecting access control equipment that is right for your office building it is important to take into account a variety of factors: • • • •

Number of staff and visitors Peak times and flow rates Desired level of security General atmosphere you would like to create


9

Access Control

DETERRENT LEVEL SECURITY – TRIPOD TURNSTILES A tripod turnstile acts as a deterrent. In addition, this access control equipment enables throughput (around up to 20 people a minute) and would work perfectly in specific areas of the building including an onsite gym. In this instance we would recommend Automatic Systems TriLane tripod turnstile. MEDIUM LEVEL SECURITY – SPEEDGATES A speedgate offers you an increased level of security. Equipped with swing or retractable glass doors, it ensures a fast and bidirectional flow of traffic. Unlike turnstiles, speedlanes can also offer a greater passage width, guaranteeing greater user comfort: for example, the lane’s width allows people with reduced mobility to access your establishment and allow maintenance teams to pass with a cleaning trolley. Moreover, this access control equipment with transparent glass can blend stylishly into any environment. Unlike the tripod turnstiles, speed gates are fitted with specialist detection cells that will stop tailgating: an alarm will sound to alert staff and the lane will remain closed, blocking entry to unauthorised users. In this instance we would recommend Automatic Systems Smartlane, SlimLane or our recently launched FirstLane speed gate. HIGH LEVEL SECURITY – Portals and Full-height turnstiles A portal or full-height turnstile offers you a very high level of security. This system is highly robust, and can often be seen in entrance lobbies or at the entrance to venues such as stadiums . Both offer bidirectional throughput and is an ideal solution if you want to open your premises 24/7 with no or reduced security staff. This equipment provides 100% automatic access control without human intervention. In this instance we would recommend Automatic Systems’ Clearlock 635 and 637, now certified to LPS 1175: Issue 8 security rating 1 to 3, approved by the Loss

Prevention Certification Board (LPCB). WHICH SYSTEMS CAN BE INTEGRATED WITH ACCESS CONTROL EQUIPMENT? If you opt to install a tripod turnstile, a security lane or a full-height turnstile at your office you will need to include an access control system (AACS), as proposed by your system integrator. Equipment from Automatic Systems is specifically designed so that it can be integrated with any form of access control system including proximity, QR and Bi ometrics. WHY CHOOSE AUTOMATIC SYSTEMS’ SAFEFLOW INTEGRATED SOLUTION?

During this present health crisis compliance with prevention rules is more important than ever in order to control the spread of COVID-19. Automatic Systems has been at the forefront of this requirement and has developed SafeFlow. This

integrated monitoring solution has the ability to take a temperature reading and check if the user is wearing a face mask. This is all done seamlessly and without personal identification. Secondly, the solution enables the counting and dynamic management of the number of people authorised at any one time. This is done by displaying a countdown on a screen and prohibiting entry when the set number of attendees is reached. SafeFlow is compatible with all of Automatic Systems’ speed gates, including FirstLane, and it’s pre-integrated into the TriLane TL1 tripod turnstile. You can even integrate the solution into existing equipment through an independent post. It is the ideal solution to protect your staff and visitors!

www.safetyandsecurityafrica.com | April-June 2021


Access Control

10

BOON EDAM LAUNCHES THE SPEEDLANE COMPACT SECURITY SPEED GATE

Royal Boon Edam International B.V., a global leader in security entrances and architectural revolving doors, announced today that they have launched the latest addition to their medium security portfolio. The ‘No-Nonsense’ Swinging Security Speed Gate With the growing threat of workplace safety coming under increasing scrutiny, more and more organisations are turning to security entrances to increase both the safety and security of people and assets. The Speedlane Compact has been designed to provide all the fundamental functions needed in a security speed gate. Nothing more, nothing less. This is uncomplicated, premium, advanced security – realised from a general industry need for a quality, straightforward security entrance solution. In addition, current developments surrounding the corona pandemic are causing companies to increasingly ask themselves who and when and why they may be inside a building or a specific space. Key Features • Intuitive user guidance • Tailgating, safety and object detection sensor sets, as standard • Easy installation • Generous interior space

“The Speedlane Compact uses advanced algorithms to detect tailgating, piggybacking and other forms of misuse.” • • • •

cabinet for flexible ACS integration Premium quality materials Smooth, swing motion glass barriers Short V-shaped cabinet with ergonomic design and small footprint Flexible lane configurations (including a wide lane for disabled access) Universally understood and proven display symbols

Easy, Effective and Efficient Holding back on high-level features and options means that the Speedlane Compact is easy-to-use, easy-to-install, agile in the manufacturing process; and fast to arrive at the customer’s location. When it comes to integration, the product designers have focussed on ease and flexibility. The Speedlane

www.safetyandsecurityafrica.com | April-June 2021

Compact’s wide cabinets allow for integration with many types of technology, including access control such as biometrics and facial recognition. Third-party integration is simple and collaborative technology is even more accessible. Mark de Jong, Product Manager of the Security Products Portfolio at Boon Edam said, “The Speedlane Compact uses advanced algorithms to detect tailgating, piggybacking and other forms of misuse.” He goes on to explain, “The sensors also detect objects – people carrying briefcases and trollies through the speed gate - they are recognised as such, and the product’s behaviour adapts accordingly. These same sensors also make the product 100% safe to use.” Trendy Premium Minimalist Des ign Ideal for Small Spaces The Speedlane Compact is fashioned to fit into small areas, making it ideal for highvalue real estate properties. It does an effective job within a very small space – relieving security personnel and ensuring that only authorised people can enter the designated area. Its small footprint does not compromise in any way on design.


? Civil Aviation Security Implementation

Passenger Biometric Recognition

Traveler Risk Assessment

Person of Interest Identification

Epidemic Control System

At Securiport, we leverage cutting-edge biometric technologies and advanced data analytics tools to provide authorities with the knowledge and assurance to ensure order and efficiency across transnational borders. Securiport. A global leader in border security.


Access Control

12

Ethical biometrics tools available now, education needed, Valid exec says The technology for biometric data to be ethically and responsibly handled has raced out ahead of other areas of capability, according to Valid, creating risk in the short term, but also opportunity for rapid improvement. Kevin Freiburger is Director of Identity Programs and Product Management at Valid working on identity management and biometric matching solutions for businesses and governments across the U.S. Freiburger spoke to Biometric Update in an interview about consumer data privacy, decentralized identity, and implementing ethics in the process. Valid’s customers mostly operate within the U.S., though not only do states have differing laws around biometric data usage, city municipalities

and county governments may conflict within a state too. “The way we navigate that is we’ll typically have a contract with a state and if that state allows their agency to use face recognition (or some other biometric), as long as at the state level it’s allowed, we can deploy our drivers’ license solution because it’s not a city managed program, and it’s not a county managed program. So we can implement biometric matching for a state at a state level if it is legal and regulated.” This means that any photos in the driver’s license system are stored separately to biometric matching data. If Valid’s customers do not require biometric matching, Valid will not create matching data per photo. Many, like Yuval Noah Harari, have suggested that COVIDrelated biometric data storage

www.safetyandsecurityafrica.com | April-June 2021

would be safer collected and held by an independent authority, rather than combined with other government databases. “There is a movement in the industry to go to Decentralized Identity. In other words, data won’t live in any government systems or social platforms” Freiburger says. This uses cryptography in the form of public key infrastructure (PKI) which helps to establish the identity of people, devices and services. Meaning individuals could be in charge of this data to share or distribute as and when. PKI’s have also been used in National ID schemes to support e-government services. Technology has developed at a rapid pace over the past year, but, Freiburger explains, there would still be a mismatch between technology and capability, even had this


13 development happened over several years. “COVID sped up online transactions in every sense…two things are paramount, identity and authentication,” he states. “We didn’t have the education, and the improvements and the robustness that would come with authentication and authorization over that same time period. We changed the way we do things, the technology that we have to secure those things got better but there is still a long way to go. That might be where we see people take advantage (of data) because we haven’t built out the authentication and authorization that we should have over the course of 5 years.” Interoperability is a key factor then because even in a world of decentralized identity, individuals will need to provide their data to an entity at some point, in exchange for a service. Freiburger recommends that more laws and regulations should come into play for the storing and reading of this data, should entities want to hold decentralized data in a centralized system. Then, privacy policies and informed consent remain relevant. Recently, Facebook revealed its computer vision model had been trained on millions of publicly available Instagram photos, which individuals had been unaware about — though the data usage is stated in Instagram’s privacy policy. Building in practicalities to consumer understanding is important when the product uses an individuals’ personal or biometric data, Freiburger argues.

how these can be implemented. When it comes to public reassurance on the usage of the collected data, “a lot of times our customers will do public outreach, so they might have a website and a media campaign” to explain how data will be protected, stored and instances it will not be used for, Freiburger says. “Almost all of our customers don’t have data sharing partnerships with the federal government,” and therefore supplement the legal language of online policies with public outreach or a legal campaign. Data protection and ethical data use can be expensive to upkeep. Cutting potential biases out of a system, meanwhile, varies between companies, depending on different factors. “It’s a much more nuanced conversation than just saying: there’s bias,” Freiburger explains. “With vendor A that bias could be very large and measurable, and with vendor B, almost indistinguishable. It can vary greatly. NIST is now doing testing just on the bias variability but with different vendors. Not every institution can afford the premium system, they might have to go with a lower cost system which might be coming from a vendor that has traded off security or biometric matching accuracy.” Cloud infrastructures, leveraged by providers like Valid, can play a role in mitigating some of that cost, Freiburger says.

Access Control

“A lot of the things that governments or corporations used to have to do themselves are now abstracted and done by third parties,” Freiburger says. “There are technology improvements that can lower the cost of entry for some of this to be deployed. There are still areas where the cloud isn’t going to be an option, so you still need solutions for those parts of the world, but as the world starts developing and there’s greater internet access, a lot of those costs start decreasing.” “I think the cloud is the best option we have now versus storing on premise, but decentralized identity, that’s the better long-term approach. Some standards bodies are starting to write standards around how this might look.” The Decentralized Identity Foundation, among others, are proponents of this. It is important for Valid to be able to be versatile for customers, “we have to adapt to this new world of how these identities are being consumed, think differently and collect data differently, and issue mobile drivers’ licenses in a way that are interoperable and can be verified at retailers or pharmacies (etc.).” Valid’s multifaceted work is paving the way for companies to take both environmental and social responsibility, according to Freiburger, and promoting a more ethical approach in identity and data management.

“We try to make that at the forefront of a customer conversation, we want to make sure they’re thinking about it. Data sharing agreements and data collection agreements, have to be very transparent to the end user.” Importantly, this means understanding what type of data is being collected and who any partners are who may have data sharing agreements. Valid helps customers consider

www.safetyandsecurityafrica.com | April-June 2021


Ground & Over-Water Radar

C Series

GROUND RADAR COVERAGECOMPARISON

radar Location

C20D 15 acres

C40D C40D-EXT C550C C550C-EXT C1050B 30 acres 50 acres 125 acres 170 acres 380 acres

250 x 325 m

450 x 350 m 600 x 425 m

Contact: Scott Wilson 0829094566 031 942 3853 Scott.wilson@a1fenceproducts.co.za www.a1fenceproducts.co.za www.a-1fenceproducts.co.za/Radar.php

850 x 750 m

1050 x 850 m

Protection Beyond Fences

1,400 x 1,100 m


Protecting Assets, Protecting Borders,

Fence & Fence-abilty

COMPACT RADAR SECURITY? PROTECTION BEYOND FENCES TM Existing security systems are all about protecting the fence line. SpotterRF Radars offers a pre alert about possible intrusions that may occur over the fence line and even internally. SpotterRF radars are powered with a superior target tracking algorithm capable of detecting human, vehicle, drone or animal intrusions via land, sea or air thus offering a complete package of security on all fronts. The radars also seamlessly integrate with PTZ cameras and other video surveillance systems making it very compatible and the early warning layer that was always missing.

SO WHY RADAR? WIDE COVERAGE AREA

PORTABLE

VERY LONG LIFE

Whether you are required to protect an area big or small, our radars come with a coverage range of 15 - 380 acres so it can fit into different applications. This significantly reduces the need for extra cameras and radar gives you a superb early warning security advantage.

SpotterRF Ground Surveillance Radars can come with a well-designed case which makes it easy to transport and very quick to deploy in different areas. It can be mounted on trailers for easy deployment or preset masts can be set up for the radar to be moved around.

SpotterRF radar has a Mean Time Before Failure of 90,000 hours which makes it rugged & ensures longevity. It has no moving parts so low maintenance and because of its design material it cannot rust.

CONTROL NUISANCE ALARM

DETECTS IN ANY CONDITIONS

Animals, vegetation, and weather are the most likely causes of nuisance alerts. SpotterRF Technology has the capability to adapt to its environment, to maintain high detection, and eliminate nuisance alarms. It will only cue the cameras to real threats thus eliminating nuisance alarms.

No issues with direct sunlight, reflections, rain, hail, snow, mist, Sea spray, or dust. So where other Detection and monitoring systems have weaknesses, radar will keep on tracking, giving you ultimate security.

Coupled with a good PTZ your security protection now covers a larger area, tracking, recording, and seeing where the intruders came from and are hiding. With quick installation, very little maintenance, and no down time, SpotterRF is becoming a much-needed defense tool in your security layers. With the superb AI any new nuisance alarms that appear can easily be removed with training the system. With multiple tracking of 20 targets you will not miss anyone, and your camera can be set to monitor the nearest, newest, fastest threat or particular zones whichever way you choose to set it up. For a site demo we can set up mock radars on a Google map to show the coverage and positioning to best suit the client. These can show exclusion zones and alarm zones giving the client a good idea of the power of the system.

Contact: Scott Wilson About A-1 Fence 0829094566 We are an international fence manufacturing company with global representation. 031 942 3853 Our strength is our ability to offer internationally accredited fencing products from Scott.wilson@a1fenceproducts.co.za borders to domestic applications. NB: We do not install, we are suppliers only, www.a1fenceproducts.co.za www.a-1fenceproducts.co.za/Radar.php


Access Control

16

Precise Biometrics and Qualcomm in-display fingerprint scanning deployed in 5G smartphones A pair of new smartphone models have been introduced with in-display fingerprint biometrics, while a developer preview and a newly published patent application seem to hint at future plans for flagship smartphones from tech giants to feature the technology. Precise Biometrics’ technology has been implemented to the Meizu 18 and 18 Pro 5G smartphones for ultrasonic fingerprinting through a partnership with Qualcomm. The company announced its cooperation with Qualcomm on its new ultrasound sensors, the 3D Sonic Sensor Gen 2, which reads the user’s fingerprint biometrics through an AMOLED screen. The partnership between Precise Biometrics and Qualcomm to run the sensors on Precise’ BioMatch Mobile was announced just weeks ago. Android 12 under-screen fingerprint support refers specifically to Google devices The second Developer Preview of the forthcoming Android 12 suggests a future Google Pixel smartphone will feature an in-display fingerprint biometric sensor, according to XDA Developers. The revelation comes from an examination of the

SystemUIGoogle app, which includes a new class for “UdfpsControllerGoogle.” The publication says “Udfps” refers to an under-display fingerprint scanner. Speculation about the inclusion of in-display fingerprint biometrics in the Google Pixel 6, which is expected to be introduced later in 2021, was also sparked by the first Android 12 Developer Preview, based on a code string found amongst its settings for multi-biometric enrollment. Classes related to in-display biometric sensors were also included in the first preview, but XDA Developers suggests they could easily have been a way to add native support for the technology to the opensource version used by other manufacturers. The difference now is that the classes are included in the com.google.android.systemui path, rather than just the generic path, possibly indicating their use on a Pixel device. The report also notes that as fingerprint swipe gestures are not supported by underdisplay scanners, Android 12 also replaces the ‘swipe fingerprint for notifications’ gesture with ‘swipe for notifications.’

www.safetyandsecurityafrica.com | April-June 2021

Angled light subject of Apple’s latest in-display biometrics patent The latest published patent filing from Apple for in-display fingerprint technology depicts a system for using angled light to improve the contrast and signal-to-noise ratio of an optical biometric sensor. The application for ‘underdisplay fingerprint sensing based on off-axis angular light’ was originally filed with the U.S. Patent and Trademark Office last August, and describes active red-green-blue (RGB) pixels emitting light to illuminate the finger being printed on the display. The insertion of an optical grating layer which bends the reflected light to create oblique rays, and then another optical layer to “rebend” them straight again to be collimated for the sensor. The grating layer, Apple says, would be made up of Fresnel prisms, and the filing mentions the angle of the coupling layer would be about 42 degrees. Analysts have been chiming in with predictions that the next iPhone will have in-display fingerprint biometrics, most recently one from Barclays.


Access Control

18

Contactless Access Control with Paxton10 Paxton’s CEO, Adam Stroud, discusses how access control and contactless technology can future proof the security of a building by utilising smart devices with free Bluetooth® smart credentials. What motivated Paxton to develop the new Paxton10 platform? We have been making access control systems for over 30 years. Over the last decade we have seen a clear desire for customers to have a single point of management for their security systems, which includes access control, video surveillance and alarm systems. Traditionally this has been achieved by integrating different products together, but unfortunately integrating systems is complicated. We believe that simple installation and a good user experience are key to value and effectiveness. This is exactly what inspired us to create Paxton10, a single combined platform that allows the

seamless installation and simple management of access control and video surveillance. In your opinion what are the benefits of contactless access control? Access control is there to do a job; to keep unauthorised people out of a building or specific area. The rest of the time, we do not want to notice it; so, the more convenient we can make passing through an access point whilst maintaining security, the better for the end-user and system managers. This is what makes contactless access control so important, and why it was imperative that we make it simple to achieve with a Paxton10 system. With free Bluetooth smart credentials an authorised person can pass through an access control point without any contact required, therefore hardly noticing the process. A perfect ergonomic experience.

www.safetyandsecurityafrica.com | April-June 2021

Why is it important to include free smart credentials in Paxton10? It comes back to a recurring theme we have at Paxton, simplicity. In truth, there is very little cost associated with the production and distribution of smart credentials, as unlike a physical RFID token, they are purely virtual. This gives us an opportunity to make Paxton10 a system that offers excellent value and provides a great user experience. Removing the need to register for payments allows the setup and management process to be greatly simplified whilst maintaining a high level of security. A Paxton10 administrator can create and issue a smart credential within seconds, with no on-going costs to budget for as the site expands or users come and go. What steps have you taken to secure personal data linked to smart credentials? We access and store zero personal data. There are some


19

cloud security checks to ensure that smart credentials cannot be cloned or copied, however all this is done completely anonymously. How can the update to the Paxton Key help address the ongoing challenges that have arisen because of the current pandemic? Paxton Key is the application that hosts the Bluetooth smart credentials for Paxton10. The latest update provides more contactless functionality, including the ability to access a Paxton10 controlled door without ever taking your smartphone out of your pocket. With these improvements, the most obvious benefit is that by using contactless identification you can cut down on common touch points and therefore reduce the spread of germs. However, it goes much further than that.

Paxton Key is an important tool to help in the pandemic as it makes the implementation of access control systems quick and simple for new sites looking for a solution to help. This allows building managers and end-users to benefit from all the advantages an access control system can bring in this situation, such as: •

• •

Access Control

media channels for more updates. Paxton is currently offering virtual training to help install and manage Paxton10. You can find out more on the Paxton training page. Additionally, can find out more about the free Bluetooth smart credentials for Paxton10 on the Paxton Key page.

Ensuring people stay within their permitted areas to cut down on virus transmission Controlling the maximum people density to assist with social distancing Making sure that only approved people can enter the building

What is next for Paxton10? There are exciting plans for Paxton10 coming this Spring. However, our Development team would not be very happy if I talked about it just yet. Keep an eye on the Paxton website and our social

www.safetyandsecurityafrica.com | April-June 2021


Access Control

20

FLIR Systems Announces Upgraded FLIR identiFINDER R440 New High-Performance Detectors and Advanced Algorithms Identify Radioactive Threats Faster and from Farther Away FLIR Systems, Inc. (NASDAQ: FLIR) has announced the launch of the upgraded FLIR identiFINDER® R440, the nextgeneration of its field-trusted premium handheld radiation detection system. The new identiFINDER R440 delivers dramatically improved resolution and sensitivity, so operators can identify and respond to radiological threats faster and with greater accuracy. The R440 now includes two powerful detector options. A high-resolution Lanthanum Bromide (LaBr) variant delivers up to two-and-a-half times the resolution of the earlier R400 model, while an exotic, new material called ‘CLLBC’ enables up to six times the neutron sensitivity and higher gamma performance than standard Sodium Iodide (NaI). A new spectroscopic algorithm, flexible power management, and industryleading communication options on the R440 will enable operators to safely locate and measure radioactive sources with confidence. “The newly advanced identiFINDER R440 provides uniquely accurate radiological performance for customers’ most demanding missions,” said Dr. David Cullin, vice president in the Sensor Systems business at FLIR. “The rugged R440 builds on the R400’s legacy. Combined with new power upgrades, the system will allow users from the

“With more than 40,000 devices deployed worldwide, users have come to trust the precision and reliability of FLIR identiFINDER handheld devices as a powerful tool in combating deadly threats,” military, homeland security, public safety agencies, and commercial entities to operate in harsh environments for longer periods. “With more than 40,000 devices deployed worldwide, users have come to trust the precision and reliability of FLIR identiFINDER handheld devices as a powerful tool in combating deadly threats,” Cullin added. When threat detection occurs, rapidly communicating results is critical. Remote data viewing, operation, and reach-back is made possible on the R440 through communication features including the FLIR RAD Mobile App, the company’s trusted web interface, and a universal API that enables integration with user-deployed networks such as the Mobile Field Kit, ATAK, Sigma Edge, Safe Environment Gateway, and more. The identiFINDER R440

www.safetyandsecurityafrica.com | April-June 2021

also has built-in Wi-Fi, Bluetooth, and GPS technology. Single-hand operation via three-button control is a familiar interface for existing identiFINDER users, simplifying deployment and training requirements. The R440 features improved ruggedization, including enhanced drop protection in accordance with ANSI 42.34 standards, as well as dust and water ingress protection at the IP-67 level. With hotswappable 7-hour lithium-ion batteries and AA-battery power option, the system can operate continuously for even the longest missions. FLIR unveiled the identiFINDER R440 at the CBRNE Convergence virtual trade show and conference. The new FLIR identiFINDER R440 is available for order now and is shipping immediately. To learn more, visit http://www.flir.com/ r440. About FLIR Systems, Inc. Founded in 1978, FLIR Systems is a world-leading technology company focused on intelligent sensing solutions for defense and industrial applications. Our vision is to be “The World’s Sixth Sense,” creating and advancing technologies to help professionals make better, faster decisions that save lives and livelihoods. For more information, please visit www.flir.com and follow @flir.


Your Global Distributor Partner SOLUTION OFFERINGS Video Management Systems Surveillance Solutions Thermal Solutions License Detection Recognition Fire Detection Solutions PA & Evacuation Solutions PA & Evacuation Solutions Perimeter Protection Solutions Physical Xtra-Barrier Solutions Smart Barrier Solutions XtraNet Networking Solutions Access Control Solutions Alarm Intrusion Solutions Support Services Facebook: Facebook.com_xtravisionptyltd Linkedin: linkedin.com_xtravision

www.xtravision.co.za


Fire Prevention

22

TLX Technologies – Liquid Level Sensor for fire-suppression systems

Fire-suppression systems are critical for keeping people and assets safe from fire hazard. Some fire-suppression systems utilise high-pressure sprinkler systems to extinguish a fire, such as in hotels and office buildings. However, because water can irreparably damage critical assets, gaseous systems that starve a fire of oxygen are often employed by places such as libraries, data centres, art galleries and many manufacturing facilities. The suppressive agent utilised by these gaseous systems is stored in liquid form in a pressurised tank. When the system activates, an actuator releases the agent into the protected area. This smothers the fire by reducing the heat or oxygen content to the point where combustion is no longer possible. These fire-suppression systems must be supplied with the appropriate amount of suppressive agent to be effective. If the system is not charged with the correct amount of suppressive agent, it may fail to extinguish a fire. Therefore, periodically checking the amount of suppressive agent in the firesuppression system’s storage tanks is critical to ensuring the system operates correctly at the critical moment. How to best measure the amount of agent in a storage tank is not as

simple as it might seem. Installing a simple float similar to what is found in an automobile fuel tank is an inadequate solution. A simple float lacks the sensitivity for accurate readings and is negatively influenced by tank pressure. If the amount of agent is too low, even by just a small margin, the system may be unable to release enough agent to extinguish a fire in a given size room. Therefore, several different systems are currently being used to ensure a precise measurement of the level of suppressive agent in these storage tanks. One system requires weighing the fluid in the tank. Subtracting the known weight of the tank from the total weight will provide the weight of the suppressive agent. This process can be time consuming and dangerous for technicians because the tank needs to be removed from the fire-suppression system, posing a risk of injury. Removing the tank also temporarily disables the firesuppression system and increases the risk of an accidentally discharging the suppressant agent. Dip-tape measuring is another method used to determine the fluid level in a tank. This is similar to checking the oil level in a vehicle. A measuring tape is pulled up out of the tank through a brass or stainless-steel tube until it engages with a magnetic float that is

www.safetyandsecurityafrica.com | April-June 2021

mounted alongside the tube inside the tank. The technician reads the liquid level on the tape and then converts the measurement to weight using a conversion chart. This method is prone to error because the technician must consider several different factors when making the conversion. Temperature must be part of the technician’s calculations to account for thermal expansion of the suppressant agent, and the resolution of the chart must also be considered. Any error in temperature reading or interpreting the measurement of the dip tape may result in an inaccurate fluid-level reading. Ultrasonic technology has also been pressed into service. An ultrasonic device is placed on the outside of the tank at various levels and then calibrated. Then the device is moved up and down the tank until the fluid level is detected and shown on a display on the device. This solution might seem ideal, but correctly calibrating the device is necessary each time a reading is taken. Once the fluid level is determined, the technician must still take a height measurement to accurately determine the weight of the suppressant agent in the tank, introducing an additional potential source of error. Weighing the tank is accurate, but it is also time consuming and


23 potentially dangerous for technicians. It may also require the fire-suppression system to be temporarily disabled during the weighing process. The dip tape and ultrasonic systems are safer for the technician because they do not require removal of the tank from the fire-suppression system, and the fire-suppression system need not be disabled to take a reading. However, they may not deliver consistently accurate measurements. A better solution is desirable. The best solution would deliver consistently accurate readings without needing to remove the tank from the firesuppression system. High resolution, thermally compensated liquid level measurement on digital display. TLX Technologies has developed a system that would safely, consistently and accurately measure tank fluid levels without the need to temporarily disable the fire-suppression system or require technicians to interpret and convert measurements. The result of this work is the Liquid Level Sensor.

suppression system’s storage tanks is crucial to ensuring that the system will operate properly. Extant systems for measuring the level of agent in a system’s storage tanks can expose technicians to safety hazards and are prone to inaccurate readings due to human error. The Liquid Level Sensor developed by TLX Technologies is safer and more accurate than other systems currently on the market.

Filling CO2 cartridges and bottles up to 50 kg For CO2 in medium and low pressure tanks. Filling capacity from 2,4 kg to 15 kg/min. CO2 Filling Machines Faster and more effectively.

The Liquid Level Sensor satisfies all requirements. It provides consistently accurate thermally compensated weight readings that are not subject to interpretation by the technician, without disabling the firesuppression system.

g n i l l i CO Fchines Mas 2

We

fast r job, u o y do

d er an

vely.

ti effec e r o m

CFA 5

CFA 2

Like the measuring-tape system, the Liquid Level Sensor uses a sealed tube with a magnetic float mounted on the outside of the tube. This tube is installed in the tank prior to being filled with the suppressant agent. Instead of using a measuring tape to engage with the magnetic float, there is another magnetic float inside the tube that interlocks with the float outside the tube, providing an accurate measurement of the fluid level inside the tank. At the end of the tube at the top of the tank is a sensor that registers the position of the float. The sensor sends float position data, as well as temperature data, to a microcontroller, which is preprogrammed with a conversion table for that specific tank and suppressant agent configuration. The conversion table data is automatically displayed as weight on a digital display. The technician does not need to read a measuring tape or make any calculations. A simple press of a button correctly displays the amount of fluid in the tank.

Fire Prevention

Brandschutztechnik Müller GmbH | 34289 Zierenberg | Germany +49 (0) 5606-5182 50 | export@muellergermany.com

www.muellergermany.com

Maintaining the correct level of suppressive agent in a fire126x185 mm_ENG.indd 4

03.03.21 14:10

www.safetyandsecurityafrica.com | April-June 2021


Fire Prevention

24

Lithium X from Bavaria Firefighting – Effectively extinguish almost all types of metal fires

Without a question, since the first commercial lithium battery was introduced to the market in 1991, there has been wider usage of these batteries in all types of commercial products. The peak was reached in 2019 as the two researchers were given the Nobel Prize for the development of the lithium batteries. Still, lithium-ion batteries, which are capable of a high energy density in the smallest storage cells are not only a blessing but could also be a great danger. The widespread use of these batteries in an enormous range of work and leisure equipment, such as laptops, smartphones, small and bigger construction equipment, e-bikes and rollers, can potentially cause fires and even explosions, thanks to the built-in lithium batteries. An even bigger danger is presented by the bigger escooters, e-cars or even production machinery powered by lithium batteries. As it is known, these fires have some really unique features that originate from the unique makeup of these batteries. The lithium batteries not only have different cells, which means that each and every one of them could potentially become the source of an ignition or

even a re-ignition, but there are different chemical reactions happening within the battery, which could also fuel the fire. Let alone the fact that the heat produced is extremely high compared to ‘casual fires’. These three facts – line of cells with possible re-ignition, the chemical reaction and the intensive heat development – make it extremely hard to fight these types of fires. BAVARIA WaterGlue. This is, however, not the first challenge to be tackled by the 1923-founded company Bavaria. As our customers of many decades already know, we always have the right answer to any challenge within the field of firefighting. Using the knowledge of almost 100 years of experience, we are more than pleased to introduce not one but at least two possible solutions, which could be a massive help for anyone facing lithium fires. One solution, Lithium X, comes with the well-known Bavaria valve, which combines the functionality, effectiveness and ease of maintenance of the stored pressure extinguisher. The agent used for this model is not only suitable for lithium fires but can also be used for any metal fires in the D class. Through the

www.safetyandsecurityafrica.com | April-June 2021

heat of lithium metal fires the small vermiculite crystals, added to the agent, melt and build up an impermeable layer on the battery. This isolates the fire and also cools it down by blocking oxygen from the burning material and also keeping the flames underneath this layer from the burning material as well (important in case of a possible re-ignition). Throughout the cool-down effect, the layer already covered can be transported away. The other solution is a waterbased gel, the so-called WaterGlue series. This series is based on the six start model Magnum, which has been sold for decades and has been enormously successful. This geltype agent can not only be used for batteries and A-class fires but can also be used as a preventive solution. The already proportionally mixed gel adheres smoothly to vertical and even extremely smooth surfaces. The result is high heat extraction and an atmospheric oxygen graduation so that the object is protected from heat radiation and inflammation. For more information, go to www.bavariafirefighting.com


Safe in our hands

Life Safety solutions with leading installation support and training services From early warning through to FIRE detection and suppression, Kentec Electronics is a world-leading manufacturer of life safety solutions, with the international standards to match. We offer unrivalled technical support to installers – ensuring that every installation realises the full benefit of our panels’ highly-sophisticated, SMART features. Everything we do is designed and manufactured to make the lives of our installers and end users easier. It’s a philosophy that’s embedded in our culture and one we call Manufacturing Expertise.

We protect you, always. +44 (0) 1322 222121 www.kentec.co.uk

TM

TM

TM

TM

TM

TM

EN-54-Part-13

BS-EN54-2, BS-EN54-4 KM 73505

10th Edition


Health & Safety

26

HOVER ARK H3 REMOTECONTROLLED LIFESAVING BUOY Anywhere there is a body of water open to the public, there are dangers of drowning. Over 372 thousands of people die from drowning each year according to UN statistics. For saving lives on the water, speed is the key factor as in most cases people died of drowning because they couldn’t get the help in time. Typically victims of drowning enters apnea in less than 2 minutes and, if not retrieved from water in 5~6 minutes, has quite high death rates. Traditional buoys are usually seen in boats and seaside facilities, but can be washed away by waves or not being able to reach the victims if they drifted to far away from the shore. Hidden objects under the water such as sunken reefs, rocks may also pose some risks to lifesavers if they have to jump into unfamiliar waters. The Hover Ark H3 of Havospark is designed to cope with these issues. It is an unmanned water life-saving device operated by wireless remote control and builtin program. To carry out rescues on water, the operator only needs to use the remote control and navigate it to the victim while staying in a safe area such as the shore, dock or boat. Running with a speed several times faster than humans swimming (max no-load speed: 23km/h on the water), the Hover Ark H3 reaches the victim and pause, allowing the victim to grasp the side handles or the beam, and wait for the operator to navigate the H3 and carry the victim back to safety. The direction control is realized through the instant differences between the power of the left and right motor on the tail.

any known water rescue product. The company is now focused in the making of water rescue and safety devices that adopt the latest drones and robotics technologies. HW-3 Line Thrower The Havospark Electromagnetic Line Thrower is the world's first line thrower that was designed based on induction electromagnetic launch technology, which can replace traditional line throwers using projectiles powered by compressed air capsules. It works by deploying a line to an otherwise inaccessible point both on land or maritime environments, such as ship-toship, ship-to-shore and mountain streams scenarios where usually

The Hover Ark H3 also has features such as smart course correction, auto return upon losing contact, and can run on both sides. It can run against, and make steady turns in the wind and rolling waves. The Hover Ark H3 was developed by Hoverstar Flight Technology Co.,Ltd., which was based in the Shenzhen, China. In the late 2010s, the founder of Hoverstar, Mr. Liu started conceiving an idea of making a device that can help drowning victims faster than

www.safetyandsecurityafrica.com | April-June 2021

ropes are needed to rescue people fallen into the water, and even on high buildings. Combining the high/low voltage pulse timing discharge control algorithm and using electromagnetic propulsion projectiles, this next generation line thrower can generate a powerful kinetic energy which allows the projectile to cover a distance of 100m in the air.


Hover Ark H3

Remote-Controlled Lifesaving Buoy Professional Water Rescue Toughness in Operation Adaptability in Different Waters

Built to save more lives

Can Work When Flipped Over

Auto Return Upon Loss of Contact

One Click Auto Return

GPS Positioning

Auto Course Correction

Withstand Rolling Waves

HW-3

ELECTROMAGNETIC LINE THROWER

Long distance throw

Safe Power Source

Wide Range of Applications

HOVERSTAR FLIGHT TECHNOLOGY CO.,LIMITED. Contact us for more product info

+86-755-33138076

info@hoverstar.com

www.havospark.com

Search Hoverstar at


Video Surveillance

28

Comm Port’s new COMMBOX adds modular versatility to ease design, installation, and integration of UVIS Deployment Simplification is unquestionably a desirable trait. We equate simplification to efficiency, clarity of purpose, and ease of usability. In the manufacturing world of commercial hardware simplification makes for good marketing spawning with such phrases as “Plug and Play”, “Off the Shelf Ready”, and the alluring “One Size Fits All”. However, in our endeavor to achieve simplification we can easily over reach and find ourselves narrowing our target market rather by not account for the diversity, unique needs, and dynamic environments which are the reality of projects in the security and defense marketplace. The balance seems to lie in the concept of Modular Versatility. Wherein the basic tenets and workings of individual “simple” hardware and singular purpose equipment modules are used in an exchangeable and interconnected manner to create a linked and flexible design capable of adaptation and expansion.

Under Vehicle Inspection Systems (UVIS) and Under Vehicle Surveillance Systems (UVSS) themselves are often modular puzzle pieces to a larger overarching security and defense system plan. As such successful deployments and designs demand that modularity be present in the native architecture as well as the

hardware itself. To that end, Comm Port Technologies Inc. has spent countless hours working with its dealers and integrators during on-site physical site installation and commissioning to gather real world data in designing its new Communications Box (COMMBOX) which is now included with every CPAS system package. The Comm Port COMMBOX is an all-weather outdoor IP67 rated steel enclosure with sun shielding, high efficiency ventilation, and preinstalled water tight cabling glands. This custom enclosure is populated from the factory with IP based I/O controllers, loop detection module, relay modules, wire distribution strips, and power supplies as per the customers’ requirements. A twin rail mounting design also leaves room for mounting extra hardware that might be needed at site which may

www.safetyandsecurityafrica.com | April-June 2021

include fiber optic RX/TX equipment, PoE injectors, twisted cable baluns, KVM extension equipment, network switches as well as other custom items a particular site installation might demand. Embracing the concept of Modular Versatility, the COMMBOX provides a key tool and essential component to not only the operation of the CPAS UVIS system but for the integration and connection to 3rd party systems and communication schemes but facilitates adaptability for the installer and end user based on their current and future needs in an every changing security environment. Whether in the manufacturing of equipment, the design and drawing stage, the creation of concept of operations, or the physical installation of systems. Modular Versatility is a proven asset in the deployment of any successful project.


Video Surveillance

32

VIVOTEK Upgrades Security at South Africa's BP Manor Garage Gas Station

Providing a safe and secure environment to drive into the lane and fuel up vehicles is a key factor in ensuring improved customer satisfaction for a gas station. To offer better service to the customer, VIVOTEK (TWSE: 3454), the global leading IP surveillance provider, has assisted BP Manor Garage Gas Station, located in Pietermaritzburg, South Africa, to upgrade their existing security system. Most of the existing cameras on-site at the BP Manor Garage Gas Station, installed about four years ago, were adequate for the customer's current requirements. The BP Manor Garage Gas Station did not want to replace most of the older cameras, meaning that retrofitting was an essential aspect of the project. However, major updates were required. Some of the older cameras were damaged because their seal had worn out, allowing water to enter. On the storage side, the user needed to retain recorded footage for four months while enabling remote viewing from a location that was about 5 kilometers away.

BP Manor already had a strong and positive history of using VIVOTEK complete IP surveillance systems, including network cameras, network video recorders (NVR) and video management software. This long-term partnership and trust ensured that the company continued to choose the same brand. A total of 50 cameras were installed, covering areas from driveways to cash points, the shop floor, pump islands, and staff rooms. VIVOTEK began the project by replacing the damaged cameras with IB9360-H and IB9388-HT. These bullet cameras deliver high-quality images and are weather-proof with an IP66 rating and vandal-proof with IK10-rated housing. In order to meet the unique demands of the gas stations, a mini fisheye camera with a 360-degree surround view can cover the shop floor, while box and fixed dome cameras cover an indoor cashpoint, and weather-proof and vandalproof bullet cameras protect outdoor driveways. The transformation also included three existing network video recorders (NVR) were replaced with a single 128 channel, 16 hot-swappable HDD bays NVR, the NR9782-v2.

www.safetyandsecurityafrica.com | April-June 2021

The whole system was connected and managed by VIVOTEK's state-of-the-art video management software VAST 2, empowering the customer to control the footage better with smart search, video analytics report, and third-party data source with Data Magnet functionality. The Data Magnet enables importing PoS data into VAST 2, providing rapid access to the recorded data while supporting the simultaneous display of sales transaction information during live streaming. The result has meant that BP Manor can continue to grow its business intelligently. Their customers can be assured of their safety and security as they return to this trusted brand, just as BP Manor has returned to VIVOTEK. "Ever since 2010, we have been supplying and installing VIVOTEK's IP surveillance system and offering them to our customers as a premium option. They provide unparalleled quality and performance. We remain loyal to the brand and can vouch for the product's durability and performance.", stated Azam Paruk, Azrea Installations, Managing Partner.


31

Video Surveillance

Hanwha Techwin launches new PTZ PLUS cameras, 65% lighter than conventional PTZ cameras.

Global security company Hanwha Techwin launches six new PTZ PLUS cameras (XNP9250/9250R/8250/8250R/ 6400/6400R) in compact and lightweight design to beef up its PTZ lineup. Together with three PTZ cameras with built-in wipers released in August 2020 (XNP-9300RW/8300RW/ 6400RW), the newly launching models comprise a diverse nine-model lineup. The new PTZ PLUS cameras deliver an optimal PTZ performance thanks to Hanwha Techwin’s proprietary chipset Wisenet7, its unique 4K 25x lens and platforms. The cameras are available in 4K/ 6MP/2MP resolutions and 25x/ 40x powerful zoom, providing the end users with a variety of choices in a lineup. The newly launching cameras are compact and up to 65% lighter than conventional PTZ cameras. This increased the

pan/tilt speed, while reducing the operator’s burden during installation. The cameras require engineers to simply match three points and twist for fastening between camera mounts. The installation convenience is also improved with a simple cable connection through a single RJ45 cable. The cameras support Wise IR technology which adjusts the angle of the camera’s IR LEDs to match the level of zoom, providing a 200m night vision. The powerful PTZ achieves a pre-set accuracy of ±0.1º, allowing the cameras to move within one second to the correct position, while precise PTZ control offers close monitoring of objects. When an event occurs in a preset area, the focus save feature ensures that a camera can rapidly come into focus so that a desired object is monitored without missing.

One of the key features of the cameras include an extended tilt range of up to 110º (Top 90º ~ bottom 20º) that ensures objects positioned above the cameras or in a sloped environment can be monitored. With the quick spin and heater installed, the first and second rounds of complete moisture removal prevent the camera lens from being blurred from moisture and external dust caused by snow and rain. A flexible bush is adopted for a single cable connection, allowing easy and powerful waterproofing. “PTZ PLUS has a new compact design which greatly enhances the user convenience and camera features. Users will take advantage of a range of new products suited for their monitoring environments.” an official at Hanwha Techwin said.

www.safetyandsecurityafrica.com | April-June 2021


Video Surveillance

32

DAHUA TO RELEASE UPGRADED IVSS WITH ADDED AI FUNCTIONS Dahua Technology is releasing the new upgrade of its intelligent server– theDahua IVSS. The Dahua Intelligent Video Surveillance Server, or simply IVSS, is positioned as a multiple intelligent algorithm server. With its strong computing power and flexibility, it offers multiple algorithm integration as well as innovative, efficient and accurate AI functions.

The Dahua IVSS is equipped with general AI functions that benefit users with optimised monitoring capabilities. Aside from its Face Recognition Blocklist Alarm, VIP Recognition and Stranger Alarm, this series now features High Frequency Alarm –a newly added function that can recognise the frequency of targets in the monitored scene. Dahua IVSS devices also supportIVS based on target type(human and vehicle), which filters out irrelevant targets such as leaves, animals, lights, etc. With its upgraded algorithm, it provides a higher detection accuracy rate and supports new functions such as Loitering Detection, Parking Detection and Crowd Gathering Estimation.

What’s more, the Video Metadata function of this equipment supports a number of attributes for human face, human body, motor vehicle and non-motor vehicle. Besides its typical Metadata Search function, the Dahua IVSS can also extract metadata from normal video recordings stored in XVR or NVR devices and subsequently run AI Search to quickly locate targets. Moreover, this upgraded series now offers Video Metadata Linkage that can trigger the alarm when the target’s metadata does not meet the preset conditions/rules. For example, if wearing a face mask is set as a rule, the alarm will be

triggered when someone who is not wearing a face mask has been detected. Based on metadata, the Dahua IVSS can also perform backend ANPR, which is a significant upgrade from the frontend ANPR usually done by cameras.

In addition to basic AI, industrial AI functions are also featured in Dahua IVSS devices. It includes Smart Video Compression that provides higher computing accuracy and can distinguish specific targets in the scene compared to traditional intelligent algorithms. With a compression ratio of 78%-99%*, this AI function significantly reduces bandwidth by up to 99%* and reduces upgrading costs. This series can also detect helmet wearing in a site through its Helmet Detection function, boasting an accuracy rate of over 95%*. Its Outdoor Parking Space Detection function provides over 94%* accuracy rate in detecting available parking spaces in an outdoor scenario. Other industrial AI functions include Fire Detection, Smoking Detection, Uniform Detection, Garbage Overflow Detection and Animal Detection. Aside from Dahua’s own algorithm, it can also run third-party algorithm through the Dahua Open Platform (DHOP), solving more pain points of customers.

www.safetyandsecurityafrica.com | April-June 2021

Moreover, the strong and scalable Computing capability of the upgraded Dahua IVSS can utilise up to 16 AI chips. For Storage and Data Security, this series allows access to up to 256 channels, provides up to 768Mbps storage bandwidth and supports RAID 0, 1, 5, 6, and 10. Its Decoding capacity is up to 24ch@1080P. It offers max. 36 splits in one window, allows up to four HDMI outputs per device with different sources and supports mouse roaming between different scenes.

Furthermore, the Dahua IVSS allows seamless AI upgrading of old systems and is compliant with ONVIF/RTSP, making it compatible with third-party cameras. By providing AI computing to VMS through SDK, it also supports integration with thirdparty VMS.


33

Video Surveillance

Hikvision releases new ColorVu offerings now with 4K and varifocal option Hikvision has applied its advanced Active Alignment (AA) Technology in the production of ColorVu cameras to bring the adjustment accuracy to within 4 pixels, even smaller than 1/30 hair diameter.

Hikvision, an IoT solution provider with video as its core competency, released new ColorVu offerings for more vivid 24/7 colorful imaging, and has first included 4K and varifocal cameras in the fullcolor range. In video security, color-related information is crucial to identifying details of events especially at night. Conventional cameras with infrared lighting only provide black and white images for night monitoring. As a result, people, vehicles, or other important objects can easily be blurry and blend into the background, which makes it difficult to distinguish critical elements. Hikvision ColorVu technology resolves this common challenge faced by many security camera users, enabling cameras to produce colorful videos even in extremely dim environments. “Since 2018 when we introduced the first generation of ColorVu cameras to the market, they have been one of our best selling products. The demand for low-light cameras continues to increase in the security industry, and we’re glad to see that our new ColorVu offerings can bring even more vivid imaging experience to our customers,” said Frank Zhang, President of International Product and Solution Center at Hikvision. Enriched ColorVu options with 4K and varifocal cameras The newly released ColorVu cameras offer enriched options to the market with

having covered both Turbo HD (DF8T series/DF3T series/DF0T series) and Network products. The enriched ColorVu series can satisfy a multitude of customer needs, from high performance products to budget friendly choices and smart solutions. Hikvision has now included 4K ColorVu cameras in its product range, which brings color imaging to ultra-high-definition levels day and night. With better image quality and richer detail, 4K ColorVu cameras can be applied across an even wider range of scenarios including stadiums, airports, harbors, and parking lots, where clear and highresolution images are necessary. In addition, Hikvision has also added varifocal cameras (the DF8T-Z series) to the new ColorVu models to create 24/7 color imaging in all focal lengths. With 2.8 - 12 mm motorized lenses, ColorVu varifocal cameras will allow users to zoom in on colorful images at night.

Meanwhile, with optimized sensors, night time color imaging of ColorVu cameras renders much more brightly than conventional cameras. A new 3D dynamic noise reduction (DNR) algorithm helps the cameras record additional remote details clearly and deliver sharper images. In addition, ColorVu cameras are equipped with a soft and warm supplemental light that illuminates to guarantee color imaging even in zero-light environments. Quick target search with AcuSense technology Most security camera users only need to focus on alarms triggered by human and vehicles, especially at night. These newly released ColorVu cameras can integrate Hikvision’s cuttingedge AcuSense technology to help users focus only on events that matter to security. Empowered by deep learning algorithms, ColorVu cameras can distinguish people and vehicles from other moving objects such as rain, leaves and animals. Alarms will only be triggered when the pre-set intrusion type takes place. With this solution, video clips are sorted by human and vehicle categories, and object classification vastly improves search

Enhanced colorful imaging with AA manufacturing technology The new released ColorVu cameras lenses have kept the F1.0 super-aperture design, allowing four times more light to enter the lens than conventional cameras (that have F2.0). Focusing high definition cameras with large F1.0 apertures is extremely technically for the industry, requiring very strict and accurate manufacturing.

www.safetyandsecurityafrica.com | April-June 2021


Video Surveillance

34

Video Surveillance: Intelligent video analytics Intelligent video surveillance connected systems have become part of the norm, so how can deep learning benefit security systems? IDIS recently launched the latest techexplainer eBook – The Benefits of Deep Learning Driven Intelligent Video Analytics. The eBook explores how a new generation of AI video solutions is delivering better security, safety, operational efficiency and business intelligence. The eBook, which can be downloaded now from the IDIS website, reflects the company’s commitment to supporting its systems integrator partners as they focus on delivering advanced video solutions into growth sectors. In recent years, the terms ‘intelligent’ and ‘artificial intelligence (AI)’ have been applied to many different types of security systems, but without agreement on what AI means, says IDIS, so it’s important to understand that not all solutions are designed to the same

standard or deliver equal value. This is despite the fact that 71% of security professionals report that AI video analytics already provides value to their operations or that they expect it to in the future, according to the IFSEC Global Video Surveillance Report 2020, which analysed feedback from over 700 security respondents globally. The new eBook explains some of the differences between conventional Binary Large OBject ‘BLOB’ analytics (found in most modern network cameras and relatively prone to false-alarm triggers caused by environmental factors) and more powerful deep learning technologies. But video analytics capability has moved considerably beyond this. Today security departments can take advantage of deep learning that leverages neural networks made up of multiple layers of

www.safetyandsecurityafrica.com | April-June 2021

algorithms and advanced processing. This is now driving what is widely accepted to mean true intelligent video analytics. Deep learning engines are ‘trained’ using vast datasets of images and video footage of people, objects, and vehicles. They can ‘look for’ size, shape, speed, and directional information, and they continue to learn while in use. To an extent, deep learning replicates the way neurons work in the brain: it can analyse and prioritise input from video data to` decide which inputs are of value, and it will notify security operatives accordingly. These newest generation AI solutions leverage neural networks made up of multiple layers of algorithms and advanced processing, and can be more accurately called ‘intelligent’ video analytics. Deep learning’s real value comes from its ability to


35

detect events of interest and distinguish these from video data input which is just ‘noise’. But some caution is still needed, warns IDIS: deep learning video solutions can still disappoint if the engines and algorithms that drive them are not fully trained and able to recognise objects reliably and accurately. By contrast, effective deep learning video analytics can deliver multiple benefits, from preventing ‘alarm overload’ in busy security control rooms, to freeing up personnel resources and enabling security provision to be better focused. Metadata search functions also allow users to benefit from advanced interrogation of single and multiple cameras, speeding up investigations and automatically locating objects or people of interest. The eBook also outlines how AI video can support efficient return-to-work strategies and ensure COVID-secure facilities and workplaces using highly accurate analytics for face mask detection, social distancing adherence, people counting, and occupancy monitoring. Guidance is also provided for systems integrators, demonstrating how the same functionality will deliver value beyond the pandemic, with benefits such as facilities and workspace optimisation, and actionable insights particularly for the retail and hospitality sectors. “The best AI offerings today add value for customers by providing useful business intelligence and rapidly increasing productivity and efficiency,” says Andrew Myung, President, IDIS America. “This new eBook explains how systems integrators can get past the jargon to support end-users, building a compelling business case that addresses both immediate priorities and demonstrates long-term return on investment.” False alarms The first section of the report details how to overcome challenges from false alarms. The 2020 IFSEC Global Video Surveillance report cited reducing false alarms as the

#1 reason for adopting AI – and for good reason. Traditional blob type analytics cameras are prone to being triggered by environmental factors, such as heavy rain, snow, or moving foliage, and struggle to distinguish a human presence, which may present a threat, from harmless animal activity. For users, this can result in time being wasted investigating the cause of alarms, and the larger the site, or more overstretched the system operator, the worse that problem can be. ‘Alarm overload’ is a common problem. Operators can quickly become desensitised by false alarms and can start missing genuine threats, or even be tempted to shut off the system. Alarm receiving centers and virtual guarding firms typically increase charges for more frequent call outs and they may even withdraw monitoring services from problematic sites until cameras are re-configured or replaced. This can result in organisations needing to draft in additional security officers, to maintain protection, or risk leaving gaps in security. Over time, many organisations find it infeasible to maintain systems that are prone to false alarms. The solution? By moving to deep learning-based analytics, customers can attain improved situational awareness, with highly accurate AI-assisted notifications for intrusion, object, loitering, and unusual event detection. Security operators will be better able to manage everyday events, and respond to more serious threats and emergencies. In short, safety and security are enhanced by better detection and verification. Unlike human brains, deep learning engines don’t get tired. They can constantly monitor multiple camera streams in search of suspicious behavior, maintaining performance levels even in the busiest scenes such as retail malls, logistics centers, higher education settings, and outdoor spaces. Relying on human operators to monitor multiple cameras means hiring enough staff to cope and

Video Surveillance

allowing for regular breaks to ensure they stay alert. Using AI-assisted notifications free-up operators from having to constantly monitor multiple camera streams and video walls. Instead, they can respond quickly and flexibly, and not just from the control room. They can configure alarms to be received to client software, and on mobile devices such as smartphones and tablets, giving the ability to verify and respond to events on the move. The future The eBook ends by expressing how the industry can adapt to future challenges and overcome current challenges. If COVID-19 has taught us anything it is that businesses need to be able to pivot and adapt quickly. Flexible and scalable AI solutions will be a popular choice, offering backward and forward compatibility, leveraging existing investments in cameras that can be used for security and safety as well as business intelligence purposes, as well as integrating with third party systems, platforms, and correlating with other data. End users will be keen to see product roadmaps that will allow them to easily add more AI-assisted analytics as they become available without incurring unpredictable increases in licensing fees. They will be keen to learn of upcoming analytics functions in the pipeline, and new tools that will allow them to combat common challenges such as slips, trips, and falls, which are ever-present workplace risks, especially in sectors such as healthcare, assisted living, retail, and manufacturing. Looking ahead, it also seems unlikely that there will be a return to former ways of doing things – for organisations or for wider society – because these have been revealed as inherently vulnerable. So, flexibility and the ability to adapt quickly will become priorities. This makes it vital for systems integrators demonstrating new AI tech to also show the true long-term value of technology that is scalable and flexible. In offering these solutions to

www.safetyandsecurityafrica.com | April-June 2021


Video Surveillance

36

customers, systems integrators now have some big opportunities to help them adapt and prosper long term. You can download the full eBook on the IDIS website to discover the full parameters of deep learning in video surveillance, from mitigating false alarms, using metadata for efficiency, discovering the full ability of business intelligence, workplace optimisation and even Covid19 solutions. Commentary: Christian Morin, CIO of Genetec As an industry, and as manufacturers in physical security, we cannot take these hacks lightly. The potential broad reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be understated. It is our responsibility and duty to users of our technology to prioritize data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems. In our recent survey, the State of Physical Security, we uncovered that only about 30% of security professional respondents were prioritizing cybersecurity initiatives in 2021. I can only hope this most recent incident acts as the wakeup call required to ensure every organization in the chain understands and acts upon the critical importance of privacy and security in the design, development, implementation and operations of physical security systems

zoom functionality to observe close-up detail of any activity. A pre-set ‘tours’ feature has added to the value of PTZ cameras, as it meant they could be programmed to scan around a field of view and to some extent, this has minimised the amount of time an operator had to concentrate on monitoring a site.

powerful hands-free tool to help operators monitor activity occurring in open environments such as airports, car parks, industrial estates, stadia and city centres.

A significant improvement in how large open areas could be efficiently monitored was achieved in 2008 when Hanwha Techwin was among the first manufacturers to introduce a PTZ dome camera with auto-tracking functionality, which could be manually activated by operators, as well as triggered by video analytics or by alarm events.

Many IT managers are being forced to take a deeper interest in their organisations’ CCTV systems, now that the technology and security installer partner capability is available to upgrade and improve CCTV systems – potentially moving them up into the cloud and exploring AI-driven video analytics capabilities which will come as standard in the next generation of CCTV systems.

However, a recent giant leap in technology has taken the effectiveness and efficiency of auto-tracking to a new level. When triggered by an alarm event, the latest generation of video surveillance cameras equipped with highly accurate Deep Learning AI based video analytics, lock onto people or vehicles potentially involved in criminal activity as they move around a camera’s field of view. No operator involvement is needed as the analytics enable a camera to operate completely autonomously, although an operator can manually take control at any time. AI based auto-tracking offers a very high level of accuracy because it is not distracted by video noise, waving trees, moving clouds or animals. In simple terms, it ignores these common causes of false alarms because it is only looking for people or vehicles. This makes it an extremely

Commentary: Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe The ability to monitor and manually track moving objects has been possible ever since the introduction of PTZ cameras several decades ago. Using a joystick, mouse or a keyboard, operators have been able to control the cameras’ pan, tilt and

www.safetyandsecurityafrica.com | April-June 2021

Commentary: Frank Crouwel, Managing Director of NW Security

We are seeing more businesses looking for help from expert partners for improvement and optimisation of CCTV systems to ensure they are getting optimal value from their existing systems. Surprisingly today, only 10% of systems are supported by an external CCTV/network video specialist installer, NW Security’s study found. Yet with so much new technology coming in so quickly; and the pressure to migrate video monitoring into the cloud growing, deeper partnerships with external experts with combined pools of IT networking, cloud migration and professional security expertise are likely to gain ground. NW Security believes that the CCTV market is undergoing a fundamental change and we plan to investigate the implications of that change in a second study later this year.


37

Video Surveillance

Seagate Unveils Lyve Cloud Built to Store, Activate, and Manage the Massive Surge in Data Seagate Technology plc (NASDAQ: STX), a world leader in data storage and management solutions, today introduced Lyve™ Cloud storag e-as-a-service platform, an S3compatible storage-only cloud. Lyve Cloud enables always-on mass capacity data storage and activation. It is designed as a simple, trusted, and efficient service allowing enterprises to unlock the value of their massive unstructured datasets. Seagate is collaborating with Equinix, the world’s digital infrastructure company, to make Lyve Cloud accessible to more customers. This collaboration will provide extensive interconnect opportunities for additional cloud services and geographical expansion. “Lyve Cloud is a natural extension of Seagate’s leadership in mass data solutions, combining our mass capacity HDD innovation with deep storage industry knowledge to help customers activate more of their valuable data,” said Ravi Naik, executive vice president, storage services, and chief information officer at Seagate. “According to Seagate’s Rethink Data report, as much as 68% of data available to enterprises goes unused. By providing a reliable and cost-efficient cloud storage solution at the metro edge, closer to where their data is generated, Lyve Cloud lets enterprises store and activate their data at scale, securely and efficiently.” By locating Lyve Cloud infrastructure in close proximity to Equinix Metal™ within Equinix International Business Exchange™ (IBX®) data centers, customers can consume the scale and efficiency of object storage as a service at the metro edge, while leveraging Equinix Fabric™ to interconnect sources of data to a variety of edge and cloud-based applications for hybrid and multicloud architectures. Placing Lyve Cloud infrastructure in metro edge

Lada, vice president, technical alliances, Commvault. “With Commvault’s seamless integration and full compatibility with Seagate Lyve Cloud, end-users now have a compelling new option for cloud storage that enables worry-free, longer term data retention with predictable cost economics and simple recovery capabilities.” colocation data centers also enables reduced latency because data is stored and processed closer to where it is generated. “We see a lot of synergy in collaborating with Seagate to help our customers increase their digital advantage,” stated Eric Schwartz, chief strategy officer of Equinix. “Leveraging Lyve Cloud and Platform Equinix, customers have an optimized, cost-effective object storage option to make their cloud truly composable. Equinix’s position at the Metro Edge enables Lyve Cloud to address use cases that demand data storage and activation, accelerating digital transformation initiatives such as disaster recovery, hybrid and multi-cloud, storage for bare metal services, AI and Machine Learning.” Lyve Cloud offers privacy, no lock-in, and no egress fees, allowing customers to retain full control of their data while lowering TCO for storing massive datasets. Lyve Cloud’s ISO27001 and SOC2 certifications meet the data security needs of enterprise customers and provide alwayson encryption for data in motion and at rest. “Enterprises are increasingly recognizing the need to store more of their business-critical data for longer periods of time, not only for business continuity, but also to harness its potential for analytics and deep learning,” said Wenceslao

“As CIO, three things I most seek for from any solution are predictability, security, and no lock-ins,” said Sudhakar Chilukuri, CIO Lattice Semiconductor. “Lyve Cloud features fit these needs very well. We don’t have to replace anything but can add Lyve Cloud for certain data workloads. It's critical to choose a cloud storage strategy that has transparent pricing, no ingress, and egress fees, and is reliable and performant.” Seagate’s Lyve Cloud and Lyve Solutions are built with mass data in mind. These solutions, including modular hardware and software, deliver a portfolio that streamlines data access, transport, and management for today’s enterprise. Lyve Cloud is offered at multiple locations in the United States and in other countries in the future. Learn more about Lyve Cloud and the complete Lyve portfolio by joining us for the Datasphere 2021 virtual event on March 30, 2021. Please register here for the event. About Seagate Technology Seagate Technology crafts the datasphere, helping to maximize humanity’s potential by innovating world-class, precision-engineered data storage and management solutions with a focus on sustainable partnerships.

www.safetyandsecurityafrica.com | April-June 2021


Perimeter Security

38

SIGHTLOGIX ANNOUNCES DUALSENSOR VIDEO ANALYTICS FOR SUPERIOR OUTDOOR INTRUDER DETECTION “Outdoor detection is the pillar on which we built our company,”

SightLogix introduces a breakthrough in outdoor security that analyzes detected targets from both thermal and visible sensors simultaneously for high detection accuracy and reduced false alarms. Dual Sensor Video Analytics (DSA) is a major step forward for making a smart video system into a reliable, 24-hour security solution. Two eyes are always better than one, especially when they can see different things. Thermal video has long been recognized as an excellent human detector because it sees in the dark and ignores

“DSA gives our customers what they value most – the best intrusion detection, day and night.” weather, shadows and reflections. At the same time, there are situations during the day where visible video can also detect with high reliability, while offering important scene details to assist analytic decision making. By comparing the activity of each independent sensor concurrently, DSA detects,

www.safetyandsecurityafrica.com | April-June 2021

rejects and validates thermal and visible activity in real-time, delivering a highly trusted security result. “Outdoor detection is the pillar on which we built our company,” said John Romanowich, president and CEO of SightLogix. “DSA gives our customers what they value most – the best intrusion detection, day and night.” Effective immediately, all SightSensor HD dual-video cameras ship with DSA technology. Existing SightSensor HDs can be updated to DSA using the latest firmware.


39

Perimeter Security

Lockdown your security In the UK many businesses are operating in very unusual circumstances with staff working remotely or not at all. This poses risks for facilities managers and business owners in securing their premises during lockdown.

have caused damage or loss? Or are you going to take a serious look at your security and invest in an Advanced Perimeter System. When it comes to perimeter security APS has a range of products from the discrete to the intimidating. Check out our product pages to see which would be right for you.

Have you conducted a new risk assessment since restrictions were imposed? Does your facilities plan consider reduced footfall in your premises? When you do consider security make sure you start from the outside in. Perimeter security is the first line of defence to ensure your property is protected against intruders and vandalism. So, what are you going to do? Lockup and leave? Rely on CCTV to capture images of vandals or intruders after they

www.safetyandsecurityafrica.com | April-June 2021


Perimeter Security

42

Perimeter Security Design Approach

When one starts to design a perimeter protection system you need to consider and evaluate the site taking cognizance of: International Best Practices The four (4) D’s in international best practices for perimeter protection systems are: Deter This prevents crime by convincing the criminal that the target is too tough. Signs which notify passersby of security measures are deterrence. So are chain-link fences topped with razor wire, or patrols cars and armed guards. Detect If deterrence does not work, a criminal may attack the target and the detection layer notifies someone that an attack is occurring. For instance, a window contact alarm notifies the security alarm company if the window is raised. Without a detect layer the crime can take place and no one is the wiser. Delay This is hardening the target with tougher materials such as property cages, security boxes, etc. A solid-core metal door and longer screws which connect the door frame to the walls is an example of delay because it will take longer to pry in than with a normal door. Adding a padlock to the inside of a gate will add a delay layer. Delay does not mean "make impossibly strong." All barriers can eventually be penetrated. Defeat Sometimes referred to as the response layer, this is what the police or security forces do --

they catch the bad guys (or more often, run them off). Compliance to Local Regulations and any sitespecific legislative requirements applicable Site classifications Regulatory restrictions Classifications National Key Point Intrinsically safe areas Chemical storage areas Hazardous waste areas No Fly zones Wireless and other communication restriction Site layout Size of site and accessibility f site Perimeter physical barriers in place Entrance and exit gates Building and obstructions on site Lighting on site Environmental influences Weather conditions Geological influences Fauna and flora influence onsite Surround properties Type of business Security systems in place Privacy concerns Consider all possible risks to your site’s protection. Existing infrastructure Power Communication Cable ways and routes Existing security systems onsite Monitoring of systems Onsite Offsite Rection to alarm Health and safety requirements and restrictions Screen and onsite indications Client Stakeholders Indication of Budget To establish the above one will need to conduct a detailed onsite survey of all existing

www.safetyandsecurityafrica.com | April-June 2021

perimeter to gather information required above. Thereafter one can start to design solution based on the following further considerations Client concerns and issues related to current system Status of current and age of current system Consideration of detailed site condition evaluation Types of technology available to offer a solution Technology performance Technology limitations Site influences onsite which may influence technology choice Integration of technology into existing system Types of perimeter security technologies being used for the protection of high security facilities. Video intrusion detection Video is used and analyzed through a Digital Signal Processor to analyze and image to determine pixel change and apply written algorithm to determine a potential threat or targets within the field of view. These systems normally consists of a number of cameras back to back with an overlap to cover dead lengths below camera, thermal and/or CCD cameras with an illumination source are normally used in this application and software management system that will alert the operator of a human target that has been detected. This system allows the operator to visually verify the cause of the alarm as well as provides additional situational awareness to make informed


43 decisions when dispatching response teams. Micro-phonic cable detection The digital micro phonic cable fence disturbance sensor will function as an electronic perimeter intrusion detector. This system is deployed on a boundary fences or physical barrier to protect the perimeter of a site. This technology, detects alarms caused by attempted cutting, climbing, or lifting of the fence structure. Seismic perimeter detection Seismic Sensor is a covert intrusion detection system designed to generate an alarm when an alarm is triggered by digging, walking or running in the vicinity of the perimeter fence. Seismic Sensors are normally buried and as a result are not easily located and avoided or tampered with. Microwave Detection Microwave sensors generate an electromagnetic (RF) field between transmitter and receiver, creating an invisible volumetric detection zone. When an intruder enters the detection zone the changes to the field are registered and an alarm. Non-Lethal Electric Fence Electric fences carry a 8 Joule pulsing electrical circuit when touched by a person or animal the voltage will deliver a shock. Should a person or animal cut, break or short the live and earth wires an alarm will be created at the local energizer. Human Radar Detection Radar offers unique advantages over other sensors for the detection of humans, such as remote operation during virtually all weather and lighting conditions. However, humans are difficult targets to detect because they have a small radar cross section and move with a low velocity. Most current radar-based human detection systems employ some type of linear-phase matched filtering as part of the detector to improve accuracy and filter environmental influences.

Operator interface and usage Onsite Remote access Failover and redundancy capabilities Anticipated life span of the system Third party system integrations Consider other systems on site which may require integration Fire PA/Evac Access Control Electric fencing Building alarm panels Radio Systems Control room facility Facility Onsite: Room layout and spacing Accessibility Is room secure Environment Correct ergonomics for operator usage Good comfortable seating Adequate lighting Temperature controlled environment Facility Offsite: Good primary and back up communication between site and remote-control room Professionally run control room Onsite equipment room facility Facility is onsite: Separate from main operator control room Temperature controlled and cooled by Air conditioner Large enough area with adequate rack space. Adequate mains supply with clean UPS backup. System operators Experience and expertise Do the operators have a good level of expertise related to video management system and technology currently installed. Are the operator’s technology savvy and have a good understanding of computers? Are the operators familiar with protocols and standard operating procedures onsite? Quantity Is the present staff complement on site adequate for both day and night shifts?

Perimeter Security

Is there currently a reaction vehicle on site? Access to remote perimeter and time to respond. Other deterrent technology’s Industrial pepper gas deployment systems Audio communication to area Remote controlled lighting XtraVision (Pty) Ltd is the leading authorized importer and distributor of a complete range of fire and security technologies : Surveillance Solutions Video Management Systems Fire Detection Solutions Mobile Barrier Solutions Physical Barrier Solutions Access Control Solutions Alarm Intrusion Solutions Perimeter Detection Solutions Our company’s product portfolio serves the entire fire and security market incorporating all verticals and we have an established reference base from the private sector to the public sector. Quality, reliability and efficiency are a key driving force in terms of the products we import and distribute. Our core business is projectbased distribution which focuses on the commercial and industrial sector and the quality of our integrations, designs and products enable us to assist the market with Perimeter solution designs. For more info contact +27 (0)11 450 1056 marketing@xtravision.co.za www.xtravision.co.za

Response

Existing Video Management System onsite, this is the heart of the system as to a large extent determine many aspects related to system design Type of technology which can be integrated

www.safetyandsecurityafrica.com | April-June 2021


Perimeter Security

40

Perimeter fence detection system - CHOOSE THE RIGHT TECHNOLOGY for perimeter security

Choose the Right Perimeter Detection System for Your Business Since there is common confusion about the different perimeter detection technologies, where they are used and the cost associated with each of them RBtec team thought it would be a great tool to clarify the differences and advantages and cases you should choose one or the other. But let’s start first with the definition of what is a perimeter security system. By Wikipedia “A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or other areas such as a home or school. Security alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.” That means that our main goal when choosing a perimeter fence detection system is to remember the goal is to detect the intruder no matter what technology you chose! Now the next step is to understand what technology meets your needs, budget, and infrastructure.

The Different Technologies 1.

Perimeter fence detection system – IRONCLAD Fence Alarm System / Micalert Vibration Sensor Cable Strain/vibration sensor cable mounted on a chain-link/ welded mesh/barbed-wire fence. Knowing if this is the right product for you is based on 3 categories: •

Length of your perimeter – Copper solutions fit mostly short to medium perimeters. In most cases, it will work best for fences up to 4km/13000ft/2.5 Miles. Where most cases are perimeters up to 600m/ 2000ft in commercial use. Budget – The copper sensor cable is the most economical way to transform your fence into a smart fence. This technology allows people who just want to add an alarm system to their fence in a simple, costeffective, and userfriendly way.

Advantages

100% coverage of the

www.safetyandsecurityafrica.com | April-June 2021

perimeter no matter the shape, the cable is flexible. A great alternative to photoelectric beams / IR sensors at the same price level, easy to install. Unlike cameras that detect only if they can see the IRONCLAD will detect in any weather or lighting conditions. Dry contact relay output – simple to connect, simple to monitor with any standard alarm system or DVR.

Perimeter fence detection system vary in design but each is generally based on the detection of an intruder attempting to cut or climb over a fence. Depending on the version selected, it can be sensitive to different frequencies or levels of noise or vibration. The system is based on a coaxial sensor cable with the controller having the ability to differentiate between signals from the cable or fence being cut, an intruder climbing the fence, someone lifting the fence, or bad weather conditions. The systems are designed to detect and analyze incoming electronic signals received from the sensor cable, and


41 then to generate alarms from signals which exceed preset conditions. The systems have adjustable electronics to permit installers to change the sensitivity of the alarm detectors to suit specific environmental conditions. The tuning of the system is usually accomplished during the commissioning of the detection devices. 2.

Infrared Sensors / Beams / Infrared Barrier These are also called motion detectors, trip sensors, line-ofsight, or “laser” sensors. Though similar to the PIR motion sensors you may use inside your home or office, they’re designed for outdoors. Usually, there are two sensors aligned with one another to form a “gate” where If someone breaks the beam, the sensors trigger an alarm. Available in wire or wireless versions, sensors are typically installed inside the perimeter and require a clear path around the fence line to create a “no-go zone.” This means nothing can be parked or stored along the fence line.

Though this technology may sound like a great way to protect your facility it has drawbacks, the main issue is false alarms. False alarms can be triggered when something disrupts the sensor “line of sight”. Since this sensor works similar to the human eye if the sensors can’t “see” they won’t be able to detect and trigger a false alarm. The false alarms can be caused when a physical object (vegetation, vehicles, dirt, animals, etc.) blocks the view or direct sunlight blinds the sensors. Even extreme temperature can affect detection distance and capability, as these are based on an infrared heat signature. Sensors also tend to require frequent maintenance. They’re usually cheaper in the short term but expensive in the long term since you need to add more and more layers to compensate for the false alarms. 3.

Cameras and Video Analytics HERE ARE FIVE REASONS WHY SECURITY CAMERAS ARE NOT ENOUGH: 1. Cameras are a forensic tool,

Perimeter Security

in most cases, you will see the video AFTER the event already ended. It does not help you stop or prevent the break-in event. 2. Usually, cameras won’t cover 100% of the perimeter, in comparison to a fence alarm system you will always have blind spots where people can come in undetected. 3. Video analytics ability to detect is heavily relying on its ability to “see”, it’s a common mistake to think it will be able to monitor the perimeter 365/24/7. If weather conditions or objects (Vehicles, solar panels, containers) will block its line of sight the camera won’t able to detect an intrusion. 4. If you currently have no outdoor security the trespasser has an opportunity to plan their attack by surveying the area from the outside without being detected. 5. Indoor security does not protect the outside of your building, nor any items, property, or machinery left outside of the alarmed zone.

www.safetyandsecurityafrica.com | April-June 2021


Perimeter Security

46

New PureTech Patent Affords More Accurate and Timely Man Overboard Detections PureTech Systems today announced the issuance of a patent by the United States Patent Office - "US Patent 10,922,552, System and Method for Man Overboard Incident Detection". Detecting man overboard events is a common problem for naval ships, cruise ships, and other large vessels. The newly awarded patent for PureTech Systems addresses some of these issues. The timely detection of man overboard events in the cruise industry and other related markets is difficult. The problem is compounded by the fact that when these events occur the timely availability of important data is missing. Accurate confirmation of the event including time of occurrence, location on the ship and location in the sea is critical, but often unavailable for hours following an occurrence, if at all. Fortunately, proactive detection systems such as the Man Overboard Detection System from PureTech Systems, can accurately detect man overboard events and provide immediate, actionable data to response personnel.

and the advancements that they have made in this field." PureTech Systems owns a total of 13 patents in a variety of solutions that include awardwinning AI Video Analytics for electronically securing perimeters around facilities, infrastructures, and borders.

In addition to providing necessary and life-saving analytics to sea vessels, the newly patented system can also be applied to bridges and other over-water structures. Key features of the system include instant video validation of the event, latitude and longitude capture and reporting, drone integration capabilities, as well as several other components. "PureTech Systems continuously invests in research and development of systems that can protect against outside threats to infrastructures, utilities, and borders", said Larry Bowe, Jr., President of PureTech Systems. "Preserving life is a driving force behind our security solutions and I'm proud of our team

www.safetyandsecurityafrica.com | April-June 2021


47

Perimeter Security

Global Cosmetics Giant Installs Fire System from Advanced at South African HQ An intelligent fire detection system from UK manufacturer, Advanced, has been installed at the South African head office of leading cosmetics manufacturer, Revlon.

Technoswitch’s 27.5V DC boxed power supplies were customised for the specific site requirements, providing battery backup for the optical beam detectors.

Situated in South Africa’s Gauteng province, Revlon’s headquarters comprises of an administration building, warehousing facility and manufacturing plant. With area usage varying across this large-scale site, the end user required that there be immediate identification of the location of any alarm activations An intelligent fire detection system that uses each device’s unique address to automatically identify the location of the alarm condition was therefore specified.

With the communication of any emergency notifications on the fire detection network needing to be relayed to the responsible staff on site, the end user also required a GS-22 SMS Communicator to be integrated with the fire system. The Communicator provides a cost-effective solution to transmitting emergency signals from the fire panel’s fire and fault relays to a mobile device – with instant notification of any issues being sent in seconds across this large-scale

Advanced’s longterm partner, Technoswitch, supplied the equipment to Brakpan-based fire detection and suppression installers, JMN Projects, who were appointed to design and install the fire detection system.

Brett Birch, General Manager at Technoswitch, said: “Advanced products are our first choice whenever we need to specify a fire detection system, so obviously we did so again when asked to propose a system for Revlon’s head office. Advanced panels are exceptionally well made, and they offer an unrivalled reliability record. They’re also simple to program and configure, plus the aftersales support is excellent.” The 1-loop MxPro 5 fire panel from Advanced was installed alongside eight Fire Beam reflective optical beam detectors, 32 Apollo optical detectors, eight Discovery manual call points, and 10 Apollo sounder beacons.

The MxPro 5 is the unbeatable multiprotocol fire system. Approved to EN54-2, 4 and 13, it offers four protocols, Apollo, Argus, Hochiki and Nittan and a completely open installer network that benefits from free training and technical support. Panels can be used in singleloop, single-panel format or easily configured into highspeed networks of up to 200panels covering huge areas. MxPro 5 panels are backwards compatible with existing MxPro 4 networks and include a host of features including AlarmCalm for complete false alarm management and reduction. Advanced, owned by FTSE 100 company Halma PLC, protects a wide range of prestigious and high-profile sites across the globe – from London’s Shard to Abu Dhabi International Airport and Egypt’s Cairo Tower. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.

site. Steve Carroll, General Manager for the Middle East at Advanced, said: “Where production and commercial activity run side-by-side, Advanced’s ease of installation and configuration make tailoring specific protection to individual buildings, areas or floors, effortless. The robust and proven technology of Advanced fire systems give our customers peace of mind that their staff and property are well protected, so they can concentrate on running their business.”

Advanced is a world leader in the development and manufacture of intelligent fire systems. Advanced’s reputation for performance, quality and ease of use see its products specified in locations around the world, from singlepanel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multiprotocol fire panels, extinguishing control, fire paging,false alarm management and reduction solutions as well as emergency lighting.

www.safetyandsecurityafrica.com | April-June 2021


Perimeter Security

48

MotionProtect Outdoor — wireless outdoor motion detector with an advanced anti-masking system and pet-immunity MotionProtect Outdoor by Ajax Systems is a motion outdoor detector with a two-phase algorithm for protection against false triggering, pet immunity, and an advanced anti-masking system. The most reliable solution for professional monitoring of areas. Two-step algorithm for false alarm prevention A street is always in action: the wind sways leaves and bushes warmed by the sun, animals and birds move around, various insects land on the body of the detector. This diversity of flora and fauna creates a constant barrage of noise that makes it hard for outdoor motion detectors to spot the real threat, humans. Ajax Systems solved this problem both on software and hardware levels by implementing two PIR sensors and developing a unique two-step algorithm for signal analysis, LISA. Whenever MotionProtect Outdoor detects motion, LISA analyses and compares signal forms from two sensors in real-time. If forms are similar, the alarm is raised. Intelligent anti-masking system An outdoor detector is an easy target. During the day when the system is disarmed, intruders may damage the sensors or block their view to gain an advantage in trespassing at night. To prevent

cases of sabotage, Ajax Systems equipped MotionProtect Outdoor with a tamper button and an advanced anti-masking system that can remain active 24/7. The anti-masking system in MotionProtect Outdoor calibrates automatically by analyzing the surrounding area when mounting the device onto SmartBracket. Then, if an obstacle appears in the field of view of anti-masking sensors or if they are painted, the detector quickly notices sabotage and raises the alarm. Moreover, a sensitive tamper is immediately activated if someone attempts to dismount the detector from SmartBracket. Guaranteed alarm delivery Ajax Systems have developed the Jeweller radio protocol to ensure the uninterrupted operation of all devices within the security system. The Jeweller provides two-way communication between the hub and MotionProtect Outdoor at a distance of up to 1,700 meters and delivers alarms in less than 0.15 seconds. The radio protocol uses time frames to synchronize communication of connected devices, authentication to eliminate forgery, and encryption to protect against data leaks. Moreover, Jeweller is energy efficient and allows detectors to operate for years from pre-installed batteries.

www.safetyandsecurityafrica.com | April-June 2021

Ready for heat and cold Ajax security systems protect users in all climate zones, from South Africa to Greenland. Heat or cold, snow or rain — MotionProtect Outdoor is ready to operate in any weather. The outdoor detector resists the heat up to +60°С, withstands the cold up to -25°С, and works up to 5 years from pre-installed batteries. Also, the Hood for MotionProtect Outdoor protects sensors of the anti-masking system from rain and snow. About the manufacturer Ajax Systems is a European manufacturer of professional security systems with smart home capabilities. The company was established in 2011 by Aleksandr Konotopskyi. Today, Ajax smart alarm reliably protects over 830 000 people in 120 countries across the globe from burglary, fire, and flood, and is recognized as the most award-winning wireless security system in Europe. Contacts www.ajax.systems hello@ajax.systems


Perimeter Security

50

AGIL Fence completes integration with Milestone XProtect 2020 R2

AGIL Fence Perimeter Intrusion Detection System (PIDS) has completed its integration with the Milestone XProtect 2020 R2 via the AGIL Fence Integrated Perimeter Alarm Management System (iPAMS). This integration provides a unified platform for advanced alarm monitoring and intrusion detection.

users on the mobile servers, ideal for larger organisations and premises.

The AGIL Fence iPAMS serves as a gateway that allows the PIDS sensors to integrate into the video management software. Through the AGIL Fence iPAMS, the alarm signals from the sensors are converted from data into actionable insights and then displayed on the Milestone XProtect client interface. End-users can achieve complete situational awareness of the perimeter on a single platform without being on the field.

ST Engineering is a global technology, defence and engineering Group specialising in the aerospace, electronics, land systems and marine sectors. With more than 700 smart city projects across 130 cities, the Group continues to transform cities through its suite of Smart Mobility, Smart

AGIL Fence Integrated Perimeter Alarm Management System on Milestone Marketplace. *****

This integration allows remote monitoring of the entire perimeter, as well as all perimeter areas across multiple sites. The unified platform provides security operators with an overview of the premise with seamless direct streaming on both the web client and mobile servers. The Milestone XProtect R2 is capable of handling more

www.safetyandsecurityafrica.com | April-June 2021

Security and Smart Environment solutions. Riding on the innovation-driven AGIL Fence suite of intrusion detection solutions and our team of experts, we know what it takes to deliver unparalleled perimeter protection. AGIL Fence systems have been tested for use in airports and critical infrastructure including substations, military sites, correctional facilities and other high-security sites across the world. AGIL Fence, your trusted partner in securing key installations.


For over three decades Altronix has earned its global reputation for the highest quality and reliability, offering exceptional power and data transmission solutions engineered and manufactured exclusively in the USA – all backed by the best customer support and our unique lifetime warranty. And we’re stronger than ever. As we continue to grow and the industry evolves, rest assured you can always trust your security to Altronix.

MANUFACTURED IN THE U.S.A. | NDAA AND TAA COMPLIANT | LIFETIME WARRANTY | ALTRONIX.COM


Perimeter Security

48

Winter safeguards for outdoor sensors Winter is arriving in our Northern hemisphere and if you are using OPTEX intrusion sensors, you are in good hands, as they are designed to perform in all weather conditions. To keep the performance to its maximum, here are some key housekeeping tips.

sensor’s DQ circuit is physically or wirelessly connected to the panel. If the sensor can’t emit its signal properly due to extremely bad weather conditions, the alarm panel will be alerted. Depending on the level of risk, a backup system can be put in place to take over temporally.

Detector lens

The DQ circuit is featured in our REDSCAN Series, SL series and AX series (AX-100/200TF).

power on the power supply. For the pre-built beam towers, a thermostat is fitted and will only action the heater when needed. To test it is all working properly, use the Thermostat test switch. •

If the lens of any of our sensors are soiled or dirty, it may affect their performance. The cleaner the lens, the better the performance. If there is mud or dirt on your OPTEX sensor’s lens, it should be cleaned. The best way to clean it is with a soft cloth and water, or with antistatic foam cleaner. Detergents shouldn’t be used as they can deteriorate the quality of the lens. DQ circuit for our active detection devices Our active infrared beams and LiDAR’s both use active detection technology, constantly emitting a signal. In some instances, the quality of the signal emission can be altered by thick fog, or a snowstorm. To be alerted of the lower performance of the sensors during that time, it is important to utilise the environment disqualification circuit or DQ circuit. If the intrusion system is using an alarm panel, ensure the

Heaters To offer best performance even with very low temperatures, several of our sensors feature an integrated heater. This is the case of our REDSCAN RLS-3060SH and RLS2020S; and our pre-built beam towers. For our infrared beams and our long range PIRS the SIP series, heaters can be purchased as accessory.

Snow Shield for SIPs Another accessory that could be useful for the winter (and summer) time is to install a metallic hood on top of the SIPs to avoid snow to accumulate on the PIRL. •

Heaters for IR beams The HU-3 heater will suit all our hardwired beam models, from AX series to SL series. Wireless beams can’t use heaters due to current consumption constraints on the batteries. When installed the heater will be always on. The best way to check that the heaters are working properly before the temperature plummets is to check the

www.safetyandsecurityafrica.com | April-June 2021

Heaters for the SIP series The SIP-HU is the heater that will work for all our SIP models. Once installed, it will be on constantly. Similarly to the IR beams, you can check the heater is working by checking the current.

SIP Mini-hood: for the SIP3020/404/4010 series and SIP-3020/404/4010-IP-Box SIP Mid-hood: for the SIP5010/100 and SIP5010/100IP-box

In summary, winter checks are simple. Check the cleanliness of the lens for all your sensors. If your sensor has got a heater, best to test it. For active detectors, the DQ circuit will alert you if the sensors are affected by the weather conditions.


53

Perimeter Security

Perimeter security in a perimeterless era Help AG looks at the challenges for organisations looking to secure their perimeter

organisations need to embrace Zero Trust and security at the edge to stay protected.

The global shift to remote work due to the pandemic will not be a short-term phenomenon; it will continue in a significant capacity, outlasting the pandemic, as it has been proven that we can successfully work from home without affecting business productivity. This paradigm shift has led to security concerns for organisations. As more and more employees work from beyond the perimeters of the office, the attack surface of companies continues to expand, and remote assets are becoming more challenging to manage. How can organisations remain secure in an increasingly perimeter-less world?

Zero Trust Network Access (ZTNA) augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate securely. Moath Alrawashdeh, Systems Engineer at Fortinet Middle East, elaborated on the importance of deploying security-driven networking by dropping legacy wide area network (WAN) infrastructure for self-healing SD-WAN, explaining that secure SD-WAN provides flexible security, improved user experience, and simplified WAN operations.

To answer this question, Help AG brought together cybersecurity experts from some of the most innovative vendors in the industry. At the first Security Spotlight Forum for 2021, the experts shed light on the different methods and technologies organisations can utilise to secure their endpoints and networks as the perimeter becomes blurrier. Two overarching themes emerged during the forum: the importance of making Zero Trust and Secure Access Service Edge (SASE) integral to the organisation’s cybersecurity strategy and upgrading visibility into networks and endpoints with advanced threat intelligence powered by artificial intelligence and machine learning. Nicolai Solling, Chief Technology Officer at Help AG, said at the forum that the prevalence of distributed workforces means that an organisation’s perimeter infrastructure must cover not only the headquarters but also branch offices, remote users, mobile devices, services and apps in the cloud, and any other assets that exist beyond the traditional data center. The castle-and-moat approach is no longer sufficient, and

Secure Access Service Edge (SASE) is another piece of the cybersecurity puzzle in this perimeter-less era. SASE is an emerging framework for the convergence of networking and network security services within a global cloud-based platform. Its benefits include, but are not limited to, zero trust network access, data and threat protection, better performance with reduced complexity, cost efficiency, and improved flexibility. Visibility is also key to securing an organisation’s many endpoints and networks, according to Roland Daccache, Sales Engineering Manager – MEA at CrowdStrike. He explained that because cyberattacks have become much more sophisticated, modern solutions need to combine threat intelligence and telemetry to prevent them from recurring. To drill down on the activities of malicious actors, you need to cross-check the meta-data from your network against high-fidelity intelligence feeds and capabilities to recognise unusual behavior.

can be used to drastically improve visibility and prevent threats from turning into breaches. AI-driven network detection and response (NDR) can increase the visibility of actual threats by 197%, reduce alerts by 85%, and reduce mean time to remediation (MTTR) from 60 days to only 4 hours, making it a crucial component.

Jamie Collier, Cyber Threat Intelligence Consultant at FireEye Mandiant, emphasised on the importance of leveraging intelligence-led security across a security function as it can significantly enhance decision-making around areas such as cyber risk, threat hunting, and vulnerability management. He also explained how an intelligence-driven cyber risk assessment can make a prominent difference by focusing detection and response efforts and prioritising resources for “real” versus “perceived” threats, thereby ensuring efficacy and optimising security. Anderson Pereira, Channel Solutions Engineer EMEA at Keysight Technologies, calls for optimising the organisation’s network for an increasingly mobile workforce through the implementation of an active performance monitoring strategy that helps minimise downtime, troubleshoot outages faster, and improve security. It is not too late for organisations to start adopting new approaches to cybersecurity that would make them well-equipped with the proper security tools and defenses to tackle all the challenges accompanying the new normal. The perimeter-less era is here to stay, and businesses should become proactive in securing their greatest assets – users and data.

According to Rabih Itani, Country Manager, UAE at Vectra, artificial intelligence

www.safetyandsecurityafrica.com | April-June 2021


ADVERTISER’S INDEX Pg.1 CommPort

Pg.25 Kentec

Pg.2 Astrophysics

Pg.27 Hoverstar

Pg.3 Tracer Technology Systems

Pg.29 CommPort

Pg.11 Securiport

Pg.38 Snapxit

Pg.14 A1 Fence

Pg.49 Ajax

Pg.17 Astrophysics

Pg.51 Altronix

Pg.19 Esse

Pg.54 Esse

Pg.21 XtraVision

Pg.55 XtraVision

Pg.23 Mueller Germany

Pg.56 Ajax


Your Global Distributor Partner SOLUTION OFFERINGS Video Management Systems Surveillance Solutions Thermal Solutions License Detection Recognition Fire Detection Solutions PA & Evacuation Solutions PA & Evacuation Solutions Perimeter Protection Solutions Physical Xtra-Barrier Solutions Smart Barrier Solutions XtraNet Networking Solutions Access Control Solutions Alarm Intrusion Solutions Support Services Facebook: Facebook.com_xtravisionptyltd Linkedin: linkedin.com_xtravision

www.xtravision.co.za


Profile for admin-safetyandsecurityafrica

Safety and Security Review Africa- April-June issue  

The Safety and Security Review Africa is a premier magazine and a major voice within Africa’s Safety and security industry. The publication...

Safety and Security Review Africa- April-June issue  

The Safety and Security Review Africa is a premier magazine and a major voice within Africa’s Safety and security industry. The publication...

Advertisement

Recommendations could not be loaded

Recommendations could not be loaded

Recommendations could not be loaded

Recommendations could not be loaded