Page 1

SECURITY & GOVERNMENT EXPO 2017 SEM1117_1cover.indd 1

l Special Feature: Perimeter Security l Product Review Genetec Clearance l The Interview: Peter Mellino, RISCO l Case Study: Remondis Thermal Fire l Physical Security: Case for Convergence? l Case Study: Control Room Upgrade l Review: EOS Helix Security & Automation l Australia Security Awards & OSPAs

PP 100001158


29/10/17 12:36 pm

Hills_VisionAd_APAC_210x297mm.indd 1 SEM1117_2.indd 2

2017-05-31 3:39 am PM 30/10/17 11:20


By John Adams


OMETHING we’ve discussed S in SEN many times is the challenge security managers face when applying the latest electronic security technologies to meet operational procedures. There’s no doubt technology has never been so flexible, so affordable. But that doesn’t mean it’s a simple matter to weave a functional security solution from multiple sub systems. Part of the issue is legacy infrastructure – we’ve gone through a huge technological transition at the same time we’ve undergone a global financial crisis. Security managers have been forced to cut corners – upgrading in stages, retaining legacy infrastructure or installing cameras that were merely good enough, leaving some sites to stand alone. In many applications there remain analogue components and first and second-generation IP cameras. Access control has suffered too, with low security proximity cards still in evidence, despite the fact MIFARE technology has been available for many years. Manufacturers have responded to the price-pinch by investing more heavily in software development and by cutting corners on hardware development. Part of this attempt to retain margin on hardware has been a shift to OEM hardware from many old and famous brands – this doesn’t mean the OEM gear is not capable – it’s just not built with only performance in mind. There is good news here. Software development has reached a level where affordable out of the box solutions are capable of integrating with multiple sub systems

Manufacturers have responded to the price-pinch by investing more heavily in software development and by cutting corners on hardware development. and larger management solutions are built specifically with challenging integrations in mind. That means there’s much less requirement for expensive customisation. Software has got much smarter, too. Face recognition from companies like Avigilon and Axxon is being leveraged to increase the efficiency of security searches. Specific application software from Genetec supports investigations, city management and the real time situational awareness. The other good news is that the downward pressure on hardware prices means the very best solutions have become much more affordable. Top line external PTZ cameras with 36x zoom and powerful integrated IR support cost no more than internal PTZ domes used to. Biometric readers are now affordable. And everywhere you turn, manufacturers are cramming as many features as possible into their hardware to satisfy requirements for return on investment from end users. And there’s more. Concurrent developments in technology include affordable high speed 4G mobile comms, huge microSD drives, clever and secure mobile applications and widespread cloud services. These developments all contribute but the biggest enabling technology is 4G, which will morph into 5G over the next couple of years. Big band wireless – think 50MB and more – removes significant capital costs from the networked security equation and hugely increases flexibility. If you need to, you can now install a complex security solution anywhere there is power or sunlight. When it comes to wireless, the need to leverage existing assets might see

public surveillance systems sharing bandwidth with public Wi-Fi – the CBRFree network in Canberra is a case in point. Also of note is the smart city system installed by Rockhampton Regional Council, which combines technologies like smart car parking space availability and timing, intelligent duress/evacuation integration through automated lighting strategies, people and object identification and tracking, immersive surveillance technology, high-speed public Wi-Fi and heat mapping analytics in a single integrated solution. The beauty of such integrated applications of technology is that they completely change total cost of ownership, spreading the investment across multiple business units, including those that raise revenue and those that protect revenue raising assets. From the point of view of security managers in corporate and government applications, the ability to leverage shared technology without compromising security is a huge advantage when costing solutions. One thing that is certain in all this change is the centrality of network infrastructure to systems of the future – we may retain solid state controllers and powerful NVRs in many applications but even these systems will need to climb onto secure networks to offer security teams the greatest possible levels of flexibility and functionality. Getting the most functionality at the lowest total cost of ownership is going to be at the heart of many of the conversations at Security in Government this month – when it comes to return on investment, there’s never been a better time for security managers. n

se&n 03

SEM1117_3ed.indd 3

31/10/17 3:42 pm


The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes.

- Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.


Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.


Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.


1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.
















 AL



















1300 555 570

SEM1117_4_5.indd 4

31/10/17 12:00 pm



MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.




Y AR M S RI CES s P les AC ire ctWsole e r DW SECURE Di Con s les ire A W y ct re wa Di ate G s les ire B W y ct re wa Di ate G





 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.



 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS







1300 555 570

0 u u

SEM1117_4_5.indd 5

31/10/17 12:00 pm

Security Alarm

SEM1117_6_7.indd 6

Access Control


With a step by step commissioning guide and outstanding user interface, Inception is easy to install and very easy to operate. For more information simply scan the QR code or visit

No Software Required

Multiple Devices

Easy Setup with Checklist Prompting


Inception is an integrated access control and security alarm system with a design edge that sets it apart from the pack. Featuring built in web based software, the Inception system is simple to access using a web browser on a Computer, Tablet or Smartphone.







Send IP Alarms via the Multipath-IP Network

31/10/17 12:01 pm

The award-winning Inception just got bigger!

Inception system capacities have been increased to support 128 doors, 256 readers and 10,000 users. This increase is available free of charge to all existing Inceptions via a firmware update. SYSTEM CAPACITIES

T: +61 3 9780 4300 E: W:


SEM1117_6_7.indd 7















T: 1300 319 499


31/10/17 12:01 pm




complex. Fredon’s team had to balance many logistic demands without compromise and project requirements both in design and during construction.

NOV 17 22: FACE LIFT Security control rooms are always squeezed in whatever space can be found close to core infrastructure to avoid the expense of additional cabling or a reduction in revenuegenerating commercial space. And the older the building the more a control room is likely to need refurbishment. 28: FIRE ENGINE Remondis Northgate had been using thermal camera technology to help monitor waste materials to mitigate risk of fire for 18 months when a recent outbreak of fire proved its Visium-installed solution offered excellent early warning, allowing the rapid implementation of procedures and swift emergency response. 34: BANGKOK EMBASSY Fredon Security won the 2017 ASIAL Excellence Award for its electronic security integration at the Australian Embassy in Bangkok. The project was not only large but

SEM1117_8cont.indd 8

36: GENETEC CLEARANCE Genetec Clearance is a digital evidence management system that can help speed up investigations by allowing investigators to securely collect, manage, and share evidence from many different sources, wherever they are in the world. 40: PERIMETER SECURITY For many large, high security applications, particularly in government applications, secure perimeters are a vital front line against intrusion, deterring attacks and reporting events using integrated electronic detection solutions. 46: AFFAIR OF THE HEART Forget fingerprint computer identification or retinal scanning. A University of Buffalo-led team has developed a computer security system using the dimensions of the heart as a real-time form of authentication. PAGE 48: PHYSICAL SECURITY’S FUTURE It doesn’t take a genius to recognise that the physical security industry is undergoing what is arguably its most significant, and most rapid period of disruption and transformation; and if

31/10/17 3:43 pm






the industry fails to recognise, react, and respond, it will be subsumed by IT and cyber security providers.

10 NEWS Latest business, product and technical news from Australia and around the world.

52: PETER MELLINO, RISCO RISCO’s commercial director, Peter Mellino, worked in electronic security for nearly 30 years before leaving the industry in 2007. Returning to security in 2016, his deep experience and long sabbatical give him a unique perspective on what has changed in electronic security and what has stayed the same.


What’s new from our manufacturers.

HELIX Connect O2 is a smart home solution from EOS Australia. Built by Resolution in the U.S. the wireless control panel represents the future of intrusion detection. Affordable, expandable and capable.

SECURITY & GOVERNMENT EXPO 2017 SEM1117_1cover.indd 1

l Special Feature: Perimeter Security l Product Review Genetec Clearance l The Interview: Peter Mellino, RISCO l Case Study: Remondis Thermal Fire l Physical Security: Case for Convergence? l Case Study: Control Room Upgrade l Review: EOS Helix Security & Automation l Australia Security Awards & OSPAs

PP 100001158


Homeowners worldwide have more security options available to them now than ever before and this fundamentally challenges the traditional alarm monitoring model – particularly in the residential market, argues Jim Dearing. 68: EDITOR’S CHOICE


Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge


72: HELPDESK Our team of electronic security experts answers your tough technical questions.

Editor John Adams Advertising Manager Monique Keatinge Contributors Simon Pollak Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge

Design Tania Simanowsky e: taniasdesign@

22 months A$195.00 (incl GST)

Subscriptions 11 issues per annum One year (11 issues)

Overseas 11 months A$220.00 22 months A$440.00

Australia 11 months A$110.00 (incl GST)

WEBSITE www.securityelectronics

29/10/17 12:36 pm

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.

SEM1117_8cont.indd 9

31/10/17 3:43 pm

Inner Range Inception Expands to 128 Doors, 256 Readers, 10,000 Users p.12 Integrated Control Technology Partners with Harco HIS p.14 Genetec Unveils Citigraf Public Safety System p.16 Sony Video Security Appoints New Partners in Australia & New Zealand p.18 MOBOTIX AllroundDual MI6 Receives Merlion Award at Safety and Security Asia p.20




HIKVISION USA customers can now contact the video surveillance provider for direct support related to cybersecurity concerns. And Chuck Davis, a former IBM executive security architect, has been appointed to serve as cybersecurity director for the company’s North American operations. Davis has worked for more than 20 years building cybersecurity programmes for large enterprise organizations. He began working for IBM in 1997 and

rose to the position of global security operations manager before leaving the company in 2011. He later returned in 2015 as executive security architect, serving in that role for more than 2 years prior to joining Hikvision. Davis encourages its partners to update all equipment to the latest available firmware. “Updating firmware is an effective way to safeguard equipment from cyberattacks and eliminate known vulnerabilities. Firmware updates are available on the Hikvision website,”

Vlado Damjanovski

says Davis. “Cybersecurity is Hikvision’s top priority,” says Jeffrey He, president of Hikvision’s operations in the

United States and Canada. “Innovation and R&D are integral parts of our technology development, and continuous

improvements to our cybersecurity support with this hotline solidify our commitment to secure our products even further.”

MAJOR SECURITY UPGRADES FOR VILLAWOOD DETENTION CENTRE n AUSTRALIA’S Department of Finance is seeking through a 2-stage tender process, a suitably qualified contractor to undertake Stage 3 of works of the VIDFR project for the supply of higher risk

secure accommodation. The works will be delivered under a Head Contract (construct only) methodology. The design is undergoing development to 100 per cent completion and will be provided to the

successful applicants at the second stage RFT process. An early works package, inclusive of remediation and civil works, has been delivered under a separate contract to reduce risk and gain efficiencies in the planning and delivery of the new higher risk accommodation. Construction is for a new higher security/higher risk precinct housing a total of 62 detainees including accommodation, 6 special care, common facilities and outdoor areas. The precinct will be divided into 4 secure areas: • 2 Identical and separate secure precinct areas, each providing accommodation and facilities for 31

detainees and each over two levels, which are based on the Mitchell Precinct with refinements based on the Higher Risk Accommodation (HRA) and General Flexible Accommodation (GFA) model security amendments. There will be capacity for lockdown operations in each area and no shared facilities. Each area will include common facilities for recreation and dining, as well as high care facilities for detainees that have special needs: • 1 separate secure area around the Banksia and Tweed building with security curtilage; • 1 separate secure area

for a Football Field. Access will be managed from each of the surrounding accommodation areas; and • Construction of fences and roadworks in and around Stage 3 to support the new high security precinct. The VIDF is part of a network of detention facilities and Stage 3 accommodation must become available for occupation in early 2019 to meet DIBP’s forward planning requirements. The Stage 3 program includes a 12-month construction period, followed by a 12-month defects liability period (DLP). The tender closes on November 30.

10 se&n

SEM01117_10news.indd 10

31/10/17 2:38 pm

Darkfighter X Oceania-2.pdf 1 2017/9/18 15:06:26








Hikvision DarkFighterX Using Dual-Sensor Imaging to Provide Full Colour Images Hikvision has taken its DarkFighter technology up to the next level with the DarkFighterX Series PTZ and Bullet Cameras. Using single-lens, dual-sensor technology, each 2 MP DarkFighterX Camera mimics human eyes to render bright, full-colour images. How? By fusing two discrete light spectra: an IR sensor captures brightness, and a visible light sensor captures colour – even under 0.001 lux. Install Hikvision’s DarkFighterX in city streets, public spaces, and critical travel nodes for the most critical protection. In colour – all day, all night.

Hikvision Oceania

See us at SAGE 2017 Canberra 9th November

Unite 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Toll Free:1300 557 450( Australia only)

SEM1117_11.indd 1

31/10/17 12:02 pm


JOHNSON CONTROLS TAPS NEW SECURITY DISTRIBUTOR PARTNERS FOR AUSTRALIA n JOHNSON Controls is pleased to announce the appointments of BGW Technologies, Seadan Security & Electronics and Video Security Products as new distributor partners for Australia and New Zealand for the company’s security solutions. The addition of these distribution partnerships will assist Johnson Controls to better serve its growing customer


base in the region as well as help the company expand into new markets. “In a region eager to explore new technologies and embrace new solutions, it was paramount that we sign on new partners to help us build exposure for and understanding of Johnson Controls’ robust portfolio of video, access control and intrusion monitoring solutions,” said Darren Banks, Johnson Controls’ regional sales director, Pacific. “We’re delighted to partner with BGW Technologies, Seadan and Video Security Products, and to continue our relationships with Hills and ISCS.” BGW Technologies will represent Johnson Control’s DSC product line, including security

control panels and IP alarm-monitoring solutions. Seadan Security & Electronics, a 30-year-old company based in Victoria with branches throughout the country, adds Kantech access control technologies, Exacq video management software and recording hardware and Illustra cameras to its portfolio, which already included Johnson Controls’ Visonic wireless security products. Video Security Products is handling the video solutions portfolio from American Dynamics and Illustra and security and event management technologies from Software House. Under an agreement announced earlier this year, ISCS will continue to expand access of the Exacq product line. Hills Limited and Hills

Darren Banks

(NZ) Limited remain the distributor of CEM Systems edge-based technology, and will continue to offer DSC, Kantech, Illustra, American Dynamics and Software House products throughout Australia and New Zealand. According to Ken May, vice president, AsiaPacific sales, by working with many of the leading

wholesale distributors of security solutions in the region, Johnson Controls is providing existing and future customers additional avenues to purchase our products and developing those important, lasting relationships based on quality service and expertise within various segments of the security market.

INNER RANGE INCEPTION EXPANDS TO 128 DOORS, 256 READERS, 10,000 USERS n INNER Range has announced a significant increase in system capacities for its awardwinning Inception access control solution. Inception has now been expanded to support up to 128 doors, 256 readers and 10,000 users. These new capacities require no hardware changes or licenses and will be available for all existing controllers with a firmware update. Inception is a next generation access control and intruder detection product featuring a user-friendly web browser based interface and support for modern technologies such as USB, Wi-Fi, and IP monitoring. According to Inner Range, Inception is ideal for handling the access control and security needs of stand-alone single controller sites without PC hardware. It offers the installer

and the end user a product that is easy to use, accessible and now very scalable. When paired with high level integration options for automation systems, it becomes a core part of a site’s building management system. “We took this opportunity to go over every aspect of Inception with a fine-tooth comb and improvements were made in a number of areas that were impacted by the capacity increase,” said Steve Mitchell, Inception team leader. “This means that a fully loaded controller is fast and responsive and users with smaller systems also benefit from the improved performance.” The process of upgrading Inception’s capacities involved extensive performance testing to verify the system could handle the new limits well. A test system was

set up that was much larger than the new capacities; if Inception could handle a system of this exaggerated size, then it could easily handle a fully loaded system. This load testing proved Inception could handle the larger capacities without

sacrificing performance of the web interface and the responsiveness of the system. “Inception was already well placed to compete in the 2-4 door market space and now strategically will also compete in the medium sized market space of up to 128 doors for standalone

single controller sites” says Peter Krincevski – Inner Range CEO. The success of Inception was recently recognised by the industry at the ASIAL Security Awards, where the system was presented with the ASIAL 2017 Product of the Year Access Control.

12 se&n

SEM01117_10news.indd 12

31/10/17 2:38 pm

Complete Security Integration...

Download the free TSP App from




Expand Your Offerings to Cover Intrusion, Video and Access Control with One Single Solution A powerfully complete solution - simple to manage and easy to install. All in-one integrated intrusion, video surveillance and access control gives users greater control through one single and easy to use interface, while giving you a simple and quick to install solution to boost your revenue and amplify your business opportunities.

• • •

Kantech access control + Exacq video surveillance + DSC intrusion All managed and accessed from 1 platform - Choice of Kantech or Exacq users Download the app, scan the shopping bag image below and watch a video of how our products integrate together to give you a powerful, complete solution.

For more information or more products from Australia’s largest range of security systems call 1800 685 487 or visit branches for your nearest location nationwide.

For more information:

Pacific office 137 McCredie RoadGuildford, NSW 2161, Australia Tel: +612 8717 2000 © 2017 Tyco Security Products. All Rights Reserved.

SEM1117_13.indd 1

31/10/17 12:02 pm


INTEGRATED CONTROL TECHNOLOGY PARTNERS WITH HARCO HIS n INTEGRATED Control Technology (Europe) has announced an exclusive distribution agreement with Harco HIS. The partnership is another step in a strategic plan aimed at developing ICT into a premier global supplier of access control solutions,

SEN Advert proof.indd 1

and to meet increased demand for the industry leading ProtegeGX and WX platforms across the EMEA region. The agreement will enable both companies to cater to the growing demand for truly integrated security systems incorporating

access control, intrusion detection, CCTV, biometrics, perimeter detection, elevator control, offsite monitoring, and building automation, all from one easy to use scalable and modular solution. “At Harco, we pride ourselves by offering a

unique value proposition and we are now aiming to reach out to new markets and offer new product segments to our existing customers,” says, Roger R. Ghostine, managing director of the Harco HIS Division. “We are thrilled to partner with ICT,” he continued. “I believe the market in our region is readier than ever for more powerful and reliable physical security solutions that integrate access control and automation from a single manufacturer. “The ICT passion and dedication for innovation makes them the right fit for our portfolio.” “We look forward to working with a company of Harco’s reputation, and this partnership will help meet increased local demand for the industry


leading Protege GX and WX platforms,” said Ian Henderson, non-executive director of ICT Europe. “We believe Harco is uniquely positioned to further develop our existing customer base in the Middle East, and that with its market presence and sales and support network, we can make a real impact together.”

24/10/2017 4:42:59 p.m.

14 se&n

SEM01117_10news.indd 14

31/10/17 2:38 pm

Protect what’s most valuable

The new Avigilon H4 Fisheye camera line offers a complete, high-resolution, 360-degree panoramic view with no blind spots. This cost-effective, easy-toinstall solution is designed to provide broad coverage with fewer cameras.

• Available in 6 and 12 megapixel resolutions • High Definition Stream Management (HDSM)™ technology • 360o control with Avigilon Control Center (ACC) software • LightCatcher™ low-light technology • Integrated with content adaptive IR technology

Learn more at

© 2016-2017, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, ACC, HIGH DEFINITION STREAM MANAGEMENT (HDSM), LIGHTCATCHER and TRUSTED SECURITY SOLUTIONS are trademarks of Avigilon Corporation.

SEM1117_15.indd 1

31/10/17 12:02 pm


CAPRICORNIA CORRECTIONAL CENTRE EXPANSION PROJECT SEEKS SECURITY PACKAGE n CPB Contractors is seeking expressions of interest for a security package for the $A200 million Capricornia Correctional Centre Expansion Project. While the request for EOIs does not go into specific details beyond “security and CCTV systems and maintenance” it’s likely the


required high security solution would include significant access control and intrusion components, and will need to be integrated into the existing management solution, or might include an upgrade of the existing management solution. The overall expansion includes the construction and fit-out of an additional 164 high security cells. Qld Corrective Services Minister, Mark Ryan, said secure correctional centre capacity was at 124 per cent. “For Corrective Services, this expansion will deliver additional accommodation that was planned when the centre was originally designed,

to be built when additional capacity was needed,” Ryan said. “Prison infrastructure is very expensive – to ensure it is safe and secure.” The Capricornia Correctional Centre project has commenced planning

and work on site is scheduled to commence in November 2017. “Corrective Services will work with the Department of Housing and Public works to investigate methods of accelerated procurement

and construction to commission the new highsecurity residential cells as quickly as practical and deliver jobs to the region,” he said. Expressions of interest must be received by November 30.

ASSA ABLOY ACQUIRES SMART LOCK MANUFACTURER, AUGUST HOME n ASSA ABLOY has signed an agreement to acquire August Home, a leading provider of smart locks for smart home access products and services. With primary focus on the DIY channel, August offers smart locks, which now feature DoorSense, the first intelligent integrated sensor that

tells users if their door is open or closed, and doorbell cameras. “August Home strengthens our residential smart door strategy with complementary smart locks, expansion into video doorbells and comprehensive solutions for home delivery,” says Thanasis Molokotos,

executive vice president of ASSA ABLOY and head of the Americas division. Based in San Francisco, California, founded by tech entrepreneur Jason Johnson and industrial designer, Yves Behar, August Home has developed 3 generations of smart door locks and 2 generations of digital doorbells, making the

company among the industry leaders in technology, partnerships and retail sales. “August has created a fantastic consumer experience through differentiated features and software,” said Molokotos. “We look forward to the opportunity to draw from the 180 years of cumulative experience of the Yale team plus the technology expertise of the August team to create the future of smart residential doors.” “We have always admired the design and quality of Yale locks,” said Jason Johnson, CEO of August, “This is a great opportunity for us to work with the world’s largest lock and access company.” ASSA ABLOY’s acquisition is subject to regulatory approval and customary closing conditions. The acquisition is expected during Q4 2017. Financial terms of the agreement are not being disclosed.

GENETEC UNVEILS CITIGRAF PUBLIC SAFETY SYSTEM GENETEC unveiled Citigraf, a new public safety decision support system, created for citywide law enforcement and public safety agencies last month. Citigraf collects and manages information provided by integrated CAD (Computer Aided Dispatch) systems, CCTV footage, ALPR data, RMS (record management systems) and more, to immediately identify and display the exact location of an event using icons on a map from a built-in geographical information system (GIS). Thanks to a collaborative integration with gunshot detection technology, response teams can be notified with a gun icon, a map location and nearby cameras when a gunshot has been detected. With this combined information, Genetec Citigraf, distributed in Australia by Hills, provides rapid and actionable alerts to help law enforcement gain control of a mission to potentially stop crimes and save lives.

16 se&n

SEM01117_10news.indd 16

31/10/17 2:38 pm



is here. extraLUX is Wisenet's new product range equipped with the world's first ½" sensor with a built-in F0.92 lens that delivers clearer, sharper colour images even in low light environments.

(02) 9749 5888

extraLUX.indd 1 SEM1117_17.indd 1

19/10/2017 10:53:43 AMpm 31/10/17 12:02


SONY VIDEO SECURITY APPOINTS NEW PARTNERS IN AUSTRALIA & NEW ZEALAND n WITH a view to providing existing and potential customers greater access to Sony video security products, Bosch Security Systems has partnered with 3 new distributors to further strengthen the Sony distribution network in Australia and New Zealand. Effective immediately, Connect Security Products, Security Supply Chain, and Source Security Systems will be distributing the Sony suite of video security products, providing access to products and support in more locations. Connect Security Products is one of New Zealand’s premium security providers with a commitment to providing product and service excellence. With national coverage and distribution centres in Auckland, Wellington, and Christchurch, Connect Security Products is well resourced and experienced in the supply and commissioning of major projects. “We pride ourselves on promoting high quality brands in our portfolio, and are pleased to be able

to offer our customers the technological advantages that the Sony Video Security product range is well known for,” said Jason Mackie, managing director, Connect Security Products The second new partner, Security Supply Chain (SSC), is relatively new to the industry, and in a short time has already made significant penetration into the New Zealand security market place. Aucklandbased, with a strong online presence, SSC is innovative and focused on providing the best value-add for their customers. “Security Supply Chain Limited (SSC) is proud to be a certified distribution partner with SONY on their full range of video systems,” said Mark Massicks, managing director, Security Supply Chain. “This is a solid addition to our offering, and we are excited to grow our business and our customer’s businesses with this partnership.” Servicing the Western Australia security market, Source Security Systems provides complete security solutions from their 2 locations in Perth. This progressive and professional team

has firmly established themselves as a premium supplier to the local industry. “Source Security Systems is proud to be associated with a brand like Sony,” said Michael Chapman, managing director, Source Security Systems. “The Sony product is a great choice for medium to large scale projects and with Sony’s superior image quality, like its 4K range, our team is excited by the possibilities and looks forward to a prosperous long-term relationship”. “The appointment of Connect Security and SSC is part of our strategic plan to expand in the New Zealand market. Connect

Security is strong in major systems and has the national coverage we seek. Security Supply Chain are the ‘new kids on the block’ and have already made in-roads into the New Zealand market place.” In WA, Source Security Systems brings additional exposure and direction to the local distribution channel - being part of the Source Technology Group of Companies, there is the opportunity to cover a wider range of integrators and applications.” “Sony Video Security Bosch Security Systems and Sony Corporation have established a business partnership for their video security business

at the beginning of 2017, entailing both a technical collaboration as well as a sales and marketing cooperation,” said Steve Charles, regional manager ANZ. “The 2 companies are combining their technological expertise in order to develop innovative products and solutions in the field of video surveillance for security applications.” As of February 1st, 2017 (April 1st, 2017 in China) the sales and marketing activities related to Sony Corporation’s Video Security business were transferred to Bosch Security Systems.

SERCO AUSTRALIA SEEKS SUPPLY, INSTALL, MAINTENANCE OF ELECTRONIC SECURITY SOLUTIONS n SERCO Australia is seeking the supply, installation and maintenance of electronic security solutions.

The tender description calls for the design, supply and installation and maintenance of electronic security

systems such as cameras, access control, alarms, gates and sensors. The tender doesn’t specify a particular application

for what seems to be a fully integrated security solution but Serco Australia is a big company with 9000 staff across ANZ, Hong Kong and mainland China supporting government and other public service providers in 7 key sectors: citizen services, defence, facility services, health, immigration, justice, transport and corrections. Serco’s recent work in Australia includes the delivery of a new Romanian-built ice breaker, the building of the new $A1.5 billion Grafton prison – which

broke ground a month or so ago - management of immigration centres and prisons, healthcare and aged care and plenty more. This tender has some serious lead time. It closes on June 30, 2018.


18 se&n

SEM01117_10news.indd 18

31/10/17 2:39 pm


Buckle up. At Axis, we do everything we can to mitigate the risks of cyber attack. We have 100% focus on cybersecurity. We build protection right into your network camera solutions. And we work hard to make it easy for you to play your part. But we really can’t do it without you. Because cyber protection is a lot like the seatbelt in your car. It won’t keep you safe unless you use it.

Learn Visit more about Axis’ quality assurance work at and find out how to stay protected!

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit CONNECT



axis_ad_cybersecurity_secelecnet_hills_a4_en_1710.indd 1 SEM1117_19.indd 1

2017-10-09 10:39:05 31/10/17 12:02 pm

NEWS JU N OLY V E2 M0B1 E 7R 2017

MOBOTIX ALLROUNDDUAL MI6 RECEIVES MERLION AWARD AT SAFETY AND SECURITY ASIA n MOBOTIX AllroundDual MI6 has received a Merlion award in the ‘Surveillance’ Category at Safety and Security Asia 2017, in Singapore. The Merlion awards recognise outstanding new designs and products in the field of security and the importance of innovation. MOBOTIX and its Distributor SPIRALTECH showcased solutions at the show and were honoured with the Merlion Gold award. Established in 2001, SPIRALTECH specialises in megapixel network camera solutions, hemispheric solutions, storage, video management software, network video recording and wireless/3G/4G solutions. “At SPIRALTECH, we always believe in product innovation and in providing the best for our customers. We seek to work with partners

and suppliers with long term intentions and not short-term goals,” said Michael Tan, director of SPIRALTECH. “We are proud to have been presented with a Merlion Award for the MOBOTIX M16 camera, the third time in 5 years that we have received this award,” Ryan Fairclough, sales director for MOBOTIX Asia-Pacific. “It is a well-deserved recognition of our position as market leader, and of the innovation and flexibility of MOBOTIX technology.” The robust, weatherproof MI6 with interchangeable sensors is part of the new Mx6 camera line, the most powerful and flexible MOBOTIX camera system yet, which was released earlier this year. The first MOBOTIX camera to support the H.264/ ONVIF industry standard, it comes with a dual core processor architecture, allowing it to deliver

twice as many images per second as before, at the same resolution, and frame rates up to 34

frames a second. Not only is the camera faster, but it also has greater capacity for additional software

INTEGRATOR ARA HAS ATTAINED DIAMOND LEVEL IN HIKVISION’S DEALER PARTNER PROGRAMME n “Hikvision’s Dealer Partner Programme (DPP) focuses on rewarding loyal customers with discounts and rebates but most importantly with support and training,” said Hikvision senior account manager, Brad

Ballesty. “ARA has hit Diamond Level and they are only 1 of 3 integrators to achieve it. Diamond Level did not exist until it was created last year to recognise integrators of particularly high quality so it is a very special

Hikvision’s Brad Ballesty presents ARA’s Jamie McNaughton with the Diamond Level Certificate.

achievement. “ARA’s Diamond Level Certificate recognises outstanding sales performance and loyalty based on the last 12 months sales,” Ballesty said. “ARA is one of our industry’s leading integrators and they continue to lead the way using Hikvision’s extensive range of products. “It has been a pleasure partnering with a company of ARA’s professionalism and expertise - each opportunity we have worked together on is different and requires our engineering team to come up with suitable product solutions to satisfy their customers requirements. “Our partnership is fast-paced and exciting, and we look forward to

continuing our business relationship with ARA well into the future.” Meanwhile ARA general manager, Jamie McNaughton said the ARA team was delighted with its achievement. “Partnering with Hikvision has allowed us to grow our business substantially as they have the best range of products at extremely competitive prices,” McNaughton said.


applications, such as 3D motion analysis or number plate recognition.

CSM OPENS NEW WA BRANCH AT BALCATTA CSM opened its new WA branch mid-October with a BBQ breakfast, lunch with refreshments and a happy hour. “CSM WA had a large attendance at our opening day with a long list of customers coming in to check out the new Balcatta branch,” said CSM’s Wayne Trethowan. “All the shelves are now fully stocked and the new training facilities have been set up, and the business is now fully trading with many customers pleased to see our new location and facilities. “With Tim Sharman at the helm and a broad new range of access control and video solutions on board, we see good growth opportunities in the region,” Trethowan said. CSM’s new WA branch at Unit 4, 103 Erindale Rd, Balcatta. For more information call 08 9344 2555 or sales.wa@

20 se&n

SEM01117_10news.indd 20

31/10/17 2:39 pm

AS ERAS AM R C E S P AM VR N 2MP C H C 4M 16 8/ 4/






31/10/17 12:02 pm

SEM1117_21.indd 1

● Case study

Control rooms

The old control room

The upgraded control room with video wall


Security control rooms are always squeezed into whatever space can be found close to core infrastructure to avoid the expense of additional cabling or a reduction in revenue-generating commercial space. And the older the building the more a control room is likely to need refurbishment. M sitting in the lobby of one of Australia’s iconic commercial high rise CBD buildings. From the comfort of the leather lounge chair, the building’s slick modern appearance and feel of the sandstone, marble and steel that surrounds me, exude luxury and opulence. The grand lobby gives no indication that this well-known and high-profile office tower is more than 25 years old. However, as with many buildings, the back of house does not always keep pace with the look and feel of the façade. This was certainly the case here - the security control room had changed little from the original design when the building was commissioned, and when I looked at the images of the original control room, there’s no question that it showed.


I’m here to meet Roger Pearce of Sydney Building Technology Brokers. Pearce was the security consultant given the brief by the building managers to update its security control room, to bring it into the 21st century. Despite the appearance of the old space, don’t be fooled. From the point of view of an electronic security application, it’s a serious control room, supporting Gallagher Command Centre access control, intrusion and lift control, as well as a Honeywell surveillance solution. According to Pearce, his first inspection of the control room suggested technology had been improved over the years but the space itself had never been thoughtfully enhanced to take advantage of the latest technologies and techniques.

22 se&n

SEM1117_22control room.indd 22

31/10/17 1:59 pm


Original indicator panel


“Although some of the security technology had been updated in recent years, no holistic view had been taken of how to refit these new systems into the space,” he explains. “The managers wanted to start all over with a fresh new look and a modern design. This would require some demolition of walls, a new ceiling and new floor coverings. While that was being done, new workstations and large screen monitors would have to be installed.” Complicating the process was that this control room supports a 50-plus storey building with a bluechip client list. “The upgrade had to take place without interrupting the 24-hour, 7-day security operation,” Pearce explains. “Previous control room upgrades I’ve done have involved moving a control room into a new location which doesn’t have the complication of working around an existing live security operation.”

reduced unnecessary clutter which was making the space feel untidy and uncomfortable. “At the same time, the operators were consulted on exactly how they used the equipment and what the work flow was. This information was used to plan the new layout. The first task was to work out the sequence of events, which was done in consultation with the building operations manager, security manager and builder. “Essential services were set up in a temporary location so that demolition and rebuild of the front wall could be done,” Pearce explains. “The makeover was also the ideal opportunity to upgrade some of the technology to make the systems more user friendly and work better for the operators. The Gallagher system was upgraded to the latest version of Command Centre, which allowed for better alarm handling. “Because new megapixel cameras had been installed recently, the Honeywell DVM servers were upgraded to increase bandwidth which improved the performance and large flat screen LED monitors replaced a collection of old monitors which allowed many more cameras to be displayed at once. All new matching workstation monitors were used to replace a mish-mash of monitors that had been supplied over the years. “Some new BPT intercom units were installed in the car park to replace other door stations. This means there is only the one intercom system instead of 2 separate systems. Two new adjustable height workstations were used and the wall is constructed with heavy-duty ply to allow mounting of heavy equipment with a cavity behind to allow easy cabling access.” According to Pearce, new ceiling and carpet along with a fresh coat of paint have lifted the whole appearance and feel of this work space. “This has meant a significant boost to morale and improved efficiency of the operators,” Pearce says. “It is now a space that the owners and managers can be proud of and take pleasure in showing to tenants and prospective tenants.” n

Temporary control room

THE EXISTING CONTROL ROOM According to Pearce, the first thing he undertook was an audit of everything in the room from strobes and indicator panels on the walls to all equipment on and under the workstations. “This enabled us to identify redundant equipment which could be removed and would not have to be reinstalled,” he says. “As a result, we saved space and

se&n 23

SEM1117_22control room.indd 23

31/10/17 2:39 pm

● New product


INNOVATION BY DESIGN Communications Networks, a USAbased manufacturer of transmission and communication networking equipment, builds comms and networking solutions for serious applications, including video surveillance, access control, perimeter security solutions (including wireless perimeter) and plenty more. All hardware is made in the U.S and the company backs up the talk with a lifetime warranty – it’s hard to argue with that.

OMNET’s range is so profound it’s tough to overview – the company makes products for all kinds of networking and communications niches – video, data, audio, contact closures, access, ethernet, wired and wireless and in each vertical, the product range runs deep. Something that typifies ComNet is the company’s proactive response to changes in the market evidenced as highly functional solutions and a couple of recent releases are a case in point. The first is a new cybersecurity feature in latest generation of self-managed switches. The ComNet Port Guardian feature has the capability to physically disconnect a port if unauthorized access is detected and it makes life much simpler for security teams looking to protect solutions while allowing necessary access for remote management. According to ComNet, the value in Port Guardian comes in situations where network access is attempted by disconnecting an IP addressable device on the edge to connect to the network. When Port Guardian senses the disconnect, an SNMP notification is sent to the head end and the effected port is physically locked out, preventing access. The network administrator can reopen the port when the threat is eliminated. This feature also thwarts access through spoofing by disconnecting the port as soon as an interruption is sensed. This new feature is being added to the newest generation of ComNet SMS products including the CNGE2+2SMS and CNGE4+2SMS/M. The feature


will also be available on the new ComNet Managed Switch line. “Unauthorized access issues or cybersecurity is a critical challenge facing every network manager today,” says Andrew Acquarulo Jr., ComNet CEO and president. “Your security network with its accessible outside connection is an easy way to bring down your network. Cybersecurity is not something confined to just a security IP network. Any network can be infiltrated. By introducing this valuable feature on these cutting-edge products, we can provide another unmatched advantage to our partners.” Importantly, Comnet’s focus on ensuring the security of core functionality is ingrained into the business. “ComNet’s goal from day one has been to be a smart and secure choice for transmission products,” says Skip Haight, ComNet VP of marketing.

WIRELESS PERIMETER SOLUTION Another recent product release of note for security integrators is a cellular VPN gateway for primary or backup wireless broadband network connectivity. The CNFE3TX2CXMS router supports connections to 3G/4G networks with its internal cellular module as well as 2 Ethernet ports for LAN/WAN connectivity. The primary function of this router is communication from remote edge locations where connectivity is not available. Other applications for the CNFE3TX2CXMS include wireless perimeter surveillance, cellular backup for edge connections, temporary network surveillance deployments, and site-to-site VPN. The CNFE3TX2CXMS is certified for use by both AT&T and Verizon and can be used on their mobile networks. This unit is ideal for data transmission as well as low bandwidth video. Enhanced network security features such as HTTPS and IEE802.1X are supported. This unit also offers flexible powering options supporting IEEE802.3af PoE and redundant DC inputs. The CNFE3TX2CXMS can be configured to operate in 3 different modes: dynamic static IP, Point-to-Point Protocol over Ethernet (PPPoE) authentication and modem dialup. “The CNFE3TX2CXMS is the second product ComNet has introduced that utilizes cellular transmission to connect to the network and we see a great need and a huge potential for these products in transit applications,” says Haight. “It is a major undertaking, but we believe in their use. ComNet will offer its Lifetime Product Guarantee with the CNFE3TX2CXMS and this will differentiate ComNet from other manufacturers and creates significant value for the user.” n

24 se&n

SEM1117_24comnet.indd 24

31/10/17 4:30 pm

SEM1117_25.indd 1

31/10/17 12:03 pm

● New product



AIRE is a drone designed for indoor use that links to Amazon’s Alexa voice assistant technology and protects internal spaces. he cylindrical indoor drone with an 8 minute flight time flies around homes or businesses detecting potential security threats and responding to voice commands via Amazon Alexa-connected voice recognition technology. Aire incorporates a 360-degree camera as well as a microphone and speaker, will send alerts if it detects sound or motion in when the site is secured – it also allows authorised users to inspect their site via video livestream. The drone has 4 sonar sensors and a 3D depth 4K camera, camera with night vision, along with IMU sensors, NVIDIA Tegra supercomputer processor and an ARM-based Flight ContAroller. It can detect and avoid obstacles in every direction. Control


comms are Wi-Fi through a smartphone app in first-person-view mode, but autonomous flight modes will become available via over-the-air updates down the track. The drone weighs 1.3 kg, is 35 cm high and 30 deep. “There is some level of autonomy for things like taking off, auto-docking and avoiding obstacles,” Aevena CEO Jeffrey Tseng tells New Atlas. “We also have a mode that allows it to take pictures using voice control to demonstrate some basic autonomy. In the future, we’re going to be adding features and functionality using over-the-air updates that will enable higher levels of autonomy, like Teslas, so it can do things like patrol the house on its own. The hardware is there to add more capability, so you won’t need to purchase a new device to get more capability.” Tseng says the drone will be capable of some autonomous functions straight out of the box, like automatically launching from a charging dock, avoiding obstacles and then self-docking again when running low on juice. n

Excellent Images, Anytime, Anywhere There’s no need to fear the dark. With industry leading low light sensor technology that outperforms even under challenging lighting conditions, Sony’s video surveillance products meet market demands with best in class image clarity, advanced futureproof technology and their lowest overall total cost of ownership. The NEW 640 Series (G6-R) Cameras with advanced low-light sensitivity are the latest addition to the portfolio. Why look any further when you can be seeing everything you’ve been missing. Find out more about what Sony video security cameras can do for you at


Critical Infrastructure

City Surveillance


Sony Video Security driven by Bosch

415322_BOST_Sony_Anzeige_Australia_185x125_EN_SHA_RZ.indd 1

26 se&n

SEM1117_26aire.indd 26

26.10.17 08:45

31/10/17 1:57 pm


INSTALLER PORTAL Easily support and manage your customer accounts on the go Install a completely wireless smart alarm and automation solution within minutes

END USER APP Interactive smart alarm and automation solution with push notifications to fit your customers lifestyle In-built Z-Wave technology provides the end-users with unlimited possibilities of automation and product integration

Connect. Control. Monitor.

SEM1117_27.indd 1 Ad PCs.indd 1 Nov17 Connect O2 SEN

(02) 9749 5888

31/10/17 12:03 18/10/2017 5:00:22 PMpm

â—? Case study

Remondis Northgate

FIRE ENGINE Remondis Northgate had been using thermal camera technology to help monitor waste materials to mitigate risk of fire for 18 months when a recent outbreak of fire proved its Visiuminstalled solution offered excellent early warning, allowing the rapid implementation of procedures and swift emergency response.

EMONDIS Northgate is a waste transfer station that receives domestic and commercial general solid waste, removes recyclables before shipping the residual waste in bulk to landfill. A key part of the Remondis operation is the acceptance and bulking up of waste from waste collection trucks that occasionally include hot loads - waste materials that include an unwanted heat source like hot coals, or chemicals that may combust. It goes without saying that these flammables, combined with large amounts of combustible waste, constitute a high fire risk. Another potential risk at waste facilities is the spontaneous combustion caused by heat generated from decomposition. And it’s vital to catch waste fires early to reduce the toxic fumes they produce and ensure that they can be put out before their size and heat make the task too difficult to quickly manage.


28 se&n

SEM1117_28remondis.indd 28

31/10/17 5:06 pm



Catching fires early means early detection and over the years, various fire detection technologies have been used at this and other MRF sites, including smoke beams and thermal detectors. But because of the persistent dust and open breezeways, these detection technologies have typically generated many false alarms, while being slow to alarm on actual combustion. Clearly, a smarter solution was needed. In terms of size, the Remondis site features 2 buildings – an office and amenities building and the transfer station, a large shed covering several acres of land. The integrator of the security and safety solution at Remondis is Visium Networks, which also monitors and maintains the integrated solution. Built around ICT’s Protege GX alarm/access control platform, integrated with Visium’s own

camera range and recording solutions, it’s a complex and high-end integration. Visium chose a redundant fibre optic network, cabinets, switches and power systems, designed and installed by Visium’s own technicians. Given the size of the site and the complexity of the Remondis operation, many components have special firmware to support Visium’s video and management services over IP. Visium’s security backbone is a redundant security LAN installed in dedicated cabinets and racks with tamper alarms. In this challenging semi-industrial environment, Visium selected products capable of handling harsh conditions. As well as being robust, network field switches have UPS backup. Important to our story, in terms of this backend, monitoring takes place at Visium’s Video Alarm Monitoring Centre, which has an IP services desk that monitors ICT Protege for real time services over IP. In fact, the entire topology at Remondis enables the delivery of real time services, like video verification of alarm events, and remote videomanaged access via the external control room. A suite of applications Visium has written around logistics management supports these services. Part of the existing security and safety solution at Remondis is fire monitoring using FLIR thermal cameras – highly sensitive to temperature changes, thermal cameras provide early alerts and these alerts ensure quick response to fires to ensure they’re contained and put out before escalating out of control. From a technical perspective, the FLIR camera integrates into the Protege GX alarm panel, which does the alarm reporting using ICT’s Armor IP protocol, which is encrypted and polled. This then generates an alarm event in Visium’s in-house VU alarm automation software. The VU Suite also facilitates system uptime monitoring including video lost, HDD fail and other system exceptions, so it allows operators to keep an eye on the health of devices, including the all-important thermal cameras. According to Visium’s management information specialist, Chloe Farmer, the great advantage of thermal cameras is their ability to be used as an advanced fire detector. “Unlike other more conventional fire detectors such as smoke alarms, thermal cameras can detect a potential fire before it breaks into open flame or at least at the very early stages of a fire,” Farmer explains. “This means thermal cameras are ideal for early recognition of spontaneous fires inside rubbish tips, and paper and recycling plants. A fire in these high-risk sites can be disastrous for both personnel,

se&n 29

SEM1117_28remondis.indd 29

31/10/17 5:06 pm

● Case study

Remondis Northgate

people in the general area and the environment - not to mention the cost of property damage.” When it comes to installing and commissioning the thermal camera, Farmer says the process involves more design considerations than normal CCTV as the coverage is very specific but she points out that otherwise, it’s not too dissimilar to a regular CCTV install – a camera is mounted, cabled and commissioned in the usual ways. According to Farmer, the extreme sensitivity of thermal cameras to heat makes them ideal for fire detection. “Thermographic images from thermal cameras can detect hot spots, accurately measuring temperature within the cameras field of view and triggering an alarm output at various temperature thresholds,” she says. “These temperature thresholds are integrated with the onsite alarm system to generate an alarm straight to Visium’s monitoring centre where an operator can visually verify if a fire has started or is starting.” For Remondis, the thermal zones are integrated into specific areas and generate the highest priority alarm in the Visium VU automation suite, which prioritises fire/temp events to the top of the queue. “Generally, the first alarm is set at 150 degrees C and when the camera detects this temperature, it sends through the alarm and the video footage,” Farmer says. “Operators can then action the event accordingly. The 150-degree zone is disarmed on schedule during the day as heat sources like bulldozer exhaust can reach this temperature. The higher temp zone set to around 350 degrees C and is armed 24/7.” According to Farmer, this dual-temp monitoring eliminated the spurious alarms from the plant during operational hours though comes in to play after hours for very early over-temperature detection. Addressing heat sources over 150 degrees after hours can readily address potential fire sources before they come to an issue by control room staff contacting site management to attend. Farmer was in the Visium control room at the time of the fire event and she says the early warning provided by the system facilitated the instigation of procedures with minimal fuss and much less

pressure on the team than might otherwise have been the case. “I was in the control room at the time,” Farmer says. “My co-worker opened the alarm and we both visually verified the fire onsite at Remondis. The image from the thermal camera was clear and made it easier for us both to quickly agree that yes, there was a flame and that 000 needed to be called. Importantly, we had great footage of the event in real time even even though we were in an off-site control room. When video footage is clear it helps operators to make a quick decision on whether they are receiving a false alarm, or the system has detected a real fire.” According to Farmer, when the camera detected the first lower temperature of 150 degrees at 7:32pm it sent an alarm to the control room and during

30 se&n

SEM1117_28remondis.indd 30

31/10/17 5:06 pm

SEM1117_31.indd 1 Dallmeier_S-Panomera_A4_Montage_UK_Vektor.indd 1

31/10/1712:13:18 12:03 pm 19.02.2015

● Case study


request that the Visium networks operations centre keeps them advised as to what is happening. In this case, the after-hours contact decided to head to the site. Once the fire brigade was at the entry gate, around 7.47pm, they called the networks operations centre and the operator opened the gate remotely for the fire trucks and personnel to go through and the fire was extinguished by 7.55pm.” According to Farmer, in the case of the Remondis fire, the fire brigade called back the networks operations centre and requested that someone come to the site and use the machinery there to further break up the rubbish piles and disperse the heat that was generating inside the decomposing rubbish. “The operator then called the Remondis contact that was already on their way to the site. That person confirmed that they were able to operate the machinery to break up the rubbish piles,” Farmer explains. “When the fire brigade was done the operator remotely opened the gates and let the fire trucks and personnel out of the site.


the process of actioning the first alarm, the high temperature alarm of 350 degrees C came through at 7:34pm, confirming the escalating temperature of a fire that was by then being viewed on the thermal cameras streaming video. “If there really is a fire, the first temperature alarm will soon be followed by the high-temperature alarm at 350 degrees,” Farmer explains. “Once the operator had visual verification that there was a fire on site 000 was called and the operator was able to tell the fire brigade how large the fire was and where onsite it was located. “Sometimes the fire brigade will request further information such as what kind of materials seem to be burning and what other potential fuel sources are onsite. The operator then advised the fire brigade that they should call our networks operations office when they got to the site so that they could remotely open the gate and let the fire trucks in. “The operator then called the contacts listed in the alarm activation for that site,” Farmer says. “Remondis contacts were advised there was a fire onsite and the fire brigade was on their way. Typically, some people choose to go to site in an alarm event and others

The rapid resolution of the fire at Remondis can be positively compared with the fire at a similar site at Coolaroo in Victoria in July. Detected late, the Coolaroo fire burned for days, releasing smoke and toxic fumes, and causing evacuations and hospitalisations. While the fast response and thorough work of the fire brigade resolved the fire, it was Visium’s thermal camera installation and VU software reporting through ICT Protege for real time remote monitoring that really made the difference. “The early response of the thermal camera means that the alarm event puts less stress on everyone involved,” Farmer says. “As a monitoring operator, you can take comfort in being certain there is a fire and knowing you have caught the problem early, that there is time for the fire brigade to get on site before there if property damage or risk to life. “The last thing you want to do as an operator is call a client and inform them that half their property has burnt down or that people were injured. Catching something as major as a fire early gives you a great deal of job satisfaction. It also helps to be able to give the fire brigade useful information, such as how hot the fire is burning and what materials have potentially caught alight. We caught the fire early, so when the fire brigade showed up onsite they put the fire out in a matter of moments. “The fire at Remondis demonstrated to me the importance of an early warning system. This fire was caught and put out before doing any damage to property or people. It was a best-case scenario made possible by the technology installed on this site and the video verification and remote managed access services provided by Visium Networks. Any business that wants to protect its property, personnel and people in surrounding areas should seriously consider installing thermal camera technology as an early warning system.” n

32 se&n

SEM1117_28remondis.indd 32

31/10/17 5:07 pm


SCEC SL4 Approved Door Monitoring Sensor

WHEN HIGH SECURITY IS NOT ENOUGH... FSS1 Superior alternative to traditional magnetic balanced reed sensors FSS1 Surface & flush mount version SCEC approved to SL4 FSS1 Product listed in the Security Equipment Evaluated Product List (SEEPL) FSS1 Worldwide patented technology FSS1 Designed & manufactured in Australia VISIT FSH AT SAGE EXPO November 9, 2017, Canberra

FSH is an Allegion Company

SEM1117_33.indd 1

31/10/17 12:03 pm

● Case study


BANGKOK EMBASSY Fredon Security won the 2017 ASIAL Excellence Award for its electronic security integration at the Australian Embassy in Bangkok. The project was not only large but complex. Fredon’s team had to balance without compromise many logistical demands and project requirements in design and during construction. REDON’S electronic security integration at the Australian Embassy in Bangkok required specialised security systems to deal with a mix of uses including public access, offices and high sensitivity areas, as well as the gruelling construction process, which took 40 months to complete in hot and humid conditions. Some of the design challenges met by the team included comprehensive pre-planning which the team described as 100 per cent design. For example, the architectural specification of floors and walls of solid and textured pre-poured concrete meant there were not the margins for error usually available by running conduit behind plasterboard. The textured wall finish required precise vertical placement of steel cable containment, and thoroughly specified support structures and access points. The requirement of the building was to be a showcase commercial, event and residential facility with a suitably high standard of finish; unobtrusive but high-quality day-to-day security, yet able to turn into a highly secure facility at the touch of a button. Custom-designed elements to overcome legal complexities of working with Thai, Australian and international requirements. For example, dealing with supply of equipment and


Colin Durey with one of the massive Gallaghercontrolled doors.

materials that were not designed to a common standard, be it varying digital interfaces or even imperial/metric measurement issues. Additional project challenges included dealing with language differences - 5 languages were widely spoken on site, as well as the physical demands of the climate. Temperatures rose to 40C inside the building before HVAC systems were available. Rising ground water during periods of heavy rain was another significant issue. And health and safety needed to consistently be maintained to Australian standards to ensure the project was incident free (which it was). Overcoming the distance problems meant an appropriate combination of on-site staff, screen/ application sharing and video conferencing, while communicating Australian standards and practises was managed via highly detailed documentation, and very detailed ITC’s (inspection and test checklists). This was necessary because embassy sites are treated as Australian zones. It had to be implemented with diplomacy and clarity between the Thai workforce and the French head contractor (BVSL). The working relationships ended up being very positive and respectful and were a key to the overall success of the project. The systems installed included a Gallagher Command Centre access control and alarm system incorporating more than 500 devices – among which were some of the heaviest motorised steel doors Fredon has ever installed. A Pelco Endura CCTV surveillance system covers the 3-building precinct, and utilises a highperformance fibre optic based data network for central high resolution and low latency viewing of feeds. A Jaques IP intercom system integrates with the access control system to provide unified management and synchronised event logging. The project in Bangkok involved all Fredon divisions – with varying levels of participation across mechanical, electrical and data installations. Fredon Technology was responsible for the installation of the A/V and IBMS (Integrated Building Management System). The group approach and collaboration resulted in the project being a strategic international success story for the entire organisation. “This is the fourth straight win for Fredon Security at the ASIAL awards, and the degree of difficulty in this job is perhaps the highest yet, because of the unique combination of scale, remote location and the inherent nature of the project, being an international embassy,” said Fredon Security managing director, Danny Bercovic. “The entire team, particularly the tireless onsite managers Colin Durey and Geoff Albertson, performed exceptionally for a welldeserved win.” n

34 se&n

SEM1117_34bangkok.indd 34

31/10/17 1:56 pm

Innovation never stops

Interlogix is committed to innovation, inspiring us to redefine what’s possible and solve the challenges that lie ahead.

UTC Fire & Security Australia Pty Ltd trading as Interlogix is part of UTC Climate, Controls & Security, a leading provider of intelligent building technologies that make the world a better place to live. Š 2017 United Technologies Corporation, Inc. All rights reserved.

SEM1117_35.indd 1 InterlogixAd_November17.indd 1

31/10/17 12:03 30/10/2017 2:00 pm pm

● Product review


GENETEC CLEARANCE Genetec Clearance is a digital evidence management system that can help speed up investigations by allowing investigators to securely collect, manage, and share evidence from many different sources, wherever they are in the world.

ENETEC has released a number of operationally brilliant software solutions – the latest being Citigraf but the one we’re looking at this issue is Genetec Clearance, a secure, Microsoft Azure cloud-based, digital evidence management solution whose conceptual simplicity belies the capabilities it delivers. Importantly, as well as managing digital evidence, Clearance manages authorised users, too. All user actions, whether internal or external, are automatically tracked to ensure that the chain of custody is maintained. It’s possible to obtain detailed information about the user, activity type, date of edits, and the IP addresses associated with any action. Simply put, Clearance allows investigators to collect evidence from disparate sources and store


36 se&n

SEM1117_36genetec.indd 36

31/10/17 3:38 pm


it in a centralized and open cloud-based system that can scale on demand. There’s really no limit to the volume and type of evidence Clearance can manage – still shots, pdfs, screenshots, document files, video footage from surveillance systems, body-worn cameras, drones, smart devices, as well as audio and data from other digital sources. Thanks to Genetec’s open architecture, you don’t end up locked in as often happens with specific solutions. You’re also future proof and are not locked to a single vendor or option and can select from multiple camera vendors as technology evolves. To ensure the integrity of data, Genetec Clearance is CJIS and FedRAMP compliant, has AES 256bit encryption and uses SHA-256 to detect any attempts to modify content. All communication with the platform is secured using HTTPS protocol and TLS certificates signed by trusted certificate authorities. An Open API integrates to 3rd party systems, including body-worn cameras, surveillance platforms and CAD/RMS systems. From an operational standpoint, clearance means that you centralise the gathering of evidence, not just for one investigation but for all your investigations. From this central management system, you can securely share evidence, transfer evidence, receive new evidence – importing is a matter of drag and drop – it couldn’t be simpler. With Genetec Clearance, your team can manage users, departments, and permissions for both. Because of its open architecture, Clearance can synchronize with existing tools to help manage cases more efficiently. It’s also possible to integrate Genetec Clearance with an existing Active Directory to help authenticate users and manage system access, to grant different levels of user permissions and to assign read, edit, or manage permissions to individuals, groups, or departments. Classification with metadata allows you to review and categorize video from disparate systems by adding customizable tags, case titles, and case descriptions, and it’s possible to access Clearance from any device. The solution is optimized for HTML 5 and it’s compatible with most web browsers, as well as mobile platforms. As well as making data gathering more secure and accessible, Clearance’s great strength is that it enhances an investigation team’s efficiency. Investigators spend less time looking for evidence with advanced search tools that help them quickly locate files without having to review volumes of data. Because all imported video is automatically converted, Genetec Clearance eliminates the timeconsuming process of manual conversions. They save even more time and gain insights into cases with map-based searches of geo-located evidence and audit trails that help monitor departmental activity. Neat, too, since all video is converted to MP4 on import, you can easily view video in the secure application without having to open a separate and perhaps unsecure video player, or download video onto hard to manage media, such as USB sticks or


microSD cards. Investigators can also tag and search evidence with geo-location. An intuitive map-based interface allows you to search for evidence in a selected area and will also cluster map markers to make the map easier to read. You can share, review, and collaborate with an unlimited number of users both inside and outside your organization securely, at no additional cost. The way this works is that you simply invite users to view or upload files with the click of a button and share only what is necessary by assigning user permissions and redacting sensitive information. And since Genetec Clearance is not licensed on a per-user basis, you can add as many users to the system as you like. Important for government users, you can share files with select external stakeholders and other agencies. New users will receive an email invitation granting them access only to what you have shared with them.

TEST DRIVING GENETEC CLEARANCE According to Genetec’s Lee Shelford, law enforcement customers typically need to correlate video from body-worn cameras with mobile phone footage from bystanders, adjacent surveillance cameras and the like. “Clearance allows them to do this in the cloud securely,” Shelford explains. “It’s agnostic, standalone, can be run on any VMS, authenticates users and creates an audit trail so you can see who has accessed the video. That Clearance stands alone is important. “Clearance is about evidence collaboration, we don’t need Security Centre for this, though this solution can be integrated with Security Center to further enhance its capabilities,” Shelford explains. “But this solution is VMS-compatible and Clearance can normalise immediately if installed with a compatible VMS codec.” The first thing I notice when Shelford starts driving Clearance is how simple the portal is. “This basic entry to the solution is deceptive – essentially it’s a search window and there are lots of different files that you’re able to index and search from,” he explains. “You can just type in names, numbers. If I was doing a search on location, I could type in say, MCG. The system would not only give me the address of MCG in Melbourne, but GPS coordinates and details of any relevant investigations I might be undertaking there.” According to Shelford, while Clearance is very

se&n 37

SEM1117_36genetec.indd 37

31/10/17 3:38 pm

● Product review


police investigations-oriented, it’s also ideal for security investigations, and can even be re-purposed to manage tasks like maintenance. “Everything is written around an SDK – every single feature, function or button in Clearance has an SDK, making the system very flexible. It allows us to start populating rules from a third-party system,” Shelford explains. “First of all, we have category and department. Category allows us to adjust for retention time. Details of a murder must be retained much longer than a petty theft and as soon as we choose a category, we change our retention time. Department selection allows us to have prepredefined groups of people who can access the investigation if appropriate – it might be security supervisors or detectives. “Then we can add additional users as well. So, that could be users within our own organisation, there could be other organisations, or it could even be an organisation that was part of an incident. In this case, the organisation can access only the small amount of information presented to them. It might be a message telling them there was an incident at their shopping centre and asking them to tick a box, fill out a report and send the report back to investigators. They can add an image, or a video clip, or any relevant information they have, including written reports and descriptions of perpetrators. And then it’s automatically uploaded and everyone that was originally in the group with access to the base functionality of the case can start collaborating to work on that evidence.”


Efficiency in layers is a big part of what Clearance delivers to investigators. “We’ve heard of an incident where police physically drove evidence on a USB stick in a police car for 50km because the file was 10Gb and it would take too long to Dropbox or email it because of a slow Internet connection,” Shelford explains. “And Clearance optimises the way we can not only share video, but also audit it. Many times, I’ve gone onto a site to do an upgrade, and I’ve seen in their downloads folder video from 3 years ago – it’s graphic information related to an investigation. Because it’s come off the VMS and gone onto the workstation, they’ve lost the chain of custody, they don’t know who’s exported that off the workstation. “Importantly, with Clearance, you just go into the audit and you can see straight away not only who has viewed it, but their public IP, a picture of them, the date that they saw it, how long they’ve looked at it, etc. You can then adjust something depending on the evidence of the case, someone could’ve commented on it. Now, security teams in big organisations are downloading hundreds of clips of video every month – it’s now possible to check and see if they’ve all been viewed.” According to Shelford, the roadmap for Clearance is impressive. “We’ve got a big team in Montreal working on this and one of the nice things that we’re bringing in is the ability to see other cameras in the area,” he says. “We’re not federated to them or connected to them, but we can access their footage if we need to. A petrol station might have 4 cameras, a convenience store might have 5 cameras and the pub on the corner might have 10 cameras inside and 5 outside. “We plot these cameras on the map in Clearance with an image of the scene they capture so if we have a serious incident like an assault, we know which cameras in the area have the right field of view to have recorded footage of the event, as well as what their retention time is. We then just click request and pop in a message saying: “We’re trying to find a camera in the area that recorded an incident at this time on this date, can you please export and upload video from your camera number 5 to assist?When the camera owner uploads the footage it simply appears in Clearance and is accessible to the authorised investigators. “This is really the whole concept – joining all these dots,” Shelford explains. “An analogue system, a cheap DVR - we don’t care, we’re not actually connected to them. All we’re doing is getting the video in an AVI file or Windows media file, and uploading it into Clearance for the attention of investigators wherever they might be. This is powerful - it means police investigators are using more of the assets around the city without needing to integrate them into a control room or to footslog trying to find cameras. It’s going to save so much time and money for city control managers.” n

38 se&n

SEM1117_36genetec.indd 38

31/10/17 3:38 pm

Comprehensive coverage Unmatched performance Great value

Maximise your security budget with TruVision Easy to install and operate, TruVision cameras, recorders, monitors and interfaces are •

competitively priced

deliver practical and reliable video surveillance, even in the most challenging environments

supported by Hills expertise, so you can develop customised solutions for your customer’s specific needs

backed by Hills Technical Services Team, providing industry leading technical support to security professionals across Australia and New Zealand

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit CONNECT

SEM1117_39.indd 1



31/10/17 12:03 pm

● Special feature

Perimeter Security

PERIMETER SECURITY For many large, high security applications, secure perimeters are a vital front line against intrusion, deterring attacks and reporting events using integrated electronic detection solutions.

PERATIONALLLY, the push for PSIMstyle situational awareness is only as effective as the edge devices that inform security management systems. What this means is that perimeter security solutions of quality are vital when it comes to delivering operational outcomes for large, high security government sites. According to Ezi Automation’s Rod Acland, every security practitioner that has learned their trade knows the holy law is to address the ‘whole of risk’ situation. “While extinguishing a fire requires cutting only one leg of the risk triangle; heat, fuel or oxygen – eliminate one and the fire is out; with security the whole solution triangle must be maintained,” Acland explains. “For instance, 1) Resistance, 2) surveillance/detection, 3) response. Unless all 3 of


40 se&n

SEM1117_40perimiter.indd 40

31/10/17 3:36 pm


these functions perform their role – the solution fails. “Not much is gained other than evidence for review after the event, if the attack or intrusion is recorded on video, while resistance yielded before an effective response could resolve the situation. Certainly, the further out the perimeter is established and effective defences are implemented, the greater the capacity for surveillance and detection to generate a response required in time to counter the risk.” According to Acland, the central operational requirement/function of any perimeter security solution is to repel attack or intrusion entirely or buy sufficient time for adequate response. What should the focus of government security teams be when they think about perimeter security? “I’d be looking to minimise the potential speed of incoming vehicle attack with traffic calming measures such as road diversions, speed humps, chicanes, outer barrier checkpoints, etc,” Acland says. “Energy encountered at an impact is calculated as the product of the mass of the vehicle times the square of the velocity. Any capacity to reduce the speed of an attacking vehicle contributes exponentially to reducing impact. “I’d also establish outer and multiple perimeter rings where at all possible. Buy stand-off, buy time for response. Pressure from a blast increases at the cube rate of the distance as the detonation increases in proximity – what this means is that distance saves lives. Further, perimeter lines must encompass 100 per cent of the boundary and the weakest link is the critical measure of perimeter strength.” Something that’s well worth discussing, too, is how important physical barriers are when it comes to perimeter security solutions and in what circumstances security mangers should consider barriers to be essential? “Perimeter establishment and hardening must be first priority wherever possible,” Acland says. “Society is learning worldwide that perimeter breaches are of negligible cost when survival of the assailant is of no priority.” When it comes to zoning – the ability to offer security managers geographic sensitivity within perimeter security solutions – how should such systems be designed, commissioned and managed? Should they be integrated into access control and intrusion and report as labelled zones or be dedicated systems incorporating video surveillance and mapping, or all these, depending on the application? “Outer perimeter security is the first step in ‘security in depth’ and an essential ingredient in consideration of the overall solution,” Acland says. “It is the point at which hostile attack and unauthorised intrusion of any kind is first encountered. 90 per cent of accompanying systems, procedures and responses are calibrated from the starting point of perimeter measures.” Should high security government end users always integrate CCTV with perimeter systems? “Of course,” Acland says. “CCTV reduces risk to, and exponentially enhances efficiency of


personnel maintain surveillance of the perimeter. Perimeter security is the foundation upon which the effectiveness and safe operation of the security response force is established.” What perimeter solutions is Ezi bringing to SAGE that government security managers, integrators and consultants should make sure they take a look at? “We will be exhibiting the spectacular innovation of the Safetyflex spring technology fixed and removable bollard system, on display for the first time in Australia,” explains Acland. “Ezi Security Systems is actively engaged in implementing this game-changing technological breakthrough at several high-risk sites in Australia. “This patent-applied innovation has enabled extreme performance in repelling hostile vehicle attacks with astoundingly shallow foundation requirements compared with any competitive system, through active energy reflection as opposed to passive absorption of energy via massive foundation and static resistance. “Coupled with the equally unique shallow foundation Wedge II; the world’s most effective roadway barrier capable of arresting hostile vehicles with ruthless efficiency, minimal interference with existing services, and instant deployment where necessary, Ezi Security systems deliver the most advanced, cost effective innovations in engineered security applications throughout the world, here in Australia, today.” According to Gallagher’s perimeter product manager, Dave Solly, over the past few years perimeter security solutions have become further integrated into security management platforms. “In a high security application, it’s important to take a multi-layered approach to perimeter security,” says Solly. “If choosing a single technology, I’d recommend a system that provides a safe and effective deterrent while ensuring a high probability of detection with minimal false alarms. To my knowledge, the most cost-effective way to achieve this is through a monitored pulse (energised) fence system. Adding additional layers and technology, such as video and discrete detection to the security solution,

se&n 41

SEM1117_40perimiter.indd 41

31/10/17 3:36 pm

● Special feature

Perimeter Security

increases the situational awareness of the site and can provide faster validation of alarms. This ensures the appropriate, coordinated response to any alarm raised.” When it comes to the central operational requirement/functions of any perimeter security solution, Solly argues each site is unique and differs in its requirements. “For a high security site, generally the central operational requirement is to protect people and assets by detecting and deterring possible attacks,” he explains. For Solly, the core capabilities of a perimeter security solution include: l Prevention – the type of physical barrier and deterrence system required l Detection – appropriate technology or technologies to deliver a high probability of detection, multi-layered solution, minimal false alarms l Management – Centralised fully integrated solution. “I would argue physical barriers are an extremely important part of the perimeter security solution,” Solly says. “Without a physical barrier, the effectiveness of the detection system is impacted and the response time to an alarm becomes critical as there is no means of delaying a breach at the perimeter.”


Solly argues perimeter solutions should they be integrated into access control and intrusion solutions and supported in a way that best suits the application. “In high security applications, perimeter security should be a core component of the access/intruder solution,” he says. “Zoning around a perimeter needs to be based on the site’s requirements. For example, in some correctional facilities, the fence detection zone is based on a fixed camera view of around 75 metres. This provides security personal with a single camera view for the alarm. Vertical zones within the horizontal detection zone is also becoming more common in high security applications. This provides an indication of not just where, but how the attack is occurring, such as climbing over the fence or crawling through it.” Solly also argues high security government end users should integrate CCTV with perimeter systems. “Yes, absolutely,” he says. “Integration of a video solution provides quick validation of an alarm and visual evidence of any attack that occurs.” Meanwhile, Saab Australia’s director sales – Civil Solutions, Darren Ramsay, argues that perimeter security solutions are vital in many high security applications. “At Saab we see that all subsystem integration is of the utmost importance, as is choosing the right vendor that will perform and meet and exceed the customers’ expectations,” Ramsay says. “The

RSC+ for SOLUTION 2000 & 3000 Because all good things come in FREES: 1. FREE cloud service with QR code IP addressing for fast and easy installation 2. FREE iOS & Android app for smartphone remote control 3. FREE push notifications With a new 5" touchscreen, output control and cloud connected IP modules, the Solution 2000 & 3000 panels provide all the pluses for installers and end users. Find out more at or email

42 se&n

SEM1117_40perimiter.indd 42

31/10/17 3:37 pm



It’s an intruder’s worst nightmare. While the intruder thinks everything is going to plan. Predator is relentlessly tracking and recording every false move. Predator Radar is designed for applications where wide area detection and tracking of moving objects is required. This ruggedised radar controlled pan, tilt and zoom, is a cost effective perimeter/wide area

Predator Radar surveillance system that surveils up to 200m radius/400m diameter with constant high speed full 1080p high Definition video. It works in all weather conditions - rain, fog, snow, mist, coastal as well as extreme hot and cold climates.

Give the predator a demo today, call us on 02 8896 4364

Predator Advertisement Final.indd 1 SEM1117_43.indd 1

30-Oct-17 11:03:56 AM 31/10/17 12:02 pm

● Special feature


perimeter most times is your first line of defence, you want a number of systems to ensure there are no gaps in your technical solution.” From the point of view of security managers, it’s tough to establish what offers the best performance for spend when it comes to perimeter security. Is it thermal cameras that push perimeter a long way out? Powered fences that make physical barriers a proactive part of a site’s security deterrence capability? Fence-mounted detection solutions? Discrete microwave or AIRS beams that allow topical applications of detection in high risk areas? VMD/IVA powered CCTV solutions like Panomera? Existing CCTV systems with IVA capability? Which is best and why? “It really comes down to what presence you are trying to create,” argues Ramsay. “If you want to create a high security area that is warning everyone to stay away, you make it a visible one with large fences, thermal cameras, fence-mounted detection and a lot of signage. If you have a high security area near other buildings and want to create an atmosphere of a secure building and have a low profile of perimeter security, you would install discrete microwave or AIRS or PE Beams and underground sensing fibre cabling with minimal signage.” According to Ramsay, when it comes to the central operational requirement/function of any perimeter security solution, because this is the first line of defence to the outside world it must be proactive in its operation, not reactive. Something else that’s important from a functional point of view is that the system be open to integration. “You want an open architecture to ensure the perimeter system will interface to a variety of PSIMs or an SMS,” he says. “It should be a system capable of operating in all weather conditions. In the same

vein, what should the focus of government security teams be when they think about perimeter security? They need to see the benefits of having a perimeter solution if serious about their security. The more layers of perimeter security, the more time the security team has to engage intruders and minimize threat of attack or intrusion into the facility or building/s. Something else that’s important is finding a value for money solution, which is always a big capex driver.” According to Ramsay, there are some applications where physical security barriers are vital. “As we’ve seen around the world, including Australia, vehicles of all sizes are being used in terrorist attacks which are mostly initiated by lone wolves,” he explains. “A physical or static barrier can be a low-cost solution, but motor vehicle barriers to control traffic (motorized bollards, boom gates and BFGs), are not a cheap installation. However, they are very effective at ensuring your site is secure from a vehicle attack. These barriers are essential for sites that have a higher risk of attack, high volumes of pedestrian movement and sites where you want to reduce the risk of vehicles packed with explosives. This will ensure any damage is minimized.” When it comes to zoning, Ramsay argues all secure perimeters should be zoned and supported by video surveillance. “Depending on the application and site being assessed, all perimeters need to be zoned and CCTV cameras assigned to the best field of view when perimeter alarms are created,” he says. “This really should be a mandatory criteria/scope required for high security (Type 1/1A) sites. “Along with security internal perimeters and EACS for movement and vehicle control, you should also have the perimeter fence detection system break the zone down into smaller segments, so you can focus on the alarm location. This ensures your security posture is proactive and not reactively looking for the alarm trigger, which could be a human factor or something else.” According to Ramsay, Saab is bringing its OneView solution to SAGE and will show interfaces to a number of perimeter fence detection systems. “This allows a multi-vendor arrangement where the customer is not locked in to one solution,” he says. “Of interest at SAGE, we will demonstrate how the security guarding service can rapidly respond to alarms created on the perimeter.” n

44 se&n

SEM1117_40perimiter.indd 44

31/10/17 3:37 pm


PERIMETER PROTECTION For any size system. THE NEW FLIR FB-SERIES thermal security camera delivers affordable, best-in-class perimeter protection for short to midrange distances and is certified by 3rd party technology partners.

FLIR offers the widest range of advanced surveillance products to fit any situation.

Learn More at

SEM1117_45.indd 1

31/10/17 12:02 pm

● Technology



Forget fingerprint computer identification or retinal scanning. A University of Buffaloled team has developed a computer security system using the dimensions of the heart as a real-time form of authentication. UFFALO’S researchers use a low-level Doppler radar to measure the heart and continually monitor it to make sure no one else has stepped in to access a workstation. The technology is described in a paper the inventors will present at next month’s 23rd Annual International Conference on Mobile Computing and Communication (MobiCom) in Utah. The system is a safe and potentially more effective alternative to passwords and other biometric identifiers, they say. It may eventually be used for smartphones and at airport screening barricades.



“We would like to use it for every computer because everyone needs privacy,” said Wenyao Xu, PhD, the study’s lead author, and an assistant professor in the Department of Computer Science and Engineering in UB’s School of Engineering and Applied Sciences. “Logging-in and logging-out are tedious,” he said. The signal strength of the system’s radar “is much less than Wi-Fi,” and therefore does not pose any health threat, Xu said. “We are living in a Wi-Fi surrounding environment every day, and the new system is as safe as those Wi-Fi devices. The reader is about 5 milliwatts, even less than 1 per cent of the radiation from our smartphones.” The system needs about 8 seconds to scan a heart the first time, and thereafter the monitor can continuously recognize that heart. The system, which was 3 years in the making, uses the geometry of the heart, its shape and size, and how it moves to make an identification. “No 2 people with identical hearts have ever been found,” Xu said. And people’s hearts do not change shape, unless they suffer from serious heart disease, he said. Heart-based biometrics systems have been used for almost a decade, primarily with electrodes measuring electrocardiogram signals, “but no one has done a non-contact remote device to characterize our hearts’ geometry traits for identification,” Xu said. The new system has several advantages over current biometric tools, like fingerprints and retinal scans, Xu said. First, it is a passive, noncontact device, so users are not bothered with authenticating themselves whenever they login. And second, it monitors users constantly. This means the computer will not operate if a different person is in front of it. Therefore, people do not have to remember to log-off when away from their computers. Xu plans to miniaturize the system and have it installed onto the corners of computer keyboards. The system could also be used for user identification on cell phones. For access control or airport identification, a device could monitor a person up to 30 meters away. n

46 se&n

SEM1117_46tech.indd 46

31/10/17 1:56 pm

ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.

Increase your own income.


Complimentary award winning HID Readers and Credentials Exclusive to ISCS

“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix


HID Mobile Access®

Secure, convenient access control via your mobile device

ISCS is Australia’s HID Platinum Partner distributor

Contact or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers

SEM1117_47.indd 1

31/10/17 12:02 pm

● Case study

Cyber Security

PHYSICAL SECURITY’S FUTURE It doesn’t take a genius to recognise that the physical security industry is undergoing what is arguably its most significant, and most rapid period of disruption and transformation; and if the industry fails to recognise, react, and respond; it will be subsumed by IT and cyber security providers. HYSICAL security’s survival offers the opportunity for some robust debate over whether this is a good or a bad thing, however, I’m going to suggest that an equal partnership between physical and cyber security will provide the best outcome. Every physical security conference and most presentations I’ve attended in recent years have had some focus on cyber security, however the level of cyber security expertise in the physical security industry remains poor at best. I speak with IP video trainers and vendors and almost every one of them laments that half their training courses are spent teaching installers about IP addressing and basic networking rather than the how to best configure, deploy, and secure their systems. Cyber security is now a board-level issue sitting at or near the top of an organisation’s risks, yet it’s not being responded to with the maturity of other foreseeable business risks. In the cyber security arena, those making decisions and setting budgets frequently lack the skills and knowledge to make these decisions. Dr Ian Levy, the chief technical director of GCHQ’s National Cyber Security Centre, recently commented: “If you call it an advanced persistent threat, you end up with a narrative that basically says ‘you lot are too stupid to understand this and only I can possibly help you – buy my magic amulet and you’ll be fine’. It’s medieval witchcraft, it’s genuinely medieval witchcraft.” I received an invitation the other week to a vendor presentation titled “How XXXXX moved to a risk-



based approach for vulnerability management”. I, and I suspect most security professionals, immediately pondered the question “Well if you weren’t basing your approach on risk, what were you basing it on? Astrology, how you felt on the day, or perhaps on whose solution had most shiny bells and whistles?” Physical security has been managing risk to both individuals and organisations in a mature, well-considered manner for many years. You may have noticed by now that these 2 facets of the security function have relatively non-overlapping skill sets which is a little surprising.

48 se&n

SEM1117_48cyber.indd 48

31/10/17 3:55 pm


People in the physical security industry seem to be failing to recognise that they are security professionals. They often have many years’ experience in protecting assets from those who would do them harm; in designing and deploying resilient security systems, and employing defence in depth. While I’m not going to suggest that there is a complete transferability of skills from physical to cyber security, the skills in which security professionals are seasoned do serve them in very good stead when considering cyber security. That’s the good news...

The not so great news is that the physical security industry has been resistant to change, and extremely slow in acquiring the skills and knowledge they require to transfer their ability to the cyber security arena. It astounds me how often systems are left on default credentials, without any network security, or exposed to the internet without being adequately secured. The Mirai Bot Net and Bricker Bot are just 2 examples of how easily these systems can be compromised. Much of the security industry continues to operate in an analogue paradigm while installing more and more IP-based equipment.

se&n 49

SEM1117_48cyber.indd 49

31/10/17 3:56 pm

● Case study


Over the last few years, manufacturers have become aware that cyber security is important, but are still well behind the bell curve in their response, compared to the IT industry. Their advanced security features often require a singlevendor system and come out of the box with the least rather than the most secure configuration. This then requires significant additional work by the integrator to deliver a robust security posture, assuming it’s even possible. When connecting a camera to a VMS, there’s no valid reason that it shouldn’t generate a unique, complex password that doesn’t need to be known given most, if not all, camera configuration can be done via the VMS. Better yet, have cameras generate mutual authentication certificates. If the installer needs to carry out additional configuration on the camera, then they should be able to retrieve that one password, or use pass-through authentication to do so. I’m not going to argue that this doesn’t introduce additional work for the VMS vendors and camera manufacturers, however, suggesting that your product is superior because it has been tested by this lab or that company does not equate to better security in a real world ecosystem. From my experience, people installing IP-based security systems typically come from one of 2 backgrounds. Those from an electronic security background, most of whom learnt their trade in an analogue world, and those from an IT background who acquired security skills at a later stage. As the descriptions suggest, the former often have an IT

skills gap, and the latter, a potential gap in security design and methodology. There are certainly providers who are skilled in both realms, however, these are the exception rather than the rule. So where do we go from here? It seems there are 3 possible futures for the physical security industry. Option 1 – Get our act together. Through a combination of determination, skill, and education, get to the point that we can deploy secure systems that achieve the required security outcome in a cyber-secure fashion. Option 2 – Hand the whole steaming mess over to IT to fix. If we don’t fix due to lack of skill, care, or capability, the IT departments will take these systems over. The security outcome may not be to the level that we could have accomplished, but at least the systems won’t be getting hacked. Option 3 – Work with IT departments to deliver both parts of the required solution. This requires a level of co-operation that we’re not used to, but will deliver the best outcome now. I expect readers will have different opinions on which outcome is preferable, so the following is my opinion only. I believe it will take 2–4 years to develop the maturity for option 1, so it’s not feasible right now, I don’t think we want option 2 as it sends the physical security profession the way of scribes, milliners, and many other professions that have been automated. That leaves option 3. We need to start working with IT departments and providers to deliver secure systems. At the same time, we need to send a clear message along the supply chain to make security easy and enabled by default. This needs to be the case regardless of camera, VMS, and configuration. With physical security frequently being responsible for as much, if not more, IT than IT departments, we need to recognise that the world is changing and act fast. *The views expressed in this article are those of the author only and do not represent those of any organisation, or necessarily reflect the position or policies or any organisation or entity. Simon Pollak is a security professional with more than 25 years’ experience in physical and cyber security, smart buildings and automation systems. A licensed security consultant and CISSP, he holds a Masters of Cyber Security and a Masters of Business Administration (Technology). Simon contributes to SEN discussing all things cyber and converged security. Follow Simon at SimonPollak and =

50 se&n

SEM1117_48cyber.indd 50

31/10/17 3:56 pm

ComNet is the Solution to Your Communication Challenge


When network

dependability is critical, the transmission products you choose today affect how your network performs tomorrow. ComNet – Communication Solutions for the Long Term • Only ComNet Offers a Complete Fiber Optic, Copper, and Wireless Communication Solution • ComNet Products are • Exclusive • Experienced ComNet Customer Care Specialists Who Understand Your Application are Here to Support Your Every Need ComNet Products are distributed by: Tel: + 61 3 9378 2450 | Fax : + 61 3 9337 9905 | 25 - 27 July 2018 | Stand A14 | +44 (0)113 307 6400 Melbourne Convention & Exhibition Centre SEM1117_51.indd 1

31/10/17 12:04 pm

â—? Regulars

The Interview

Peter Mellino, RISCO

RISCO’s commercial director, Peter Mellino, worked in electronic security for nearly 30 years before leaving the industry in 2007. Returning to security in 2016, his deep experience and long sabbatical give him a unique perspective on what has changed in electronic security and what has stayed the same.

52 se&n

SEM1117_52interview.indd 52

31/10/17 3:56 pm


WE HAVE A VERY POWERFUL CLOUD SOLUTION BACKED BY MICROSOFT AZURE, ONE OF THE BEST BUSINESS CLOUDS IN THE WORLD. ESSENTIALLY THAT CLOUD GIVES US THE POWER TO DO LAYERS OF INTEGRATION SEAMLESSLY. in computing. I would have expected the same race in the electronic security industry but while technology has progressed, we are not where we should be. Consider that we talk endlessly about IOT but it’s not entrenched yet. From my perspective, some manufacturers, installers/integrators and users are on the right path but others haven’t embraced networking yet. On the topic of IoT and integration of multiple technologies, the thing that has taken me most by surprise is how people haven’t really embraced visual verification at the control room. We have a lot of good technology but at the other end where it needs to be received, gathered, actioned, there are deficiencies. Q: It’s hard to argue with those points. Something to bear in mind, too, is that RISCO really straddles the hardware and software space with its secure cloud and app and it has done for many years – that’s the core of the business, isn’t it? PM: That’s correct. I can truly say that RISCO is very well positioned to offer some great technology to market. And be a serious all-round player from end-toend, from equipment to control room, to end user. You mentioned that key word – cloud. Yes, we have a very powerful cloud solution backed by Microsoft Azure, one of the best business clouds in the world. Essentially that cloud gives us the power to do layers of integration seamlessly. This combination of powerful cloud and excellent hardware makes RISCO the industry’s best kept secret. A: You left the industry in 2007 to join Rittal? After 18 months at RISCO, what would you say has changed?

JA: Could you tell us about the nature of the RISCO cloud?

PM: The electronic security industry has changed but it took me a while to embrace the changes – that’s because I had an expectation of where I thought the market should have been. I really felt that technology would be way ahead of where it is right now. During my time out of the industry I often spoke with people about the software and hardware race

PM: I think to answer that question, you’ve got to look at the whole architecture of our product offering in order to understand how we can seamlessly integrate into different technologies and different devices as well. Simply, a cloud-based IP platform, give us total flexibility when it comes to delivering information to layers of users.

JA: RISCO has a high-end hardware back history, doesn’t it? Does that carry through to the current product offering? PM: RISCO began as Rokonet, which manufactured arguably the best electronic security hardware in the world. I visited the Rokonet factory 25 years ago when I worked at DAS. Going to see the RISCO manufacturing plant 25 years later. I must say, I was blown away by the capacity of the organisation and what they’ve done in that period of time. In fact, the manufacturing operation reminded me of the high-quality manufacturing that the Germans do, the innovation of the Germans. I did work for 2 German companies simultaneously in the 8 years I was out of the industry so I can benchmark it. Really cutting edge, first class manufacturing. RISCO still has a great line of detection products. It’s constant development, algorithms – the development of a product range that can maintain its stability under different environments. I think we do have the most extensive range of detection products on the market. RISCO has developed an excellent range of 2-way wireless products. I think that’s probably key as well – the 2-way functionality on our panel and devices allows for highersecurity signalling, as well as remote programming of detection devices and supervision parameters. I think that’s really important in the wireless space. JA: We’ve touched on video verification but I think we should go back to it – this is really the heart of RISCO’s solutions, the ability to link video footage and snapshots with alarm events in real time then deliver them to a monitoring station or an end user, depending on the service that’s being provided. PM: For me, visual verification is probably the aspect of the RISCO solution I enjoy the most. Due to the cloud-based architecture of the product, we can now get our own panel with its alarm signals, and link it to a camera and

se&n 53

SEM1117_52interview.indd 53

31/10/17 3:56 pm

● Regulars

The Interview

programme it as follows: “If that input goes off, trigger that IP camera to take this many snapshots for video verification”. That process is managed seamlessly via the cloud. Physically, the alarm panel and the camera don’t connect, they connect at a cloud level, which gives us total power from the point of remote management. As you say, that’s our product philosophy and our design philosophy is to add other things to the cloud to expand our capacity for integration. I think what we have done with visual verification is we’ve really up-scaled what we’re doing in security and with eliminating false alarms. And for me, that’s the big ticket. We’ve eliminated false alarms. I just know with our own use in this office here, immediately something happens, when it’s just the detector you’re wondering, but the moment you have a PIR camera, albeit wireless for ease of installation, bang – you know what’s going on. And you can then make a decision on how to action it.

When it comes to visual verification, the key is our app. I think we can pride ourselves on how user friendly our app is, yet so powerful for the installer and consumer. JA: Tell us more about the app – what’s different about it? PM: The big thing here is that unlike a lot of our competitors, our app and our cloud service is free. No subscription, no download costs or anything like that - we really leverage the app to empower our hardware as a value-add that makes our solutions more appealing to the customer. In terms of functionality, the app offers plenty. You can arm and disarm on a partition or per area basis. You can view images on demand, you can view video in real time with live streaming, you can view the event history log, you can have monitoring services on demand – in this case you can activate monitoring and deactivate it from the app. You can also activate home devices, or even your outputs. You

can record video directly to the phone, if you have live view and camera on in an alarm situation and something’s happening, you can take evidence and upload it straight to Facebook. Those push notification alerts are optional because we can basically tailor this service to any monitoring station or end user. Monitoring stations often don’t like end users to have all notifications. What we have also done for some monitoring stations is implemented a delay on the push notifications to the end user because, essentially, they come through within seconds, while it might take a busy monitoring station a minute to assess an alarm event and action a phone call. Something that is neat is that there’s multiple panel control via the app – you can manage up to 15 control panels currently. All receiving notifications home, office, holiday home, whatever. Or, if you’ve got a small chain of shops you can be logged into all of them at the same time, controlling them, and

54 se&n

SEM1117_52interview.indd 54

31/10/17 3:57 pm

receiving images and notifications. The number of panels the app can manage fully – including video – is shortly to be expanded to 25. The app also handles maintenance and faults, which benefits installers or monitoring stations. In such cases, every time there’s a fault on the system or low battery you can get a notification allowing you to give the customer a call. This means there is ongoing service work for part-time self-monitored customers who might only opt for full monitoring services some of the time. JA: You’re an intrusion company but video is now at the core of your intrusion solutions, isn’t it? PM: If you look at the overall security business, we are in a video-based world. When I left the industry, CCTV was already dominant but I think you could argue the business has moved even further towards video now. That’s a key reason I’m happy with where RISCO is positioned and with our direction. We’ve certainly not lost what we do with intrusion – volumetric detection of secure spaces is vital - but by integrating video using wireless cameras and IP cameras we’re able to make the intrusion side proactive. JA: Tell us about the cameras RISCO is offering – what’s the quality like? PM: The quality is 720p, which is strong and the cameras are all P2P, so they enrol very simply and easily. The analogy I give is that it’s like actually setting up a Bluetooth in your car from your mobile phone - it’s that easy. We’ve opened up the ONVIF protocol into our panels, as well and that’s another big development. You can have an independent CCTV system as long as it’s IP-based and the cameras are ONVIF-compatible, link it to our alarm panel and monitor it via our cloud. Simply, you can also put an NVR onsite and have it act as a traditional CCTV system locally while creating an integration between the 2 and view them all from the 1 application. Basically, you create a mapping rule in the cloud. When zone 2 goes off, link a 30 second video clip from camera 2, for example. The NVR can be monitored locally but you have the alarm and the video pushed directly to the smartphone. Or, in the case of specific control room handling,


the event and the video will go directly to the control room instead or as well. Something that relates to this is monitoring services on demand, which is a new concept that allows users to . MS on demand means that if you’re on holidays you tap a button and the system sends events to the monitoring station not to you – this can be nominated on a per day basis. It’s something that we have to try and educate the control rooms on here. Q: Would you argue that electronic security technology, consumer technology and public network infrastructure have got away from many monitoring providers? PM: Correct. Again, it’s what I was saying earlier John. We’ve got the technology, but the back end in the Australian market, are not there to embrace a lot of the technology that we have. For example, our app is powerful and flexible – both for the security industry providers and end users – from the installation base to the consumer. It’s also powerful for the control rooms if they want to then hand it to their bureau clients who might use it to create different profiles, different service levels for customers. We’ve put a lot of time and effort into getting that app right. From where I stand in the marketplace no one has an app as powerful as we have. JA: In terms of alliances with monitoring providers, do you just go to the market and anybody can run these systems through the receivers or network pipes they happen to have? Or is there more to it than that? PM: There is more to it. Over the last 12 months, we’ve worked hard going around Australia, talking to the key control rooms about visual verification and how they can deliver it into their control rooms. In Australia, one of the things that we found is that many systems communicate through the 3G wireless

network with security providers. in the middle – Permaconn, Suretek, SCSI, etc. They have their receiving devices sitting in the control room at the end of a nice adaptor unit, and essentially at the other end, the alarm panel doing capture. Our concept is, we actually go to the control room and we deliver our alarm and visual verification straight into their control room handling software. We’ve worked hard with the likes of Bold, Patriot, etc. to link our products straight in. We’re giving a better solution because it’s seamless straight in and IP-to-IP. However, it will be a delicate process to educate control rooms to see it as a way of capturing that self-monitoring market, as opposed to losing a monitored line. JA: You mentioned the ability of the system to self-monitor all the way through to the device level. How is that carried out? PM: The 2-way sensors are a great feature in that they allow sensitivity programming to be undertaken from the keypad or the app. You can change the sensitivity, camera settings, turn off LEDs, things like that, or remotely or via the keypad to the device, idea being that once they are installed unless you need to physically change the location or change the device, you don’t have to go back up to it. From a technical perspective, RISCO’s 2-way comms are designed to be a lot more secure and reliable than the old 1-way comms many of our competitors use. With these, when an alarm happens, the sensor sends 3 signals - essentially the same signal back to the alarm panel 3 times - and fingers crossed, the panel receives it and passes the event on. If the panel isn’t ready to receive or is powered down, that signal is gone. Conversely, our 2-way alarm must be acknowledged back at the sensor after sending. If the sensor doesn’t receive the acknowledgement, it will continue to send the alarm signal until it does,

se&n 55

SEM1117_52interview.indd 55

31/10/17 3:57 pm

● Regulars

The Interview


so RISCO’s signalling technology is a lot more secure and reliable than many competitors. JA: You’re not just wireless though – tell us about RISCO’s hardwire bus. PM: Our Bus technology is quite different to a lot of other Bus technologies where you must daisy chain. Our Bus will allow a star configuration or a daisy chain, or a combination. But the power of the Bus technology and the information that you can get from it, and the control – that’s just amazing. We can get analytics back from detectors telling us what’s going on in the field and we can then control devices with the same Bus technology – it’s just fantastic. JA: Most people know RISCO has a seriously big sensor range but what is the control panel range at RISCO? PM: In Australia there’s Agility 3, our completely wireless 32-zone, 2-way system. The LightSYS 2 is the hybrid system, so a combination of wireless, hardwired and our RISCO Bus technology up to 50 zones. Then we have the enterprise-level Prosys Plus, which is essentially a larger version of the LightSYS with some access control to come, which will go up to 512 zones. As you suggest, we have a large array of wireless products that link into these systems - from satellite sirens, to PIR cameras, to smoke detectors, flood sensors, to wireless keypads, IP-rated keypads and a whole lot more. JA: Does RISCO have a smart home controller or is that integrated into the primary security controllers you mention here? PM: We also have a smart home device, which again, is cloud-based. This plugs into the customer’s router, and then at a cloud level it’s married up with the rest of the system. This device does have a

great deal of flexibility in terms of its ability to facilitate automation in a cloud environment. It supports Z-Wave devices with presets and schedules for your devices, as well as multiple IP cameras – in fact there’s no limit to IP camera numbers because they’re connected directly to the customer’s router and out to the cloud. Being cloudbased, there’s no limit to the hardware that can be managed by the app. This takes a bit of getting your head around but it really works. Cloud is hugely powerful. JA: What is coming up for RISCO? What should installers and end users be looking out for in the next 6-12 months? PM: I can’t give too much away but there are a number of new things coming. Early next year, our Smart

Home Gateway web arrives and we’ll also be pushing harder into access control on the cloud as well. Everything will be designed to come together in a total solution to meet the needs of the ANZ market, which is different to that of Europe and the USA. The ANZ market is different in the way product is designed, as well as the way people use it. I think in the future you’ll see a strong push towards video verification technology. We’re pioneers in that as we’ve discussed. You’ll see security, video and home automation on a single application. Installers will realise RISCO is not just about intrusion anymore, we’re not just cameras, either. We’re able to offer intrusion, video and automation - a complete control centre for the home. That’s where the future is for RISCO – and for the electronic security industry, too. n

56 se&n

SEM1117_52interview.indd 56

31/10/17 3:57 pm

SEM1117_57.indd 1

31/10/17 12:04 pm

Proudly brought to you by

â—? Regulars


Your Monitoring Specialists

1300 130 515

Telcos Circling DIY Homeowners worldwide have more security options available to them now than ever before and this fundamentally challenges the traditional alarm monitoring model, particularly in the residential market, argues Jim Dearing. N the past, if you needed to purchase a home alarm or video surveillance system typically you had 2 options: go to a professional solution provider or do it yourself. Since most all the equipment was wired and lacked interoperability, few were confident enough to go it alone. Things are different today, and we have hundreds of security systems available for doorstep delivery at the click of a button. How did this all change so quickly? In short, new market entrants have changed the face of the industry. A variety of multi-system operators (MSOs), including Comcast, AT&T and Cox Communications took the US intrusion market by storm in 2013-2015. According to IHS Markit consumer video surveillance research, in 2015 companies that were 2 years old or less accounted for 6 per cent of global consumer video-camera market revenues. By 2016, this had grown to over 9 per cent. Global DIY intrusion equipment market revenues are forecast to grow at


an average of nearly 20 per cent per year from 2016 through 2021, according to the latest data from the Alarm and Monitoring Intelligence Service. At the time of writing, 8 active security camera projects and over 100 smart home device active projects are seeking backers on Kickstarter. One of the reasons for the change is that finding an original equipment manufacturer (OEM) has never been so easy. Ambitious entrepreneurs need only look as far as or to find a variety of affordable options with reasonable minimum-order requirements. These suppliers not only speak English but also have experience producing US/EU market-ready products. Ten years ago, this was rare. Making products in Asia is not new for the security industry, but sourcing product online is. In the past, setting up manufacturing agreements or facilities was somewhat of an art form, with Western companies needing assistance or an outright local presence, to manage the careful balancing act of affordability vs. quality vs. the risk of patented technology being stolen. With the help of review systems, virtual factory tours, and thirdparty quality assurance services, an increasing number of Western suppliers believe it is no longer necessary to visit their factories in person. Lower minimum order requirements make it possible for smaller companies with limited budgets to bring a system to market. Additionally, they allow companies from other industries to test out market demand with less potential downside. The OEMs’ stock offerings have improved dramatically. Even 5 years ago a large proportion of these suppliers specialized in producing a very narrow range of product types in order to win the race-to-the-bottom on pricing. As the OEMs have grown in size they have widened their ranges. Now prospective western buyers can commission a full security system, complete with its own basic mobile application. Something else that has changed in all areas of the electronic security market, including alarm monitoring, is that software is king. More frequently, innovation comes in the form of software

and services rather than hardware. Security hardware innovation is an expensive process that also typically requires special equipment or facilities. Excepting the high cost of hiring developers, unique software or services are easier to attain for smaller companies. Funding is easier to come by – Kickstarter and similar crowd funding platforms provide prospective entrepreneurs with access to thousands of potential investors. These funding opportunities encourage new market entrants, but also give companies that would have launched anyway a better chance of surviving their early years due to the free marketing and sales leads generated from the fundraising process. The popularity and affordability of plugand-play wireless security devices has grown over the past 5 years, which were 2 of the main barriers to adoption of DIY solutions. The higher price of devices and

58 se&n

SEM1117_58monitor.indd 58

31/10/17 1:55 pm

Proudly brought to you by

Your Monitoring Specialists

1300 130 515


a challenging installation have become less of an issue for consumers. This is important for 2 reasons. Firstly, suppliers aiming their products at the DIY market typically have fewer requirements to meet before they can start selling. For example, an alarm system aimed at the higher-end commercial market would need to go through rigorous testing to meet various grading requirements before it could be sold. Additionally, the manufacturer would also have to build relationships with local dealers in order to get them to sell the new product. Secondly, as the DIY market continues to become a more viable source of revenue, an increasing number of companies will become willing to invest in it - therefore further inflating the number of new players. How will this affect traditional security providers? It depends where the bulk of their business lies. The residential consumer security space is a very different

animal to the professional security industry. As shown by the likes of Dropcam in 2013 and Ring in 2015, ground-breaking innovative solutions can accumulate market share very quickly. The easier it is to bring a new security system to market, the greater the probability that a new company will emerge next year and do the very same. Lower market entry costs also mean that current market leaders have to be wary of copycat solutions. As the number of competitors in a market increases, suppliers find it increasingly difficult to differentiate themselves. This often devolves into more aggressive price competition, which current market incumbents should eventually win due to their greater economies of scale. This is great news for consumers, but not so much for the suppliers’ margins. Another potential concern for current market leaders is the growing strength

of the OEMs in Asia. As they grow, it is only a matter of time until they try their hand at selling direct to Western markets. This has been seen time and time again in the security industry with the likes of Hikvision and Dahua, and also recently on the consumer side, with Foscam Shenzhen and Amcrest. The OEMs present a unique threat to current market incumbents because of the OEMs ability to undercut them on prices, according to IHS Markit. Despite the impressive growth rates touted by companies, consumer-grade security market revenues remain dwarfed by that of the professional security industry. For example, the DIY market accounted for just 2 per cent of global intrusion equipment revenues in 2016. Consumer video fared better, but still accounted for less than 9 per cent of the video surveillance market. This is important because it means for the foreseeable future professional security players that are also active in the consumer space will continue to enjoy the advantages lower production costs and larger marketing budgets. The retail brick and mortar sales channel - a channel of varying levels of importance depending on geographic region - remains very much closed to smaller players. Unless the supplier can prove itself through consistently outstanding market demand, it has very little chance of securing a place on the shelves of a large big box retailer. Consumers are getting smarter, too, and interoperability is becoming a key consumer concern. Consumers are wary of purchasing products that will not be able to integrate with their existing security/smart home devices. Future start-ups will need to allocate additional developer resources to ensuring that their systems are as open as possible. n * By Jim Dearing, senior analyst, building and security technology, IHS Markit

se&n 59

SEM1117_58monitor.indd 59

31/10/17 1:55 pm

● Special event

SAGE 2017

November 9, Canberra Expo guide Bringing the latest security products and technologies to government and commercial end users, installers and consultants in the nation’s capital.

CR Kennedy 23

Gallagher 17

Hikvision 7

ASIS DESK iCetana 4

Honeywell 26 Harcor 25 Gunnebo 24

Smart Identity 22 Telstra 21

eka / EVVA 19

Geutebruck 16

EZI 13


Panasonic 6

Milestone 21

Perimeter Systems 15


Axis 9

FSH 5 Traka 2

Dahua 27 LSC 20

Inner Range 14

Smiths Detection 3

CSD 11

SX Technologies 1

Chubb Security 8




Catering stattions

MELBOURNE ROOM Critical Arc 28

Registration area

Void to foyer

Digital signage directing guests

Paessler 30 Johnson Controls Security Products 29

SECURITY & GOVERNMENT EXPO Hotel registration November 9, 2017 Canberra

Hotel registration


Magnetic Automation 34


Western Digital 32

Assa Abloy 31


SEM1117_60sage.indd 60

Registration area

31/10/17 3:58 pm







ACT Chapter

Exhibitors 0l SX Technologies 02 Secure Edge Technologies 03 Smiths Detection 04 iCetana 05 FSH 06 Panasonic Australia 07 Hikvision Australia 08 Chubb Security 09 Axis Communications 10 ISCS 11 Central Security Distribution 12 Saab Australia 13 Ezi Security Systems 14 Inner Range 15 Perimeter Systems 16 Geutebruck 17 Gallagher 18 Milestone Systems Australia

19 eka / EVVA 20 LSC 21 Telstra 22 Smart Identity 23 CR Kennedy Surveillance Solutions 24 Gunnebo 25 Harcor 26 Honeywell Building Solutions 27 Dahua Technology Australia 28 CriticalArc 29 Johnson Controls Security Products 30 Paessler AG 31 Assa Abloy 32 Western Digital 33 ASIS ACT 34 Magnetic Automation SEM1117_60sage.indd 61

31/10/17 3:58 pm

● Product review


HELIX CONNECT O2 HELIX Connect O2 is a smart home solution from EOS Australia. Built by Resolution in the U.S. the wireless control panel represents the future of intrusion detection. Thoughtfully designed to best manage today’s hybrid applications, Helix Connect O2 is affordable, expandable and highly functional.

OS Australia’s Connect O2 smart home solution is a solid solution combining security, automation and energy management functionalities in an affordable and flexible package. What’s neat about Helix is that it very simply combines life management functionalities with security imperatives. Something else that’s nice about the system is just how easy it is to commission and install. The Connect 02 app, too, is noteworthy. It’s solid, giving all sorts of information and capability. Built around the hub principle, Helix has a compact controller - it’s 22cm high, 22cm wide x 7cm deep and with battery installed it weighs 850g. You can locate the controller anywhere you like there’s no interference with wireless comms. In a domestic of commercial environment that could be tucked away in a cupboard, on top of a bookshelf (best for local wireless support) or


62 se&n

SEM1117_62helix.indd 62

31/10/17 4:31 pm


alongside other networking equipment in a media room or study. The controller delivers 24-hour backup from its 2000mAh NIMH battery, supports 96 wireless zones, has a 90dB siren and integrates comms paths including Z-Wave, Fast Ethernet, 802.11 b/g/n Wi-Fi with WPS, and 3G, which can be configured as the primary or secondary alarm reporting path. Local sensor comms is handled by a CriptixTM crystal-based, 433MHz security sensor receiver which incorporates encryption. Open air range between controller and sensors is 450m and the controller operating temperature is rated from -10 to 30C. We have the CO2-RE6110S-HX-A-Helix Panel to test drive. This controller comes in a kit form with a very neat HeliPAD keypad, which has a Bluetooth Smart RF connection between keypad and controller. The HeliPAD has an e-ink capacitive

THE CONNECT O2 SOLUTION IS EXTREMELY WELL THOUGHT OUT WITH SIGNIFICANT LATERAL CONNECTIVITY TO EXISTING CONTROL PANELS, SENSORS INSTALLATIONS, AS WELL AS HANDLING AUTOMATION. touch screen display which is at once retro and very modern. The HeliPAD offers up to 4 years’ service from user-replaceable AAA batteries. Inside this controller are expansion cards for Z-Wave for automation, GSM for alarm reporting and interactive services and Wi-Fi for alarm reporting and home interactive services over the local network. Our sensors include a Co2-RE622 reed for windows or doors with a gap of up to 1-inch and up to 6-year battery life, and a Co2-RE610P-PIR Pyroflex IR sensor with HighBar signal processing for improved performance – this device has pet immunity and a detection angle of view of 44 degrees with a 90-degree angle field of view to each side. Pyroflex sensors have a maximum battery life of 8 years. There’s also a wireless internal siren. Of course, this is not the totality of the Helix ecosystem when it comes to sensors. There are standard reeds with 15 years’ battery life, tilt sensors which trigger at 30 degrees, a gimbal-mount PIR, a glass break sensor, a temperature range sensor, a tri-mode environmental sensor able to detect rising water levels, extreme high temperatures and extreme low temperatures reporting as 3 distinct zones. There’s also the PINpad keypad offering single button arming and a panic alarm that can be carried in the car or in a purse, or located in a bedroom. And there’s a tactile keyfob with LED indicator and recessed buttons, as well as a panic pendant. The pendant is designed for emergency initiation and is water resistant. Other interesting inclusions include an IGM able to take over Honeywell Vista, DSC PowerSeries and Interlogix Concord or NX panels. Of note, the Connect O2 IGM gives smart phone security management and Z-Wave home automation management of locks, lights and other appliances. There’s also a wireless-to-wireless translator, which is able to accept up to 63 wireless zones and translate them from one protocol to another. There’s also a hardwire to wireless translator, which allows existing hardwired detectors to be brought into the wireless fold.

se&n 63

SEM1117_62helix.indd 63

31/10/17 4:31 pm

● Product review


At the heart of system management from the point of view of users is the Connect O2 app, which runs on Connect O2’s fully encrypted private network and reports to SecureNet-enabled monitoring stations. Users can manage security, automation and energy management functions by controlling Z-Wave and/or Wi-Fi devices, as well as receiving event alerts in real time. The system can also report alarm events directly to professional monitoring services. Sweet, from the point of view of installers, are comprehensive installer tools build into the app, which allow the fast creation of new accounts in the field. Installers can add and activate accounts, manage service plans and edit customer details. Authorised users can also manage alarm responses, contacts, panel codes, response instructions, test status, gateways and system configurations. Driving Helix Connect O2 is very simple. Enrolment is as simple as it should be – the controller detects the ecosystem of devices by scanning or manual entry and recognises them – you can label them in the app. Our solution is compact with just a keypad, reed, PIR and siren. Downloading the app takes nothing more than a visit to the App Store or Google play and the panel and app-enabled smart devices find each other in an instant. You set up

parameters relating to users, zone labelling and reporting during the commissioning process. It’s all very simple to manage. Arming and disarming is easy too, whether using the neat HeliPAD or the mobile app. According to EOS Australia’s Norman Wee, the controller and all devices are made in the U.S. by Resolution, which is particularly strong in hardware and the system is supported in the cloud by SecureNet, which is strong in software and cloud monitoring solutions. “At the heart of the system for installer and end user is the app, which allows arming, disarming, configuring of tamper, setting up rules and monitoring system health or the state of multiple client systems,” Wee says. “You can see everything in the app – trouble, tamper, whether devices are armed, which devices have low batteries. You can drive lights, or create rules to manage automation. Doorbells come up, garage door controllers, smart locks with Z-Wave cartridges. “When setting up, all sensors have bar code and serial number – you can enter new devices manually or just bar code scan them and then add and label new zones, setup up active arming, click save. The system refreshes automatically. From an installers point of view, it’s very easy. They pair it up

64 se&n

SEM1117_62helix.indd 64

31/10/17 4:31 pm

AT THE HEART OF THE SYSTEM FOR INSTALLER AND END USER IS THE APP, WHICH ALLOWS ARMING, DISARMING, CONFIGURING OF TAMPER, SETTING UP RULES AND MONITORING SYSTEM HEALTH OR THE STATE OF MULTIPLE CLIENT SYSTEMS. by locating sensors roughly where they want them, they can see signal quality as they are installing – the signal strength is indicated by the app.” According to Wee, trouble shooting is easy thanks to the dealer portal. “Installers can log into the portal on a laptop or workstation, log into the relevant account and everything relating to that installation will be right in front of them,” he explains. “Remote access saves a lot of time – they don’t need to drive to site unless something is seriously wrong. Installers can also see which accounts are in alarm, click on them and hop straight into the panel, see the MAC address, the plan they are on, panel settings, log into panel settings and check the applied settings, check how the panel is connected. They can get low battery signals, trouble signals from sensors. A lot of work has gone into the back end.” “SecureNet does the interactive services and they also have a dealer portal to manage their side of the system,” says Wee. “The way it’s designed, installers can set up Securenet accounts on the fly.” According to Wee, there are also cameras that can be integrated – these are residential quality but they allow easy video verification of alarm events in real time. “Through the app, users can also see energy consumption with a graph showing usage,” he says. “Then there are custom scenes – these can be more complex or quite simple - arm away turn lights off or alarm off turn lights on. The idea behind this is lifestyle – to make consumers more comfortable

while giving customers and installers a serious security and automation system that is flexible and expandable. “There are many home automation solutions appearing on the market that compete with security systems, but those home automation type systems are not capable security solutions and they lack the degree of capability you see here,” Wee explains. “The Connect O2 solution is extremely well thought out with significant lateral connectivity to existing control panels, sensors installations, as well as handling automation. It’s an excellent system that offers end users and installers a higher level of flexibility and functionality.” n


Up to 96 zones


Z-Wave, Fast Ethernet, 802.11 b/g/n Wi-Fi with WPS, and 3G


Huge sensor range


Z-Wave home automation


Remote app management


Securenet professional monitoring


A range of takeover/integration options.

se&n 65

SEM1117_62helix.indd 65

31/10/17 4:31 pm

● Special report

Security Industry Awards 2017

HIGH PERFORMANCE THE 22nd annual Australian Security Industry Awards for Excellence - an ASIAL initiative and the 3rd annual Outstanding Security Performance Awards (OSPAs), shared a prestigious awards ceremony and dinner in front of a sell-out crowd at Crown Melbourne on 19 October. Winners included: Schneider Electric Buildings Australia and Fredon Security – Joint winners for Integrated Security Solution Large over $500,000. MSS Security – winner for Outstanding Security Partnership, Crown Perth – winner for Outstanding Training Initiative, SNP winner for Gender Diversity, Wilson Security won the Indigenous Employment Award, Individual Achievement - General Security Award was won by Brad Gorman of SNP Security, Individual Achievement - Technical Security Award was won by Cong Vu, Chubb Fire & Security, Product of the Year - Access Control went to Inner Range Inception, Product of the Year – Alarm winner - Gallagher Security Pty Limited for Gallagher Class 5 Intruder Alarm System and Product of the Year - CCTV IP System/Solution was won by Viasec for Check My CCTV. Physical Security Winner was Leda Security Products for Surface mounted barriers, Special Security Event or Project - Large (>$500,000) Award Winner was SAPE Industries Pty Ltd for Aurukun Shire Council CCTV. In the OSPAs, the Outstanding Information Security Company Award went to Aleron, Outstanding In-house Security Manager Award went to Noah Magnus, Outstanding In-house Security Team Award went to Gold Coast Commonwealth Games Corporation, Outstanding Security Consultant Award winner was Rachell DeLuca of Arup, Outstanding Security Officer Award was won by Sam Kennard of Wilson Security, Outstanding Security Partnership Award was won by MSS Security and the Outstanding Training Initiative Award went to Crown Perth.


66 se&n

SEM1117_66asial.indd 66

31/10/17 1:54 pm

se&n 67

SEM1117_66asial.indd 67

31/10/17 1:54 pm

● Regulars


Editor’s choice

What’s new in the industry.

HIKVISION INTRODUCES ULTRA-LOW LIGHT, ANALOGUE HD VIDEO l Hikvision has introduced the next generation in analogue HD surveillance solutions with the new Turbo HD 4.0 range. This new range has the ability to send power as well as 5-megapixel video images over conventional, single, coaxial cable. It also takes advantage of Hikvision’s revolutionary new H.265+ video compression technology, which provides astounding savings on both bandwidth usage and NVR storage requirements. In addition, Hikvision has introduced a 2-megapixel, ultra-low light, Turbo HD, range of cameras which is powered by Hikvision acclaimed Darkfighter technology. Distributor: CSD Contact: 1300 319 499

GALLAGHER COMMAND CENTRE l GALLAGHER Command Centre is the central management platform at the heart of the Gallagher security system. v7.70 offers greater convenience, functionality and efficiency than ever before. The innovative software provides a powerful and versatile feature set, enabling system operators to configure, monitor and control their security system with complete visibility of events as they happen. Distributor: Gallagher Contact: +61 2 9412 4477

WISENET 20MP & 8MP MULTIDIRECTIONAL CAMERAS FROM EOS l WISENET 20MP and 8MP multi-directional cameras are now available from EOS Australia. The new cameras feature the Wisenet 5 chipset, which exceeds the benchmark for multi-sensor camera technology by incorporating features such as 60fps, 150dB wide dynamic range, low light performance of 0.0015 lux B/W, 0.015 lux colour and digital image stabilisation with a gyro sensor. There’s also built-in, license-free, advanced video analytics. The camera provides the ability to provide a wide coverage in extreme detail, ideal for many applications such as lobbies, airports, railway stations and shopping centres. Distributor: EOS Australia Pty Ltd Contact: +61 2 9749 5888

68 se&n

SEM1117_68prods.indd 68

31/10/17 1:53 pm

SIFER KEYPAD FROM CSD l INTRODUCING the SIFER Keypad with inbuilt SIFER smart card reader from Inner Range. The combination of an IP67 rated keypad and smart card reader allows; card or pin, card only, PIN only or dual credential card and PIN to be set on a per user basis. Connected on the multi-drop RS-485 bus, this device employs 128-bit AES encryption from the card/keypad through to the door module and 13.56 MHz Mifare DESfire EV1 card format, which provides a far superior level of security than that of traditional Wiegand-based keypads and card readers. As SIFER keypads utilise a superset of the OSDP protocol, the keypads may also be deployed on any system capable of using OSDP. The SIFER keypad is ideal for use in all residential, commercial, government and enterprise facilities where higher levels of security are required. Distributor: CSD Contact: 1300 319 499


CONNECT WITH BOSCH’S REMOTE SECURITY CONTROL PLUS APP l BOSCH’S new Remote Security Control Plus (RSC+) app for Solution 2000 and 3000 will be available this month for iOS and AndroidOS devices. The new app builds on the existing features of remote security control in order to provide an experience that sets new standards in notification, intuitive control, and ease-of-use. When used with the new B426-M and B450-M Cloud Connect communications modules, the RSC+ app becomes simplistic to setup – simply plug the panel into an existing network connection or insert an active data SIM, enable cloud connect then scan the onboard QR code to get the panel online. There’s no need for IP addressing or complicated configuration of ports on the router – if there’s an internet connection, you’ll be able to get online instantly. For adding more users, it’s simply a case of scanning a QR code and entering your passcode. Each user of RSC+ app is able to receive push notifications from one or multiple panels which they can configure so that they are only seeing what matters to them. Once you log in to the panel via the app, you can read the full panel history and see what’s been going on while you’re not around. Arm or disarm your alarm panel, see the status of your sensors and isolate them if required, or control up to 20 outputs devices connected to your panel such as garage doors or heating systems – all of these things are available within the RSC+ app the moment your panel is connected.

l GALLAGHER Class 5 Intruder Alarm System provides users with a fully encrypted and authenticated, compliant Class 5 level alarms system, the highest level of the AS/NZS 2201 intruder alarm system standard. Class 5 systems provide high security protection against sophisticated attacks to intruder alarm systems. Gallagher’s Class 5 Intruder Alarm System has been verified by an independent test laboratory, with additional endorsement in progress with IANZ (International Accreditation New Zealand), New Zealand’s premier accreditation body. Distributor: Gallagher Contact: +61 2 9412 4477

Distributor: Bosch Security Systems Contact: 1300 1 BOSCH (26724)

se&n 69

SEM1117_68prods.indd 69

31/10/17 1:53 pm

● Regulars


Editor’s choice

What’s new in the industry.

ICT RELEASES NEW 17-INCH PROTEGE TOUCHSCREEN ENTRY STATION l ICT’s new 17-inch touchscreen entry station is designed to operate as a standalone unit, or as part of a complete integrated ICT Protege security management solution. The entry station provides an intuitive interface for visitors to communicate with tenants, building management, a concierge, or even to off-site locations, such as directly linking guests with corporate housing owners. When integrated with a Protege GX or Protege WX controller, you can program functions that enable you to use the entry station to unlock the doors leading to your apartment, trigger lighting along the way, and even summon the appropriate elevator. With full VoIP capability, the entry station offers seamless communication between the front door and the tenants listed in the directory, and the built-in HD wide-angle camera provides tenants with a simple way to visually identify visitors. The large colour screen provides convenient advertising real estate when not in use and can be used to display revolving adverts, including property for sale, leasing opportunities, add-on services, or community messages. Whether entry is granted by a tenant, offsite property manager, or onsite staff, every event is logged to provide a complete audit trail. Distributor: ICT Contact: 1800 428 111

INTEGRATED RADAR & PREDATOR 1080P HD CAMERA FROM SENSING PRODUCTS l PREDATOR Radar from Sensing Products is designed for high security applications where wide area detection and tracking of moving objects is required and ONVIF compliant to work with most VMS solutions. Predator works in all weather conditions - rain, fog, snow, mist, coastal as well as extreme hot and cold climates. Predator Radar scans 360 degrees once every second to detect and automatically track multiple objects using Time Share alarm handling - ensuring alarms are evenly or priority handled. Alarms output facility allows notification to the operator that a target is being tracked, even when the camera is looking elsewhere. Incorporating software features such as controlling Predator intelligent illumination to give white light spotlight tracking for Human activation or infrared for vehicle activation. Features include attack detect preset return, intelligent lighting control, 360-degree enhanced low light cameras with mono video images as low as 0.0008 lux (no illumination), full range of patent pending dual IR and white light options giving up to 200 metres of IR lighting and/or white light giving colour at night. Sirius illumination combines narrow, medium and wide-angle lenses to give a wide range of light spread (from 9-50 degrees). Choice of standard IR 850nm or covert 940nm available. There are 24 privacy zones with simple joystick positioning and sizing, edge recording, 10-year marine paint option, continuous/FTP upload/ network loss/alarm scheduled recording option, 8 metre mounting height and more.

COMELIT QUADRA IP COLOUR INTERCOM KIT FROM CSM l THE new Comelit ‘Quadra’ IP Colour Intercom Kit is an expandable solution and includes a ‘Quadra’ style Entrance Panel, ‘Mini’ Handsfree Wi-Fi Monitor and associated POE Switch and injector. The monitor enables Wi-Fi or hardwired connection to the premises Wi-Fi router which in turn allows Users the ability to use the free Comelit VIP Smartphone app to manage all calls. App connection utilises Wi-Fi when within router range and 3G when on the move. The Comelit VIP app enables users to receive visitor calls, see the visitor, speak with the visitor and unlock the associated door, from anywhere around the world. Like all solutions in the Comelit VIP (IP) range, additional entrance panels and indoor monitors may be added at any time. Distributor: Consolidated Security Merchants Contact: +61 3 8545 9813

Distributor: Sensing Products Contact: +61 2 8896 4364 70 se&n

SEM1117_68prods.indd 70

31/10/17 2:46 pm

AXXON INTELLECT FACIAL RECOGNITION JUST GOT SMARTER l Axxon has released version 7.1 of Face Intellect, integrating the latest facial recognition engines from world leading technology partners; Tevian, VisionLabs and Cognitec which has improved accuracy and performance. The latest release incorporates the pixilation of faces of non-persons of interest to improve the focus of operators on critical persons of interest or for privacy concerns. For further information on this awesome innovation in technology contact your local CSD branch. Distributor: CSD Contact: 1300 319 499

LSC RELEASES NEW K-RADIO 900 KEYPAD FROM AMC l The K-Radio 900 Keypad features an integrated radio receiver operating in the 916MHz band and can store up to 56 2-way radio devices onboard (32 devices, 20 remote controls and 4 sirens). The 128-bit AES encryption (Advanced Encryption Standard) ensures maximum protection against attempts of cloning or masking the signal. Communication between the control panel and devices is bidirectional for each type of transmission which must be confirmed by the receiver, allowing to obtain the maximum safety concerning the outcome of communication and to avoid congestion of the radio signals. Installation and maintenance are made easier by the total lack of switches and potentiometers hardware; all devices are configurable by the control panel. The learning mode of the devices can be automatic by means of self-learning by the control panel or manually by means of coding of each individual device. Distributor: LSC Security Supplies Contact: 1300 646 269



l Gallagher Visitor Management is an optional feature of

l THE exciting release of Integriti version 17.1 will feature an entirely redesigned vector-based schematic maps/floor plans and icons. This is ground-breaking since typically Vector Maps are only found in incredibly expensive custom engineered software. With Integriti, Vector Maps are included in the base package with no additional license required. Likened to Google Maps, Vector Maps can be scaled and zoomed without any loss of quality or pixellation. Previously, multiple maps were needed to transition between significant zoom levels, but now Vector Maps allows for a single highly detailed map to be used. Complex Vector Maps can be simplified by using dynamic visibility and scaling. This allows icons, shapes and labels to only appear at specific zoom levels resulting in a clutter-free map where priority items are visible and readable. Integriti Vector Schematic Maps will be on display at SAGE 2017.

Gallagher Command Centre, providing a targeted user interface for a receptionist managing visitors onto and off-site, including updating visitor details, capturing photos and printing visitor labels, assigning escorts and card and visitor access. Visitor self-registration capability is available using the touch-screen enabled Visitor Management Self-Registration Kiosk. Distributor: Gallagher Contact: +61 2 9412 4477

Distributor: CSD Contact: 1300 319 499

se&n 71

SEM1117_68prods.indd 71

31/10/17 1:54 pm

● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: Is there a relatively simple way to search for electronic listening devices? We’d like to implement procedures to create awareness without needing professional sweeps every few weeks in certain sensitive departments. Something else we’ve discussed is training a technical member of our team to undertake sweeps. What would you recommend? A: It’s a bit Man from U.N.C.L.E. but manual inspections are a good place to start. Have your team develop an awareness for tell-tale signs of electronic listening devices. Doing this properly means becoming familiar with certain common types of listening device. If you’re serious, you should buy some and use them for practice. Such devices might be obvious but in other cases the signs are likely to be subtle. A compact unfamiliar device plugged into an AC socket, a device with trailing wires or mini antenna in a location it shouldn’t be, such as under a desk or behind curtains. The modern office does not make this process any easier, given the blue spaghetti of cabling and the mounds of legacy hardware many of us have laying around. Depending on the layout of the office environment it might be possible to see if phone sockets have been tampered with. Something else to take into account is devices residing on phone cables – these clamp around the wires and interpret electrical signals passing through the wires. Some devices are almost entirely passive – they’re tiny – the size of the tip of your thumb, a few millimetres thick and incorporate a long-life

Our panel of experts answers your questions.

lithium battery and a microSD slot of up to 128GB. These devices can be left in place and then collected later on – they don’t actively transmit/stream recordings. Such passivity makes them a special challenge for security teams. The most challenging situation will be listening devices installed inside electronic equipment, or devices that serve a dual purpose, such as USB sticks, transformers or power boards, which appear no different to the real thing, yet incorporate listening technology. For this reason, it can be simpler for organisations to have all sensitive meetings in designated clean rooms stripped of electronic devices and infrastructure, and regularly swept. If you’re going to buy your own equipment and test for radio frequencies there are a few things to bear in mind. For a start, buy a unit with a quality aerial. In basic design this aerial will be connected to the top of a parallel tuned circuit that is resonant at the same frequency as the listening device’s transmitter. This airy statement should be taken with a liberal dose of salt. The nature of covert surveillance devices is that their frequencies are unknown – this means the bandwidth of the tuned circuit of a radio transmission detector (essentially an antenna, a tuned circuit and a sensitive ammeter) needs to be wide. Because this is electronic security, there’s a caveat. The bandwidth can’t be too wide or the circuit

loses sensitivity – it’s a juggling act. When it comes to investing in detection devices – there are plenty of options but you should make sure you speak to professional suppliers. At the top of the tree are products like the PRO7000FX, which covers digital and analogue devices and multiple bands, as well as having ultrawide frequency response. The PRO7000FX will alert security teams to the smallest of transmission incidents, which is important. There are plenty of other capable units that cost less than the 7000FX’s $A2500 but if you’re using the product regularly to protect the R&D or strategic planning of a serious organisation, make sure you don’t spend a few hundred bucks on a toy off the internet. Buy a quality product and learn how to use it properly with support from covert tech professionals. Q: Is it fair for us to generalise camera performance based on maximum useful ISO for a given aperture and shutter speed? Can we expect most cameras to perform similarly at similar ISO amplifications? A: If only that was so. I think it’s a mistake to imagine modern IP cameras don’t possess a fat dollop of woo – much more so than the dependable old vidicons ever did. Modern IP cameras are not predictable and that applies to modern DSLR cameras, too.

Nice image – but it required F16 at 20 seconds

72 se&n

SEM1117_72help.indd 72

31/10/17 1:52 pm


too. Camera types might have the same sensor but if the mapping is different, the lens introduces flare, the processor is more powerful, or the firmware engineering is superior, then at the same focal length, aperture, shutter speed and ISO you are going to get quite different performance levels. Low light CCTV is tough – the truth is that you sometimes need more light. We’ve seen Sony’s VB770 offer great performance thanks to muscular ISO capabilities but most IP cameras are not so blessed. In the face of a balancing act between low light on one hand and sharpness, low blur and low noise on the other side, there is always going to be a point where things come unstuck. Comparing image streams is the only way to see whether one camera offers crisper imagery with less amplification noise. This noise can sometimes feel like veiling flare that occurs at night when the lens is not provoked by direct sources of light. Another camera at the same settings may exhibit none of this noise. Something to bear in mind is that engineers sometimes rob Peter to pay Paul when making the shift from one camera generation to another. In such cases, you might gain remote zoom and focus, integrated IR and increased amplification but you may be making do with a processor that can’t keep up. In this case the processor can’t deal with noise, blur or the challenges of dealing with headlights when the camera is exposing for a dark scene.

Q: What are the best hard drives for surveillance applications? Do we need 7200rpm units or are will lower specifications be adequate? A: The key thing with CCTV HDDs is to use drives with constant duty specifications, that are designated surveillance drives or enterprise drives. Professional units will likely include firmware tools to assist emergency recovery of data in failed drives. HDDs in a surveillance application will bear a much greater load than drives in personal or business machines – in smaller NVR systems the drives may be working 24x7 their entire lives. When it comes to speed, 7200rpm is the benchmark for speed and cost but in most CCTV applications 7200rpm (100MB/s and 90 inputs and outputs per second) is unnecessary unless you’re running a serious surveillance control room in real time with hundreds or thousands of cameras. Systems used for sporadic live monitoring and investigations will do fine with 5400rpm (75MB/s sequential and 65 inputs and outputs per second). Prograde drives are likely to be rated to higher temperature but it’s important that they be installed sympathetically in air conditioned network rooms where there is good airflow and inside hardware with redundant fans and/or heatsinks.

items are stored and we want to discreetly detect intrusion to its entry – what would you recommend as being most reliable option? A: This depends on the controller you have at the site. It also depends on the distance the remote building is away from the security system’s infrastructure, as well as the nature of terrain and infrastructure links (pits and conduits) between key locations. If the controller is hybrid or has wireless capability then a compatible wireless sensor will be more than adequate as long as you select something that is designed to handle outdoor applications and has the range to cover the required distance in all conditions. This might be a RISCO WatchOut dual technology sensor which is IP-rated and has a sunshade. There are a number of balls to keep in the air with this application, however. We don’t know the distances involved, we don’t know the nature of the ground (lawn or concrete pan), and we don’t know the approaches. It would be possible to install a wireless sensor or beam solution on the remote building. It might also be possible to install a long-range sensor or beam on a primary structure whose detection zones include the approaches to the remote building. n

Q: Wired or wireless for an outdoor application? We have a site with a remote building in which high value se&n 73

SEM1117_72help.indd 73

31/10/17 1:53 pm


events SECURITY l Special Feature: Perimeter Security l Product Review Genetec Clearance l The Interview: Peter Mellino, RISCO l Case Study: Remondis Thermal Fire l Physical Security: Case for Convergence? l Case Study: Control Room Upgrade l Review: EOS Helix Security & Automation l Australia Security Awards & OSPAs

SEM1117_1cover.indd 1

PP 100001158



29/10/17 12:36 pm



Security and Government Expo 2017

Date: November 2017 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 Security and Government Expo is a one-day expo with over 30 companies promoting their technologies and products in the nation’s capital. SAGE brings together government and commercial end users, consultants, integrators and installers in Canberra and the ACT to see the latest security solutions in a relaxed and informal atmosphere.

Smart Summit Asia Date: November 30 - December 1 Venue: Suntect, Singapore Contact: el: +44 (0) 330 3353900 The Smart Summit is a 2 day conference and exhibition covering the Internet of Things (IoT) ecosystem and its impact on the digital society. With 4 in-depth event tracks and over 80 leading speakers, no other IoT event covers the Smart Home, Smart Cities and Industrial Internet of Things in as much detail.

SecTech Roadshow 2018 Dates: May 2018 Venues: Melbourne, Brisbane, Sydney, Adelaide and Perth Contact: Monique Keatinge +61 2 9280 4425 SecTech Roadshow in it's 4th year takes leading electronic security manufacturers, distributors and wholesalers on a national tour.

Security 2018


Date: July 25-27 Venue: 2018 Mebourne Convention and Exhibition Centre Contact: +61 3 9261 4662 Security Exhibition brings the largest selection of electronic and physical security suppliers in Australia to one destination for 3 days.


SEM1117_74events.indd 74

31/10/17 2:35 pm

SEM1117_75.indd 1

30/10/17 11:23 am

IRISrecognition HIGH SECURITY MADE SIMPLE EyeLock uses video based technology to look at more than 240 unique characteristics in each iris. A unique, encrypted user template is created using EyeLock’s proprietary algorithm. Iris authentication process firstly detects liveness and then compares the Iris data in seconds.

1300 319 499 VIC: Mulgrave, Tullamarine NSW: Seven Hills, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta SEM1117_76.indd 1

30/10/17 11:23 am

Sen nov17  

Security Electronics & Networks Magazine is a monthly publication whose content includes product reviews and case studies of video surveilla...

Sen nov17  

Security Electronics & Networks Magazine is a monthly publication whose content includes product reviews and case studies of video surveilla...