SEN November 2018

Page 1

NOVEMBER 2018 ISSUE 404

SECURITY OPERATIONS & TECHNOLOGY l Security Awards For Excellence & OSPAs 2018 l Case Study: Transport Roads & Maritime NSW l New Security Technology at SAGE 2018 l Product Review: Fog Bandit l Security Management: How Effective are Bollards? l Monitoring: Telstra Targets Security, IoT l The Interview, Tiago Ferreira, Genetec l Vehicle Mitigation in Public Spaces

PP 100001158

SEM1118_1cover.indd 1

25/10/18 3:42 pm


EasyIP 3.0 Oceania 2.pdf 1 2018/10/22 17:54:48

R

C

M

Y

CM

MY

CY

CMY

K

EasyIP 3.0

Simply Powerful EasyIP 3.0 Solution. The Easier Journey To Better Security. The all-new EasyIP 3.0 product range is simple to install and use, and is available at a budget-friendly price. Rarely does an affordable system come with such powerful functionality: 4K Ultra HD with true WDR, H.265+ Smart Codec compression technology and ultra-low-illumination. New cameras in the range also provide greater analytic functions, featuring on-board Video Content Analysis options. Its power, combined with its easy installation and user-friendliness, means the EasyIP 3.0 solution requires significantly less operator input to deliver a significantly more efficient and effective security solution.

Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com

SEM1118_2.indd 1

www.hikvision.com.au

25/10/18 3:33 pm


editorial S E CU RI TY E L ECTR O NI C S & NETWO R KS NOVE MBER 201 8 ISSUE 4 04

By John Adams

THE INTERNET OF SCARY THINGS

E’VE suggested before in SEN that the internet of things is really the internet of our things – security, safety and automation things, with a frill of glitzy sub systems to thrill punters. But is this true, or is there an internet of everything just beyond immediate perception? A strong case could be made that the latter is correct and that expanding connectivity and the advent of 5G will drive a new generation of devices, allowing the monitoring of any connected thing via cloud. But there’s much to be done before such solutions become prevalent. When you open your mind to IoT, you realise the monster has so many moving proprietary parts, so many interest groups – not only in hardware but in operating software and firmware, too, that consensus is practically impossible. In some ways internet of things creates as many issues as it resolves, and these issues must be addressed if widespread IoT is to be realised. The first of these issues concerns privacy. The notion that anything can be tracked is disconcerting for the public, as well as for many people in the security industry. Privacy issues also mean there are fears around use of some of the electronic security industry’s most capable future technologies, such as analyticsenabled CCTV cameras and microphones. Concerns in the community are larger than that of hacking. There’s a distinct lack of trust based on the technological and moral failings of corporations and government entities and this makes users reticent to fully embrace IoT and the cloud backend that must inevitably

W

The answer is more than industry-wide privacy laws and protocols – it’s global privacy laws and protocols. Yet the chances this will happen are remote.

support it. Businesses are also reluctant to use data centres that are out of country. The answer is more than industrywide privacy laws and protocols – it’s global privacy laws and protocols. Yet the chances this will happen are remote. Think about network standards, comms standards, authentication standards, sensing standards, data storage and handling standards, encryption standards and all the rest. How is such a vast global undertaking to be materially managed, let alone agreed on across industries and borders? Along with privacy fears are security fears fuelled by past hacking of cameras, NVRs, baby monitors, video doorbells, smart devices, smart switches, plant equipment, defence servers, defence networks, power grids, aircraft and all the rest. It’s understandable such concerns exist. Cyber security experts are quick to point out that the battle against cyber-crime will be never-ending. Making things harder is that there’s no consensus among IoT manufacturers over what communications security even constitutes and most makers are focused on the next consumer hook. There’s also no uniformity in terms of M2M protocols and no security standard for these protocols. Nor is there any minimum level of authentication for IoT controllers – some use a PIN, others have multi-layer authentication. The mess spills into the professional IoT sphere, where actioning of IoT events has none of the standards-based procedures found with monitored

alarm systems – even if these are simply logging and recording of events. Let’s not forget artificial intelligence, which is certain to become hugely powerful in the future and unlikely to be managed with integrity by those in a position to take advantage. Another horror is opensource analytics. It’s hard to know which of these 2 is potentially worse. At the heart of the splintered nature of IoT is comms – systems use diverse communication channels, usually in a server/client structure, to authenticate and link IoT networks. But carried into the future, this structure is going to pose serious problems at chokepoints struggling to deal with vast numbers of devices communicating simultaneously. Those chokepoints are going to be overloaded cloud servers the failure of which will bring down entire networks. Building high performance decentralised networks will be challenging and expensive. It’s more likely we’ll see a hybrid fog model with IoT hubs providing distributed intelligence, allowing cloud servers to gather data and handle analysis. For the electronic security industry, the stakes are higher than for most but unlike other industries, we do have more or less standards, as well as organisations which for decades have worked painstakingly towards a sort of technological consensus. This confers an advantage but offers a lesson. ONVIF has battled for more than a decade to bring the video surveillance and access control industries slightly closer together. It’s going to take a lot longer with IoT. n

se&n 03

SEM1118_3ed.indd 3

25/10/18 4:46 pm


SECURECALL 1345 PORTAL

The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes.

- Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.

COMPLETE REPORTING

Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.

PROVEN

Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.

1345 VIRTUAL REDUNDANCY SERVICE

1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.

A

ER OM EL ST AN CU M P R LA

PS

TN

RE

CE

IV

PH OUONE TA LIN GE E /B US RE Y DU ND AN CY

ER

 SC S VI I RT U

AU CM

TO S M SY AT ST IO EM N

SU

PA

TH

 AL

NS

SE

HI

NE

AF

RE

CE

IV

ER

DC

 4 E G DU VOL AL VE LIN KS

OR

D

DC

S

P

C

D D

1300 555 570 sales@scsi.com.au www.scsi.com.au

SEM1118_4_5.indd 4

25/10/18 3:32 pm


R

E KS

MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.

M S AR NG ES AL ORI EL P T E I IR KU N TR O W C M CEN BA

OPTUS EVOLVE PRIVATE IP SERVICE

OPTUS/TELSTRA WIRELESS PRIVATE IP SERVICE (SCSI APN)

Y AR M S RI CES s P les AC ire ctWsole e r DW SECURE Di Con s les ire A W y ct re wa Di ate G s les ire B W y ct re wa Di ate G

TELSTRA OPTUS CU S DS TOM L E RO /ADS R UT L ER

INTERNET GATEWAY

DT

U3 G L /I AL ITE P AR M

 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.

TECH APP

END USER APP

 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS

SCSI IS PROUD TO ANNOUNCE OVER THE AIR DOWNLOAD SUPPORT USING THE DIRECTWIRELESS NETWORK. Panel List: Concept 3/4000 Type 2 DAS NX4 DAS NX8

DAS NX12 DASNX16 DAS R8 DASR128

PARADOX MG5050 PARADOX SP6000 PARADOX SP7000 PARADOX EVO192

SOLUTION 16 PLUS SOLUTION16I SOLUTION 64 SOLUTION 144

SOLUTION 6000 SOLUTION ICP-CC488 SOLUTION 862

TECOM CHALLENGER V8 TECOM CHALLENGER V10

1300 555 570 sales@scsi.com.au www.scsi.com.au

0 u u

SEM1118_4_5.indd 5

25/10/18 3:32 pm


! DA TE OF GE AN CH

3RD ANNUAL

SECURITY AND GOVERNMENT EXPO SECURITY

& GOVERNMENT EXPO W W W. S E C U R I T YA N D G O V E R N M E N T E X P O . C O M . A U

EXHIBITORS

MEDIA PARTNER

LE ADING INDUSTRY PARTNER

TM

ACT Chapter

SAGE DPS AD_NOV18.indd 6

26/10/18 1:28 pm


FREE EVENT REGISTER NOW!

Don't miss Security and Government Expo The Hotel Realm, Canberra.

November 12, 2018 Canberra Bringing the latest security products and technologies to government and commercial end users, installers and consultants in the nation’s capital.

12pm - 6pm ASIS & SAGE seminars 10.00am – 4.00pm Free refreshments 3.30pm – 5.30pm

F O R F U R T H E R I N F O R M AT I O N C O N TA C T M O N I Q U E K E AT I N G E O N 0 2 9 2 8 0 4 4 2 5

Enquiries please contact Monique Keatinge +612 9280 4425

SAGE DPS AD_NOV18.indd 7

25/10/18 3:41 pm


10

18

44

the Australia’s leading electronic security manufacturer has a splendid history, the Inner Range team remains firmly focused on the future. 30: SECURITY TECHNOLOGY AT SAGE

NOV 18 18: SECURITY AWARDS FOR EXCELLENCE & OSPAS 2018 The Australian Security Awards for Excellence and OSPAs hosted by ASIAL were presented last month at an awards night at Doltone House at Hyde Park in Sydney. There were plenty of deserving winners and runners-up across many categories, covering technology, security management and individual achievement. 24: CASE STUDY: TRANSPORT ROADS & MARITIME NSW 3 Crowns Technologies has built Transport Roads and Maritime NSW a cloud-based video surveillance solution that leverages the analytics in Sony cameras to automate the process of detecting and actioning watercraft speeding and reckless riding events on the Georges River in Sydney. 28: HAPPY 30TH BIRTHDAY, INNER RANGE! Pioneering access control manufacturer Inner Range turns 30 this month. But while

SEM1118_8cont.indd 8

SAGE 2018 at the Realm Hotel in Canberra November 12 will give security managers, integrators and consultants in the ACT a chance to see some of the latest electronic security technologies in their home town. 38: FOG BANDIT At Security 2018 SEN got a demo of the Fog Bandit, a security fogging system that is designed to fill the protected space with a visually impenetrable fog, encouraging intruders to beat a retreat. 44: HOW EFFECTIVE ARE BOLLARDS? Keeping pedestrians safe from motor vehicles has never been more important. Or challenging. While the typical response from authorities has been to install bollards of various types, are bollards effective at keeping people safe? 50: FIGHTING CRIME TOGETHER Genetec’s business development manager ANZ, Tiago Ferreira, joins the electronic security industry after 18 years with the Australian Federal Police. Ferreira’s experience and hunger for innovation give him a unique operational perspective certain to benefit end users, as well as Genetec’s engineers.

25/10/18 4:45 pm


64

62 38

58

regulars

54: SUPPORTING SECURITY OPERATIONS WITH TECHNOLOGY How important is security technology when it comes to security operations? When you take a walk around a modern security operations centre, it’s hard to argue that technology is at the heart of things, empowering staff, enhancing safety, facilitating security.

10: NEWS Latest business, product and technical news from Australia and around the world. 48: MONITORING Telstra has left the electronic security and home and business automation markets in no doubt of its intentions across seminal technological developments – namely, internet of things and 5G.

58: VEHICLE MITIGATION Protecting public space against attacks using vehicles is a tough brief for security professionals. Solutions can be costly, often must to be temporary, and it’s impossible to cover every area of vulnerability. At the same time, the Australian Government has put responsibility to protecting crowded places firmly onto operators and that means risk analysis and response is vital.

NOVEMBER 2018 ISSUE 404

SECURITY OPERATIONS & TECHNOLOGY l Security Awards For Excellence & OSPAs 2018 l Case Study: Transport Roads & Maritime NSW l New Security Technology at SAGE 2018 l Product Review: Fog Bandit l Security Management: How Effective are Bollards? l Monitoring: Telstra Targets Security, IoT l The Interview, Tiago Ferreira, Genetec l Vehicle Mitigation in Public Spaces

PP 100001158

Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au

62: EDITOR’S CHOICE What’s new from our manufacturers. 64: HELPDESK Our team of electronic security experts answers your tough technical questions.

Editor John Adams Contributor Luke Percy-Dove Advertising Manager Monique Keatinge Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge publishing.com.au

Design Tania Simanowsky e: taniasdesign@ optusnet.com.au

22 months A$195.00 (incl GST)

Subscriptions 11 issues per annum One year (11 issues)

Overseas 11 months A$220.00 22 months A$440.00

Australia 11 months A$110.00 (incl GST)

WEBSITE www.securityelectronics andnetworks.com

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.

SEM1118_8cont.indd 9

25/10/18 4:45 pm


NEWS IN BRIEF NOVEMBER 2018

IAN ROSS JOINS CSD AS NSW STATE MANAGER n CSD’S NSW business unit has been rapidly expanding over the past 12 months, and with the recent promotion of Tony Theissen to Major Projects, the team has been searching for a competent and experienced state manager to head up the dynamic and fast paced business in NSW. “We are pleased to announce that Ian Ross has taken up the challenge to lead our NSW team. His experience, knowledge, people skills and customer relationships ticked all the boxes, reports Peter Grimshaw,

the general manager of sales and distribution at CSD. “He will be a great addition to our team and will fit into the culture of the NSW business perfectly.” Ian Ross had previously been with Locksmith Supply Company (LSC) for over 25 years in various managerial roles and more recently created, and headed up, the LSC security division and was responsible for all facets of the business including sales, technical support, product development and marketing. “The opportunity to join

CSD which forms part of the largest security equipment distributor in the world, Anixter, was an extremely exciting proposition” said Ross. “I’m looking forward to the awesome challenges ahead and working closely with the well-established and extremely competent NSW team. Coming from competing against CSD and watching this well-oiled and dynamically managed machine take over the market, I am really looking forward to now being part of the CSD team and not going out against them.”

Peter Grimshaw (left) with Ian Ross

Vlado Damjanovski

ANIXTER & CSD DISTRIBUTING HANWHA IN AUSTRALIA n ANIXTER and CSD are now distributing Hanwha CCTV products in Australia. “The Samsung CCTV brand both globally and in Australia is well recognised and respected

Mark Edwards

by the security industry,” said Mark Edwards, general manager products and marketing at CSD. “What is not widely known is the acquisition of Samsung Techwin by Hanwha, a global giant

with over USD$50bn turnover. The Anixter group of companies has distribution of Hanwha in many regions around the world and Hanwha has now aligned with them in Australia. This also

incorporates CSD.” Raj Singh, Regional Vice President-South Pacific for Anixter said Hanwha offers the company an opportunity to enter into the small to medium market with a worldrenowned brand. “There are many opportunities where we have not had a product and now Hanwha allows us to fill this void,” Singh said. “Samsung has always had a great reputation for quality and performance and is still widely used in Australia. We are looking forward to the challenge in promoting the Samsung Hanwha transition and taking this professional product portfolio to the market. “Understanding the size of Hanwha globally helps us understand why there was a name change in the CCTV systems from Samsung Techwin to Hanwha Wisenet. It is Hanwha’s development of their own specialised processors

that define a unique set of features that sets them apart from other manufacturers who all use the same componentry,” he said. According to Edwards, the Samsung product range has been used in many major projects and government installations over the years and it was these successes that enticed Hanwha to acquire the technology, the company and the entire Samsung R&D team. “As part of the acquisition of Samsung Techwin, Hanwha also acquired Samsung General Chemical which is a petrochemical company, Samsung Total an oil refinery and Samsung Thales, which specialises in defence,” Edwards said. “It is not known to many, but Hanwha is also the largest manufacturer of solar cells in the world, has a division that builds cities and is Korea’s largest insurer.”

10 se&n

SEM1118_10news.indd 10

25/10/18 3:46 pm


Analytics Turns CCTV Into Gun, Violence Detection Solution p.12 Vic Govt Seeks Rapid Risk Vehicle Gate & Access Control Upgrades p.14 UTC Combines Lenel And S2 After Acquisition p.15 Crown Casino Selects Dallmeier For Melbourne, Sydney p.16

COMPILED BY JOHN ADAMS

AVA GROUP TO SAFEGUARD INDIAN MOD DATA NETWORK WITH FFT n AVA Group reports its Future Fibre Technologies solution has been selected to protect a major military closed data network from the threat of tampering and tapping. The project is valued at around $US11m. “We are proud that the Future Fibre Technologies (FFT) solution has been selected through a rigorous competitive tender, to deliver the very highest levels of protection to a closed data fibre optic network,” said AVA Group CEO, Chris Fergus. India’s Ministry of Defence is responsible for protecting its closed user

group data network which is used by more than one million military personnel. AVA’s solution does not involve manipulation or processing of the data streams, avoiding thirdparty access to the data and impact on bandwidth and latency. “The FFT solution does not see or process the data, cannot access it and there is no requirement for encryption,” says Kevin Berry, AVA Group’s head of information security. “The network infrastructure is fully protected at every point and performance is unaffected. Another major benefit of the FFT solution

is that deployment is completed with zero network downtime and can be rolled out across live infrastructure

PELCO BY SCHNEIDER ELECTRIC APPOINTS SEKTOR SOLE NZ DISTRIBUTOR n PELCO by Schneider Electric has made Sektor as its preferred distribution partner in New Zealand. The partnership between Pelco and Sektor offers security integrators in New Zealand local access to Pelco solutions and products. Just as important, integrators benefit through the partnership from presales support, tender submissions, valuable engineering expertise, pre-staging of equipment, demonstration capabilities and postsales support. “Pelco’s quality and driving innovation is fundamentally reshaping how we think about surveillance and security and we’re excited to offer the New Zealand reseller community access to all of its ground-breaking solutions,” said Sektor GM Security, Andre van Duiven. “In addition to top-of-theline camera technology,

Pelco solutions leverage predictive analytics and automation in ways that allow surveillance operators to reduce costs, as well as to identify and respond to security threats faster and more effectively.” Craig Cobbin, general sales manager for Pelco AU/NZ, said Pelco was lucky to have Sektor as a partner.

Craig Cobbin

utilising dark fibres.” The project is expected to be delivered in phases over a 15-month period and AVA Group expects

additional revenue from spares and support for 7 years after the initial 3-year warranty period.

CALIFORNIA BANS DEFAULT PASSWORDS FOR SECURITY, CCTV, HOME AUTOMATION, IOT DEVICES

“It’s always a priority for us to partner with distributors which understand the intricacies of the local market and how we can meet that market’s needs,” Cobbin said. “Sektor has a proven track record and Pelco is lucky to have them as our distribution partner, as we seek to grow our business in New Zealand.” n CALIFORNIA has passed a law that bans default passwords for security, home automation, CCTV and Internet of Things (IoT) devices from January 1, 2020. Senate Bill No. 327 requires manufacturers equip it with a “reasonable security feature or features”, as well as default passwords unique to each device or that prompt the user to generate a new password before using the product. The legislation will eliminate installed and hard-coded default

passwords to any “physical object that is capable of connecting to the Internet, directly or indirectly, and that is assigned an Internet Protocol address or Bluetooth address”.

THE LEGISLATION WILL ELIMINATE INSTALLED AND HARDCODED DEFAULT PASSWORDS TO ANY “PHYSICAL OBJECT THAT IS CAPABLE OF CONNECTING TO THE INTERNET...

se&n 11

SEM1118_10news.indd 11

25/10/18 3:46 pm


NEWS NOVEMBER 2018

MELBOURNE ARTS CENTRE BUILDING NEW SECURITY CONTROL ROOM

ANALYTICS TURNS CCTV INTO GUN, VIOLENCE DETECTION SOLUTION

n SUBCONTRACTORS and suppliers have been sought for pricing on the building of a new security control room for Melbourne Arts Centre. The security control room will support the site’s entire electronic security

n ATHENA Security says its AI-powered CCTV gun detection solution recognises guns within 2 seconds with 99 per cent accuracy. Athena uses an NVIDIA 2080 RTX graphics card and software to continuously monitor every camera frame for guns being pulled out, hands in the air or someone being struck. Athena’s system integrates with third party systems to lock doors, halt elevators, or communicate directly with people on site. “Police can voice in and say, ‘Hey, you’ve been detected. Please put down the gun,’” Lisa Falzone, co-founder of Athena Security said. “The feedback that we’ve gotten from law enforcement, especially for retailers, convenience stores, banks — criminals

solution, including CCTV, access control, intrusion detection, as well as related sub-systems and management solutions. Arts Centre Melbourne is a large and diverse application, incorporating the Sidney Myer Music Bowl, Hamer Hall, State

Theatre, Play House and Fairfax Studio, and the various electronic security solutions that provide security across multiple venues include a suite of high-end solutions. The internal venues have a seated capacity of more than 6000, while the Myer Music Bowl caters for 12,000 standing with seating for 2150. Meanwhile, the Performing Arts Collection at the Arts Centre Melbourne is the foremost and largest specialist performing arts collection in Australia, with more than 510,000 items relating to the history of circus, dance, music, opera and theatre in Australia, and of Australian performers overseas.

going after money — is that’ll be really helpful in deterring crime. “We’ve basically perfected that (hold-ups), and we’re starting to work on fights, knives, and other crimes. We expect fights to be done in the next couple months, at least the first version of it.” According to Falzone, there is unprecedented demand for Athena’s channel programme, which launched in October.

Lisa Falzone

FACE RECOGNITION CREEPING INTO CONSUMER SECURITY APPLICATIONS n NEWS that National Australia Bank has begun to trial a new generation of ATMs which use face recognition as an authenticator, highlights the increasing reliability of the technology, as well as the attraction of a hands-off biometric for card-free ATM transactions. NAB’s new biometric ATMs were shown at Sibos in Sydney last month and will be introduced to the wider public only if NAB feels it has taken care of the privacy and security concerns around

consumer biometric applications. In operation, the biometric ATM’s will first recognise a customer and then require a PIN during the transaction. According to NAB chief technology and operations officer Patrick Wright, the bank’s customers liked AI-enabled solutions that gave them more personalisation and connected experiences, which in this case will help guard against the fraudulent use of stolen cards and card-skimming. While these are attractions, the real prize would have to be

widespread acceptance of face recognition authentication for online transactions – an area where all banks have been suffering significant losses for many years. “It will be interesting to hear how people interact with it and what they think about this sort of technology,” Wright said. “It has been created with the aim of seeing how people receive it; using facial recognition and a second-factor PIN at an ATM, improving the convenience by removing the need for them to be carrying a bank card.”

For electronic security people, the acceptance of face recognition as a biometric authenticator would be a significant development. Biometric technologies, including face recognition and fingerprint authentication

have already reached a level of reliability from false positives and rejections and a price point where they can compete with card readers. Acceptance from users is the sticking point.

You’ve got a sexy front end and a sophisticated back end.

But you still need a reliable lock on the door!

www.sprintlocks.com Email: security@sprintlocks.com EN1634 2-hour fire resistance

China prices + British quality control = Unbeatable value!

12 se&n

SEM1118_10news.indd 12

25/10/18 3:47 pm


DRIVING THE FUTURE OF

Intelligent Buildings T HROUGH INN OVAT ION, IN T EGR AT ION & E XCELLENCE

INTEGRATION

SCALABILITY

LATEST TECHNOLOGY

With a wide range of video, intrusion

Built-in scalability to meet long-term

Building on current platforms, Interlogix

and access control solutions, Interlogix

security needs, the Interlogix portfolio

products are utilising the latest and

products provide small to mid-

allows you to grow your security

leading technology to ensure your

size commercial applications with

solution, as your business grows.

security solution meets current and

comprehensive coverage.

future needs.

www.interlogix.com.au

SecElectronics_November2018.indd 1 SEM1118_13.indd 1

23/10/18 3:32 8:45 pm am 25/10/18


NEWS NOVEMBER 2018

VIC GOVT SEEKS RAPID RISK VEHICLE GATE & ACCESS CONTROL UPGRADES

n VICTORIA’S Department of Economic Development, Jobs, Transport and Resources is seeking tenderers for an upgrade of vehicle security gating state-wide. The project will involve the retrofitting of existing gates, the installation of new automatic gates and installation of swipe card/remote control access – this could include integration into existing access control solutions or a wireless locking system. The DED is a large department, having absorbed the former functions of the

Department of State Development, Business and Innovation; the agricultural, forestry and fisheries operations of the Department of Environment and Primary Industries; the transport responsibilities of the Department of Transport, Planning and Local Infrastructure; and the Industrial Relations Victoria and Arts Victoria agencies from the Department of Treasury and Finance and the Department of Premier and Cabinet respectively. This tender closes November 21, 2018.

MILESTONE SYSTEMS OPENS COLLABORATIVE EXPERIENCE CENTRE IN MELBOURNE n MILESTONE Systems has opened its new Milestone Experience Centre at the company’s new regional headquarters in Melbourne, Australia. The Experience Centre will offer partners and customers an interactive, hands-on experience, which allows them to try different options and pick the best security solution for their needs. “This is a world-leading innovation, which will allow partners, service providers and customers the opportunity to define exactly what they need in a security solution, see first-hand what all the permutations will look like, then walk away with exactly what they need – all from the one location,” said Jordan Cullis, country manager for South Pacific at Milestone. The Experience Centre will be an open, collaborative space featuring technology from Milestone Systems

as well as 9 partner vendors. Interactive displays will allow stakeholders to get a ‘hands-on’ feel for their solution as it evolves. “If you’re looking at cameras, we can offer different solutions for a vast array of divergent needs,” Cullis said. “If you think analytics might be worth a look, we can show you how to get maximum value from of your video data. And if you need to see how facial recognition will work with your

solution, we will add it to the mix right in front of you. This is an unparalleled opportunity to get a tailor-made video surveillance solution.” Experts in each field will take up residence at the Experience Centre, on hand to walk stakeholders through each step of the planning and deployment process. Vendors involved include Allied Telesis, Axis Communications, Hikvision, Imagus, Inner Range, Ipsotek, Mobotix and Promise Storage Systems.

BACK2BASE MONITORING OPENS AUSTRALIA’S NEWEST GRADE A1 MONITORING CENTRE n BACK2BASE Monitoring has been awarded an ASIAL Grade A1 certification for its newly constructed alarm monitoring centre and national HQ located at North Lakes north of Brisbane.

“This certification, combined with the Back2Base Monitoring boutique approach to customer service and innovation, is what sets Back2Base apart in the rapidly evolving Alarm Monitoring market,” said

general manager, Gary Rushton. “ASIAL’s Grade A1 certification is the benchmark of excellence for alarm monitoring in Australia.” Back2Base founder and Industry veteran, Robert Hidderley, purpose built the state-of-the-art alarm monitoring and data centre facility with the future in mind. “We have a longterm commitment to providing secure, reliable and innovative approaches to protecting our customers’ businesses, homes and people,” Hidderley said. “Our new grade A1 Monitoring Centre underpins our commitment and ultimately, our customers are the beneficiary of our

significant investment.” According to Hidderley, the site for the monitoring centre was specifically chosen after an extensive search taking into consideration possible environmental and other risk factors likely to impact continuity of service. “Our location, combined with the multiple redundant power and communications systems, gives Back2Base an unparalleled resistance to natural disasters and nearby emergency situations,” he said. Meanwhile, Rushton said cyber security is an evolving concern for a growing number of enterprises and individuals. “When it comes to the

attack on client data from cyber threats, along with multiple firewalls and cyber security measures we have a zero-cloud policy for our IT infrastructure which is housed onsite in our climate-controlled data centre,” Rushton said. “Our no offshore and no outsourced human resources or data entry policy means the privacy and security of our customers’ trusted information is made paramount and kept under the control of the team protecting it.” Founded in 2005 and a pioneer in video alarm verification services, Back2Base Monitoring’s client list includes many well-known organisations.

14 se&n

SEM1118_10news.indd 14

25/10/18 3:47 pm


UNDERSTANDING ACQUISITIONS AND MERGERS IN THE ELECTRONIC SECURITY INDUSTRY n WE’VE had a run of acquisitions over the last 12-19 months, with some of the biggest names changing hands. Do changes of ownership undermine the nature of an organisation, disrupt its lines of product development? Or can acquisition fuel innovation through the introduction of capital and the expansion of market potential? A big increase in the number of mergers and acquisitions suggests different things about the electronic security market. For a start, mergers and acquisitions are fundamentally different in nature, with an acquisition being the 100 per cent takeover of one organisation by another, while mergers involve 2 organisations combining to form a new entity. The driving forces of mergers and acquisitions vary – in some cases they represent a fast way for organisations to gain market share and increase revenue. They might also be a way to access markets or suppliers vital to maintaining growth which an organisation under its current

ownership can never access. Additionally, M&A can be a way for an organisation to buy expertise, as well as an R&D and product manufacturing chain. Other drivers include low cost credit, the desire to liberate the value held in a business by its owners or board of directors, and a desire to increase profit margin in an acquired business by more efficient management – this latter can mean a rough ride for staff. Alternatively, these huge deals can be the opus of a CEO or board of directors – successful acquisitions or mergers worth billions of dollars can represent the pinnacle of corporate achievement. Only rarely are M&As about the survival of a business at the cost of losing its identity, though identity may be subsumed by the stronger brand. Hostile acquisitions are often destructive of value – that’s why most modern acquisitions tend to emphasise the identity and stability of the existing business, its products and services, its staff and their relationships with their customer base. The decision to retain the

identity of a business isn’t always consistent. If the purchaser has a strong business and the acquisition fits into that structure relatively seamlessly, the change of identity may be rapid. In any case, acquisitions that are disruptive can lead to the long-term decline of a high-quality business and while this might sometimes be deliberate – businesses can be stripped of value by corporate raiders and allowed to expire – this is not a common model in the security industry. Instead, mergers and acquisitions in security electronics are about the expansion of market share, the acquisition of adjacent expertise and technologies, the purchase of high-quality product lines, the plumbing of reputation, and the guaranteeing of future revenue streams. In the electronic security industry, the current activity seems reflective of high levels of confidence in underlying business fundamentals at board level. Seen in this light, the flurry of M&A should be seen in most cases as reflecting positively on the future of the electronic security

UTC COMBINES LENEL AND S2 AFTER ACQUISITION n UTC reports it has completed the acquisition of S2 and will now combine S2 Security with Lenel to create LenelS2, a global leader in advanced access control systems and services. LenelS2 will provide scalable, cuttingedge customer solutions in the access control and security management systems industry, serving global enterprises and small- and mid-sized companies, according to UTC. “LenelS2 unites 2

world-class teams with complementary strengths,” said Alex Housten, vice president and general manager, fire & security products, UTC Climate, Controls & Security. “Together, we have more than 50,000 systems installed worldwide. We look forward to providing enhanced service capabilities and offerings for our customers and accelerating our access control and video-centric solutions for intelligent buildings across the globe.”

Lenel president Jeff Stanek will lead the new organization, while S2 Security founder and CEO John Moss will serve as chief product officer. The broader leadership team will consist of key members from each company, ensuring that the combined company will bring together the best of both worlds in serving its customers, according to an announcement. “The depth of Lenel’s OnGuard platform and BlueDiamond mobile credentialing, together

business, which is continuing to grow at healthy rates globally. Not only do purchases suggest there’s value in the security market, they suggest that despite high levels of global indebtedness, electronic security businesses retain significant reserves of cash, and/or cash flows sufficient to obtain low cost credit. From the point of view of installers and end users, the M&A activity in electronic security recently has been fundamentally positive, with changes of ownership having minimal impact on business models and

channels to market. Probably the key thing from the point of view of installers and end users, is that product development is not disrupted through changes of direction or loss of key staff members. Judging by the high levels of product development taking place across the industry, such fears seem unjustified. As 2019 closes in, there’s every chance we’ll see further M&A activity but while each these corporate deals should be considered on a case-by-case basis, for the most part the signs for customer value (and staff stability) look very positive.

Jeff Stanek

with the breadth of S2’s product ecosystem and channel, creates a new offering that is far greater than the sum of

its parts,” said Moss. “We will continue to advance the capabilities of all product lines, including NetBox and OnGuard.”

se&n 15

SEM1118_10news.indd 15

25/10/18 3:47 pm


DATIONS ABLED TO CURITY HE N AND NING ANCE

NEWS NOVEMBER 2018

DEPARTMENT OF THE ENVIRONMENT AND ENERGY ELECTRONIC SECURITY MAINTENANCE AGREEMENT

CSD APPOINTED BOSCH VIDEO SYSTEMS DISTRIBUTION PARTNER nBOSCH Security Systems reports that as of November 1, 2018, Anixter will include CSD in its Australian distribution agreement to supply the complete Bosch video systems portfolio. Anixter, which recently acquired CSD, will extend its strategic alliance with Bosch to make Bosch video systems products available to the nationwide network of integrators and contractors that purchase through CSD. With 12 branches across Australia, including showrooms in Sydney, Melbourne, Brisbane, Perth, Adelaide and the Australian Capital

Territory (ACT), Anixter is committed to holding stock of all product lines to ensure accessibility to all customers. “CSD is well-resourced to provide support for Bosch Video Systems,” said Mark Edwards, general manager, Central Security Distribution. “We have over 15 technical sales and support staff with significant video and installation experience, who have recently completed Bosch’s comprehensive product training program, allowing us to advise our customers on the best solutions for their needs.” Bosch Security Systems said its team was excited

by the opportunities that the expanded and robust alliance brings. “At Bosch, we pride ourselves on providing excellent service and support to all customers,” said Chris Dellenty, general manager, Oceania, Bosch Security Systems. “By partnering with a well-established national electronic security distributor like CSD, who has the professionalism and expertise to support the needs of customers across the country, we will continue to provide the quality products and services that people expect when they buy Bosch.”

Chris Dellenty

CROWN CASINO SELECTS DALLMEIER FOR MELBOURNE, SYDNEY n CROWN Casino has selected Dallmeier as primary CCTV solution for its Crown Melbourne and Crown Sydney Casinos. “Dallmeier is proudly distributed by C.R. Kennedy & Company Pty Ltd, an 84-year-old Australian company with offices throughout Australia and a joint venture operation in Macau, which has an 80 per cent Macau casino

market share,” said C. R. Kennedy’s Phil Viggiano. “Dallmeier has over 20 years’ experience in the Casino market, beginning at Crown Melbourne and now in use by major casinos of the world.” “Dallmeier’s massive operation in Regensburg Germany ensures the application of the latest CCTV technologies for the extremely demanding conditions experienced in casino applications.”

n DEPARTMENT of Environment and Energy has gone to tender for maintenance of Gallagher access control and intrusion detection, as well as a video surveillance solution. The DEE is seeking to engage the services of a suitably qualified and licensed service provider for scheduled preventative maintenance, repair services, and reporting to ensure the full functionality and future planning of the electronic access control system (EACS), CCTV and extensive security network infrastructure (SNI) within the John Gorton Building in Canberra. The agreement will include quarterly maintenance and testing inspections. The tenderer will be required to attend site and confirm each field device, speedstile, controller, server, switch, UPS and the security infrastructure associated with the EACS, CCTV and SNI systems is fully functioning, and carry out ad hoc repairs and

maintenance to devices that have failed testing. During these maintenance inspections the tenderer shall apply appropriate testing methods to establish the correct operation of each piece of security equipment and keep accurate records of all tests. The Gallagher Software Maintenance Agreement (SMA) is to be provided as part of this agreement and tenderers should include the labour necessary to implement Gallagher upgrades as they are released. The tenderer will be required to attend maintenance review meetings with specified personnel and provide a range of reporting options for review. The agreement shall include attendance to site for break-fix works as required on a fee-for-service basis. The tenderer is to maintain a 24-hour 365 days per year emergency service and operational support service to assist with the Department’s operational needs.

TASMANIAN DEPARTMENT OF JUSTICE SEEKS ELECTRONIC SECURITY CONSULTANT n TASMANIA’S Department of Justice has sought an electronic security consultant to assist with the construction of the planned new Southern Remand Centre to be built at Risdon Prison. The Department of Justice has received funding to progress the construction of the new Remand Centre, as well

as undertaking upgrades to existing facilities in the Risdon Prison Complex. As a result, the Department of Justice will be seeking the services of a suitably qualified electronic security consultant to develop and oversee the design of electronic security services for new and upgraded facilities that are planned.

16 se&n

SEM1118_10news.indd 16

25/10/18 4:47 pm


TecomC4 Management Software TecomC4 is a dynamic open platform software that can be combined with an extensive range of brands, creating a powerful security solution with a modern, easy to use interface.

Challenger10

ChallengerV8

TecomC4 offers: •

customised reports in real time

a single interface to control and manage CCTV, access or alarm devices across multiple sites

easy assignment of user access rights, utilising tree groups with inheritance and individual exception rules

more integrations coming soon…

Exclusive to Hills

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

SEM1118_17.indd 1

E N T E RTA I N

SECURE

25/10/18 3:32 pm


● News report

Security awards 2018

SECURITY AWARDS FOR EXCELLENCE & OSPAS 2018 THE Australian Security Awards for Excellence and OSPAs hosted by ASIAL were presented last month at an awards night at Doltone House at Hyde Park in Sydney. There were plenty of deserving winners and runners-up across many categories, covering technology, security management and individual achievement.

THE Australian Security Industry Awards for Excellence and the OSPAs were presented at an awards night in Sydney late last month. As usual, it was a great night. Winners included:

T

Individual achievement – General: Robert Spring, Millennium Hi-Tech Holdings Special Security Event or Project (Over $500,000): Wilson Security l The 2018 Commonwealth games was the largest event in Australia in the last decade. Wilson Security provided services that maintained the protection of assets, equipment and infrastructure in place for the Games. Wilson displayed outstanding commitment and willingness to respond to operational challenges that arose to support the safety and security of the Commonwealth Games.

Product of the year (Alarm): Integriti Version 18, Inner Range l Inner Range’s Integriti technology platform delivers a security solution with cost-savings

18 se&n

SEM1118_18awards.indd 18

25/10/18 3:48 pm


SEM1118_19.indd 1

25/10/18 3:31 pm


● News report

Security awards 2018

benefits due to its integrated security, access control and building automation functionality. The scalable software is ideal for use in a wide range of applications. This makes Integriti suitable for small sites, mainstream applications and distributed multi-site organisations.

Product of the year (CCTV–IP System): Security Monitoring Centres (SMC) l SMC’s latest product Remote Video Response (RVR) utilises the latest security automation software to integrate intruder detection systems and video surveillance systems. This service is fully integrated with SMC’s automation platform (MasterMind) and available in a fully redundant configuration at both of its Graded A1 monitoring centres.

Product of the year (Communication): KastleAlert, Kastle Systems Australia l KastleAlert is a mobile mass communications system that is the fastest method to get the word out during any emergency event. By employing a crowd-sourced approach, KastleAlert empowers anyone to immediately report issues the instant they see something, enabling incident managers and first responders to deliver timely communications and guidance to all those affected.

Product of the year (Physical Security): Safetyflex 9-40S Truck Stopper bollard, Ezi Security Systems l Ezi Security Systems designs, manufactures and installs a premium range of perimeter security solutions for both vehicle and pedestrian access control. They have specialised expertise in Hostile Vehicle Mitigation and protection of Crowded Spaces. The truck stopper bollard is crash rated for 7200KG at 64kph yet requires a super shallow foundation of only 200mm deep.

assets. The team developed individual site plans, an organisational policy, defined a management structure and strategy and provided a robust tangible result to manage the Active Armed Offender risk.

Integrated Security Solution (Under $500,000): Blue Force l Blueforce has delivered Jandakot Airport in West Australia with a comprehensive CCTV, access control and monitoring solution which is user-friendly, cost-effective and fully-integrated. Blueforce’s fully-integrated solution will enable Jandakot Airport to embrace the future.

Individual achievement – Technical: Simon Pollak, Scentre Group l Simon’s technical contribution at Scentre Group was the development of the Security Technology Strategy. This strategy positioned security technology as a business asset to be developed and utilised far more broadly. Simon has also completed postgraduate studies in cyber security and has carried out research on cyber security for both CCTV and intrusion detection systems,

Integrated Security Solution (Over $500,000): Chubb and SAAB l The establishment of the Lady Cilento Children’s Hospital (LCCH) was a significant milestone in the delivery of world class paediatric health services in Queensland. The Chubb and SAAB project team’s successful delivery of the security upgrade was a significant achievement. The project was one of the most technically demanding projects undertaken, and the success demonstrates the exceptional standards that can be achieved when dedicated individuals work together.

Indigenous Employment: Wilson Security l Wilson Security has been actively working with a number of its key clients to sponsor training and licensing of indigenous security guards to work for their clients after completion of their qualifications. Clients include the Department of Defence.

Special Security Event or Project (Under $500,000): Dynamic Alternatives l Dynamic Alternatives completed an Active Armed Offender Response Project for the City of Gold Coast in 2018. The project consisted of approximately 40 site audits and risk analyses, risk treatment plans and a 3-tiered training programme all of which looked at methodically addressing the vulnerabilities across all critical 20 se&n

A good clean live stream

SEM1118_18awards.indd 20

25/10/18 3:48 pm


SEM1118_21.indd 1

25/10/18 3:31 pm


● News report

Security awards 2018

OSPAS For the fourth year running, the Australian OSPAs partnered with ASIAL’s Security Awards for Excellence to recognise and reward companies, teams and individuals who have performed at an exceptional level within the security sector. The competition this year was tough, winners and runners up were selected by a judging panel of esteemed security professionals. According to Professor Martin Gill, founder of the Outstanding Security Performance Awards, it was a great night celebrating the achievements of many worthy winners. “The judges were impressed by the quality of entries and the winners should feel very proud, Professor Gill said. “Well done to the Australian security sector and especially to the OSPA winners.” The OSPA Winners for 2018:

Outstanding Female Security Professional – Sponsored by Edith Cowan University: Suzette Po-Williams – Central Monitoring Services Pty Ltd

THE JUDGES WERE IMPRESSED BY THE QUALITY OF ENTRIES AND THE WINNERS SHOULD FEEL VERY PROUD... WELL DONE TO THE AUSTRALIAN SECURITY SECTOR AND ESPECIALLY TO THE OSPA WINNERS

Outstanding Guarding Company – Sponsored by Guardhouse: Assetlink Services Pty Ltd Outstanding In-House Security Manager/ Directory – Sponsored by Assure Protection Services: Joshua Tyler – Westpac Group Outstanding Security Consultant – Sponsored by Gallagher: Intelligent Risks Pty Ltd Outstanding Security Officer – Sponsored by Sharp Eyes Group Solutions: Stephen Payne – Assetlink Services Pty Ltd Outstanding Security Training Initiative – Sponsored by Asia Pacific Security Magazine: MSS Security Outstanding Contract Security Manager/ Director: Steve Sullivan – Wilson Security Pty Ltd Outstanding Security Partnership: SelectaDNA Outstanding Security Team: The Star n

22 se&n

SEM1118_18awards.indd 22

25/10/18 3:48 pm


CLASS 5

Encrypted High Security

End of Line Modules Are Only the Beginning

Inner Range’s Infiniti Class 5 is a complete Hardware/Software solution designed specifically for Class 5/Zone 3 installations. Our range includes: 4 All Software 4 Hardware Controllers 4 End of Line Modules 4 Power Supplies 4 Keypads 4 Enclosures 4 Communications Devices 4 Access Control Readers 4 Credentials

Why take chances? Full End to End Encryption compliant with AS/NZS 2201.1:2007 Class 5 Externally Certified

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM1118_23.indd 1

See Infiniti Class 5 at SAGE 2018 Realm Hotel Canberra Monday November 12th

T: 1300 319 499

W: csd.com.au

25/10/18 3:31 pm


● Case study

Roads and Maritime NSW Scott Myles drives a well-designed workstation.

WATER VIEWS 3 Crowns Technologies has built Transport Roads and Maritime NSW a cloud-based video surveillance solution that leverages the analytics in Sony cameras to automate the process of detecting and actioning watercraft speeding and reckless riding events on the Georges River in Sydney.

N the Georges River at Picnic Point 3 Technologies has delivered O Crowns Transport Roads and Maritime NSW a customised solar-powered version of its SecureGO platform in the form of 2 independent Waterway Enforcement Camera systems integrated and managed in a cloud backend. Each unit leverages Telstra’s 4GX wireless network, Envirocoms management software and the analytics capabilities of Sony CCTV cameras, as well as integrating with Milestone’s XProtect VMS. There are 2 pole-mounted camera clusters installed along the river – one at Revesby Beach and the other at Picnic Point – a third will be installed soon. According to Transport NSW, the cameras keep a constant lookout during daylight hours to help water police and NSW Roads and Maritime

24 se&n

SEM1118_24RMS.indd 24

25/10/18 4:46 pm


BY J O H N A D A M S

THE CAMERAS KEEP A CONSTANT LOOKOUT DURING DAYLIGHT HOURS TO HELP WATER POLICE AND NSW ROADS AND MARITIME SERVICE PATROLS DETECT WATERCRAFT SPEEDING ALONG THE RIVER.

Service patrols detect watercraft speeding or reckless riding along the river. The speed limit along the river was lowered last year to 8 knots and riders caught speeding could face fines, have their licence cancelled or jet ski confiscated. “Authorised officers will review the recorded camera images and footage to determine if an offence has been committed and an infringement or warning notice or court attendance notice can then be issued,” a Transport NSW spokeswoman said, before the Waterway Enforcement Cameras went operational. 3 Crowns Technologies has been working on its SecureGO solution for some time. At its heart is Envirocoms technology that has been proven over many years in environmental and industrial applications, where it has been used for monitoring

water flows and the measuring of stress on railway bridges. The flexible nature of the Envirocoms platform makes it ideal for an application like RMS. “We are supplying a hosted video management system in the cloud (SecureGO) on a private unlimited data Telstra 4GX connection linked to our Envirocoms environmental data management system to manage imagery and event data,” explains 3 Crowns’ Chris Lane. “The Environmental Data Management System EDMS (Envirocoms) component and the Milestone Video Management System (SecureGO) are interoperable, and we are the first company in Australia to offer this level of interoperability for these sorts of applications. We’ve been able to offer this functionality in the past for specialised applications but today we are seeing wider applications – whether it be something like this RMS solution for monitoring speeding boats or jet skis, or for monitoring smart cities, or bridges. “The EDMS platform can control the VMS platform and decide based on events when it wants to get imagery. The thing about the RMS enforcement cameras is that we are using the analytics in the Sony cameras, so we are empowering the analytics/metadata generated by the cameras. There are 2 cameras in each installation – one is a Sony Gen 6 PTZ, which does the video analysis and can be controlled remotely via the Milestone VMS and the other is a Sony SNC772 4K camera. According to Lane, having a capable network is important in a challenging environment for wireless, such as a river valley. “A year ago we could only get half a meg out of the remote site but now the site gets 10Mbps on Telstra 4GX, which uses the 700MHz range and this gives us the potential to stream full HD from a single SIM with no NVR,” he explains. “This performance potential will increase in the future as 5G comes on line. That single camera gathers 2-3 terabytes of data every month which is recorded in real time to the cloud 25fps and 1080p or 4K. “The static camera is a Sony SNC-VB772 running in evidence mode, which is higher than 4K – the resolution is 5100 x 3000 pixels and that camera is not recording video but collecting a series of evidence shots – you need very high resolution to get the registration numbers of fast-moving watercraft, such as jetskis. Because it’s solar, the sites are completely autonomous and run from sunrise to sunset. “If we take a look at the RMS system you can see that when a jetski goes through a camera’s angle of view we use the analytics within the camera to calculate speed by timing the vessel between multiple points in the scene,” Lane explains. According to Lane, the system allows all sorts of parameters to be used for searches – it might be reckless riding or launching a boat dangerously – the parameter depends on the application. Events

se&n 25

SEM1118_24RMS.indd 25

25/10/18 4:46 pm


● Case study

Roads and Maritime NSW

can be dealt with when the system is in adjudication mode – video is extracted automatically from Milestone, speeding information is overlaid based on measurement between multiple points, and a security indicator is created before booking or warnings. Next, Lane logs into the Envirocoms platform on his laptop to show me how the over-arching system works. Given the power of SecureGO, it’s surprising how simple everything looks. “With the RMS application, Envirocoms is handling all the imagery, the video is coming through via Milestone XProtect Corporate and important for the end user, those 2 systems talk to each other. Envirocoms has an image overlay which also counts the boats and it feeds video to Milestone as required for viewing by operators. “Something else that benefits RMS is that the Envirocoms system is encrypted with secure indicators just as traffic cameras are encrypted,”

IF RMS CHOOSES TO ISSUE A TICKET, THE IMAGES MEET THE PROTOCOLS REQUIRED FOR SPEEDING FINES ON THE ROAD. THAT LEVEL OF ENCRYPTION IS ABOVE AND BEYOND ANYTHING FROM A VMS SOLUTION...

Chris Lane

Lane says. “If RMS chooses to issue a ticket, the images meet the protocols required for speeding fines on the road. That level of encryption is above and beyond anything from a VMS solution – adding security indicators is another standard.” Lane also shows me the Envirocoms IoT platform back end on his laptop – from this point of view, all 3 Crowns’ IoT customers are represented and Lane can duck in and out of the system, visiting sites, viewing footage and checking event reports and system status. According to Lane, this IoT platform is not like any of the toy IoT solutions we’ve seen in the past. Envirocoms is industrial strength – it gathers information from bridges as trains cross them, or counts electric cars visiting a charging station. “But it’s more than an IoT platform,” he explains. “It also does manual data entry, IoT, data loggers and it’s integrated to VMS platforms, so the system works with video and imagery. In this case we are using some dashboard functionality to manage the boat counting. We can also put things like weather graphs in the dashboard to increase situational awareness. And down here at the bottom of the screen we have extra plug-ins – an image viewer, a screening process and a compliance process. This is for law enforcement – RMS can screen who is speeding and put together a package of images and other data when sending out warnings or fines.”

CONCLUSION You hear about IoT but it’s hard to appreciate the broadness of its capability until you see a real application like this one. The SecureGO platform is 4GX mobile capable, the IOT video solutions incorporate data analysis, alarms, rules, the system is plug and play and it integrates with Milestone XProtect, as well as more than 6000 camera models over a highly secure private Layer 2 network. In this RMS application the resolution is extremely good – there’s court admissible recognition with the Sony SNC772 fixed dome – you can zoom in digitally and glean more detail with 4K. The image quality is exceptional – there’s no question about getting the rego numbers of boats and jet skis. They are always available. Best of all, there’s a huge amount of capability at the fingertips of management and authorised system operators, and it’s available from a workstation, a remote laptop and even a mobile device. n

26 se&n

SEM1118_24RMS.indd 26

se&n 26

25/10/18 4:46 pm


COLOGNE CATHEDRAL SQUARE

DallmeierPanomera_allgemein_A4_C.R.-Kennedy.indd 1 SEM1118_27.indd 1

30.08.2018 09:19:12 25/10/18 3:31 pm


● News report

Inner Range

HAPPY 30TH BIRTHDAY, INNER RANGE! Pioneering access control manufacturer Inner Range turns 30 this month. But while Australia’s leading electronic security manufacturer has a splendid history, the Inner Range team remains firmly focused on the future. ACK in November 1988 when Doug Frazer, Alan Winch, David Baughan and Vin Lopes founded Inner Range to manufacture modular networked security systems combining access control and alarm capabilities, they had no idea their new company would become Australia’s most iconic security manufacturer, with local dominance and a growing global market share. The 4 founders mortgaged their family homes to fund R&D and later the Inner Range business, which was headed up by general manager Mark Peachey, took out a loan to cover manufacturing of the first run of Concept 2000 systems, which had a successful release in November 1989. A characteristic of Inner Range, then and now, was the symbiotic relationship between its engineering department and the company’s installer customers. Frazer developed and polished the Concept 2000 hand in hand with field technicians who constantly supplied ideas and feedback. By 1995 it was time for an upgrade and Frazer successfully argued that the Concept 3000 should be completely new, with a much stronger integration between alarms and access control. While the Concept 2000 only had 8 partitionable areas, Frazer stretched the bounds of possibility with Concept 3000, giving it 250 partitions and the capacity to support 250 modules on one network. Building this powerhouse took 18 months and the new system was released early 1997. Given the complexity of the Concept 3000, it was clear Inner Range needed to manage the route to market and a partnership with Security Merchants NZ saw the launch of Security Merchants Australia as a dedicated distribution arm. A few years later, George Davies and Barry Whitehead kicked off Inner Range Europe based in the UK and thanks to the hard work of the team, established the Inner Range brand across much of Europe in verticals from education to defence. Another key development in 2000 was the launch of the first Inner Range Certified Training Programme for installers.

B

Inner Range launched Insight Software in 2004, then Concept 4000, as well as software solutions and communications modules. Central Security Distribution was established as an exclusive distributor for Inner Range and other products in 2008. Inner Range Integriti hit the market in 2012, while Inception and Infiniti Class 5 arrived in 2016, EliteX keypad in 2017, and the company continues to push forward with new releases, including Version 18 of the Integriti technology platform, which won Best Product at the Australian Security Industry Awards for Excellence last month. Although Inner Range, (along with local distributor, Central Security Distribution), was acquired by Anixter earlier this year, the company’s history of local excellence and growing global market share look certain to continue well into the future. “We’ve come from humble beginnings, but our future looks unbelievably strong,” said Inner Range’s CEO Peter Krincevski. “Anixter has made it clear that the Inner Range product is going to be supported by considerable investment to ensure the product lineup retains its preeminent position in Australia and New Zealand, and continues to grow in global markets. We are going to be building on our longstanding success in Europe, while expanding into a number of new territories. “Analytics and AI are a key area for the Inner Range engineering team and we’re also going to be focusing on the cloud space and IoT in order to enhance the capabilities of our future solutions – those things are well and truly on our roadmap,” he says. “Plans are also well underway to introduce a number of new capabilities to existing solutions, including Integriti, Infiniti and Inception. “As we grow in existing global markets and expand into new markets, we’re going to continue our efforts locally to collaboratively develop solutions that will help installers and integrators in ANZ meet the challenges of the rapidly evolving electronic security industry here, with future product families planned. “We are thinking hard about the future and about ways to bring positive disruption to the market – to empower installers and end users with clever solutions they simply cannot do without. That’s what Inner Range has done for the past 30 years and that’s what we’re going to be doing in the future.” n

28 se&n

SEM1118_28Inner.indd 28

25/10/18 4:28 pm


Security And Government Expo 2018, 12 Nov – Canberra

Every Pelco product shipping as of August, 2018 is compliant with the NDAA and can be used in US Government-related deployments.

Esprit® Enhanced Best in class camera imaging, top of the line IP peformance effortless, pressurized integrated optics

Sarix® Enhanced Providing the most robust feture-set for your mission-critical applications. With SureVision™ 3.0, for the most challengind lighting environments.

Sarix® IBD Series - High Security Corner Mount Camera Improved Detection, Operational Efficiency & Automation With Vandal Resistant Anti-ligature Design

↘ For more information, please visit pelco.com or call (800) 289-9100 (United States and Canada) or +1 (559) 292-1981 (international). For pricing information or to purchase Pelco products, please contact your manufacturer’s representative or the Pelco office in your area.

SEM1118_29.indd 1

Come Visit us at SAGE on 12 Nov @ Booth #22

©2017 Schneider Electric. All Rights Reserved. Trademarks owned by Schneider Electric Industries SAS or its affiliated companies. All other trademarks are property of their respective owners. www.Pelco.com

25/10/18 3:31 pm


● Special report

Security & Government Expo

SECURITY TECHNOLOGY AT SAGE SAGE 2018 at the Realm Hotel in Canberra November 12 will give security managers, integrators and consultants in the ACT a chance to see some of the latest electronic security technologies in their home town.

HEN it comes to cutting edge security technologies likely to whet the appetites of government security people at SAGE, there’s plenty to choose from. We’ll see security management solutions, analytics, drones, thermal imaging systems, smart and affordable electrical locking systems, vehicle mitigation solutions and plenty more. AVA Group will be showing the latest systems from its brands, Future Fibre Technologies (FFT) and BQT Solutions. FFT makes fibre optics intrusion detection solutions, while BQT makes high security cards and readers, locking systems and peripherals. When it comes to VMS, Milestone Systems will be showing its latest video platform video management software designed to ensure

W

30 se&n

SEM1118_30sage.indd 30

25/10/18 4:27 pm


hanwha-security.com

Ensures Clear Visibility

Wisenet Q Flateye IR Dome Cameras Wisenet Q 2M & 4M flateye dome cameras uses a flat window glass cover to the front of the lens that doesn’t need a dome cover. The cameras are ready to solve existing problems of conventional dome cameras such as IR diffused reflection or the moisture problem caused by temperature differences. It can even eliminate the problem of the view being obscured by external contamination and save labor costs since there is no need to remove and mount a dome cover. Ensure clear visibility with the Wisenet flateye dome cameras under any conditions. • Max 2Megapixel & 4Megapixel resolution • 3.2~10mm (3.1x) motorized varifocal lens • WiseStream, True WDR (120dB) • Tampering, Motion detection, Defocus detection • IR Viewable length 30m • Flat window to the front of lens without dome cover

www.eos.com.au www.csd.com.au

SEM1118_31.indd 1

25/10/18 3:35 pm


● Special report

Security & Government Expo GEUTEBRUCK HAS WILL SHOW HARDWARE AND SOFTWARE SOLUTIONS FAVOURED BY GOVERNMENT USERS FOR HIGH PERFORMANCE, REDUNDANCY, RELIABILITY AND BACKWARD CAPABILITY.

safety, protect assets and increase business efficiency. Milestone enables an open platform community that drives collaboration and innovation in the development and use of network video technology. Meanwhile, Saab will show net-centric security solutions developed and supported in Australia. Saab systems are designed to safeguard critical infrastructure, expedite emergency response and recovery, improve emergency communication, and streamline secure operations. At SAGE, Gallagher will show its latest integrated electronic access control, intruder alarms management and perimeter security through scalable integration platform, Gallagher Command Centre. Ideal for many government applications, Gallagher’s security solutions include networked (software controlled) and stand-alone perimeter security electric fencing, no-feel sensor technologies and integrations with third party technologies. Another leader on the management side, Geutebruck has will show hardware and software solutions favoured by government users for high performance, redundancy, reliability and backwards compatability. Geutebruck Australia has provided component level support, system engineering and servicing for the entire range for decades. Honeywell’s integrated technology solutions are designed to help customers be safer, more secure, productive, energy efficient and competitive, while improving comfort conditions and compliance with new legislation. Honeywell offers advanced and complex security solutions in the areas of perimeter security, intrusion detection, access control and CCTV. MOBOTIX with its Cactus Concept technology will show government security people what it says is an uncompromising level of cybersecurity protection, recently certified by market-leading

German penetration testing experts, SySS GmbH. On display will be MOBOTIX intelligent IP camera technology which can be integrated into workflows to create systems which adhere to stringent procedural requirements. MOBOTIX IoT and thermal cameras, the non-decentralized MOBOTIX MOVE cameras, and third-party ONVIF-S cameras can easily be integrated to create versatile and cost-effective hybrid solutions. You can also find out about the upcoming release of the latest version of the MOBOTIX VMS, MxMC 2.0. Sektor, the ANZ distributor of FLIR Systems security products, will bring its specialist knowledge of multispectral imaging and analytics to SAGE. Its solutions include wide area surveillance and enterprise IP video solutions designed for mission critical environments. Sektor will show cryogenically cooled thermal cameras for long range surveillance 20km+, uncooled thermal cameras for general security applications, perimeter intrusion detection analytics, enterprise VMS and IP cameras for large scale deployments, mil-spec ground surveillance radar and tracking solutions and tactical body worn video solutions. Panasonic Video Insight Version 7 will be on show, delivering enhanced performance, unlimited scalability and customisable

32 se&n

A good clean live stream

SEM1118_30sage.indd 32

25/10/18 4:27 pm


SensaTek image ad A4 11-2018.qxp_Layout 1 19.10.18 12:51 Seite 2

21 for

on all Orchid

Licenses

Valid Valid until until JAN JAN 1st 1st 2019 2019

Complexity simplified ...

SensaTek continues to innovate with our new partner IPConfigure. Their award winning Video Management System - Orchid, offers a simplified and reliable VMS for small and large installations alike. Orchid boasts a simple, sophisticated interface that offers a rich and engaging user experience. To test drive their offering contact us to arrange a trial.

We focus on your priorities. 1300 560 026 | sales@sensatek.com.au | www.sensatek.com.au

SEM1118_33.indd 1

25/10/18 3:35 pm


SAGE 2018

â—? Special event

SECURITY

& SG OEVCE RUNRM IE NTTYE X P O & GOVERNMENT EXPO

Expo guide

22 Pelco

27 Megafortris

28 OzTime Technologies

Monday 12th November, 2018

16 EZI Security

26 Geutebruck

23 Honeywell

21 CR Kennedy

25 Smiths Detection

24 CIC Technology

20 EKA/EVVA

29 Future Fibre Technologies

30 Milestone / Axis

DRONE DEMO AREA

STAGE

12 Gunnebo

5 HID

17 Sunell Technologies

13 SRA Solutions

11 LSC

6 AMS Australia

18 Panasonic

14 Secure Edge Technologies

10 Perimeter Systems

7 FSH

19 SAAB

15 Gallagher

9 Sektor

4 Video Security Products 3 Chase Security Solutions 2 Mobotix

8 Protective Barriers Australia

1 Inner Range

KITCHEN

TOILETS

ENTRY 33 3x2

Elevators

Elevators

SYDNEY ROOM

ENTRY

MELBOURNE ROOM 37 3x2

34 32 ASIS ACT

TOILETS

36 3x2

Void to ground floor 35 6x2

31 BM Doors Bar 1

Bar 2 SAGE REGISTRATION

Cloak 1

Cloak 2 SEMINAR ROOMS

34 se&n

SEM1118_34sage.indd 34

26/10/18 1:41 pm


November 12, Canberra Bringing the latest security products and technologies to government and commercial end users, installers and consultants in the nation’s capital.

Exhibitors

MEDIA PARTNER

LE ADING INDUSTRY PARTNER

TM

ACT Chapter

01 Inner Range

17 Sunell Technology

02 Mobotix

18 Panasonic Australia

03 Chase Security Solutions

19 SAAB Australia

04 Video Security Products

20 EKA/EVVA

05 HID Global

21 C.R Kennedy

06 AMS Australia

22 Pelco by Schneider Electric

07 FSH

23 Honeywell

08 Protective Barriers Australia

24 CIC Technology

09 Sektor

25 Smiths Detection

10 Perimeter Systems Australia

26 Geutebruck

1 1 LSC Security Supplies

27 Megafortris Australia

12 Gunnebo

28 OzTime Technologies

13 SRA Solutions

29 Future Fibre Technologies

14 Secure Edge Technologies

30 Milestone/Axis

15 Gallagher Security

31 BM Doors

16 Ezi Security Systems

32 ASIS ACT

www.securityandgovernmentexpo.com.au se&n 35

SEM1118_34sage.indd 35

26/10/18 1:35 pm


● Special report

Security & Government Expo

AXIS IS BRINGING ITS NEW AXIS Q6125-LE HIGH-SPEED PTZ WITH OPTIMIZED IR TO SAGE 2018.

functionalities to tackle issues faced in city surveillance. VI7 has been redesigned to provide maximum video surveillance coverage across the city in a cost-effective manner. VI7 is plugin ready and has additional capabilities such as vehicle incident detection, license plate and facial recognition, and can be installed and managed on VI MonitorPlus. VI7 supports all Panasonic iPro Extreme cameras, as part of its commitment to an open platform, and Panasonic says it offers the most comprehensive support for H.265-enabled cameras on the market. C.R. Kennedy will be showing a range of products from entry level to high-end. The range includes Dallmeier and Uniview surveillance solutions, DroneTracker and plenty more. CRK will show a UNV enterprise level PTZ, a DJI Aeroscope drone detection system and Matrice drone with thermal imaging, Reveal bodyworn cameras and the Dallmeier Panomera multi sensor camera system. C.R. Kennedy’s Dallmeier solutions are proven and cuttingedge, having been installed in some of the most demanding surveillance applications on the planet. Panomera is changing the nature of video surveillance in applications from airports to sports grounds. CIC Technology’s solutions empower

customers to regain control over their keys and ultimately reduce the risk of theft, loss, downtime, security breaches and the cost of re-keying which can be hundreds of thousands of dollars. It’s a 24-hour solution that allows for centralized control and administration but decentralized and strategic placement of assets. And Chase Security will show the latest products from PCSC, Keri Systems, STid, Allegion, INS Global, SafeTrust and Access Smart covering access control, cards and readers, identity theft protection and biometrics. Something else to get a look at is EKA CyberLock, a key-centric access control system that converts existing mechanical locks to an access control system by replacing the existing mechanical cylinder without the requirement for power or wiring. The system can fit into doors, cabinets, racks and padlocks and is perfect for securing remote assets. With full audit logs, user access rights, and custom reporting, EKA CyberLock gives access control over when securing assets. LSC will show the Creone KeyBox range at SAGE 2018 - Creone is a solution for management of valuables and keys. You’ll also see LSC’s popular STI safety products and hard-wired access control systems, including the new range of MicroLatch products. EVVA will show 3KS and 4KS maximum security master key systems that are capable of up to 133 billion possible lock combinations and ideal for high security government applications. 3KS has SL3 rated cylinders, with 4KS the next generation currently being assessed. 4KS has many security improvements on 3KS and is patented to 2035. At SAGE 2018 FSH will show a range of energy saving high security electromagnetic locking devices, which assist in reducing an organisation’s carbon footprint by lowering current draw by up to 80 per cent. Traka Oceania will show Traka – ASSA ABLOY, an enterprise range of electronic key and locker systems which control who can access personal and professional items. Traka automatically records the transaction activity by date and time on both the cabinet and on the support software. Traka’s containers come in a range of 10 items to the largest that will hold more than 500 items. HID Global will show solutions for physical access control; IT security, including strong authentication and credential management; card personalisation; visitor management; government ID; and identification technologies for animal ID and industry and logistics applications. Among other speciality video surveillance solutions, AXIS is bringing its new AXIS Q6125-LE high-speed PTZ with optimized IR to SAGE 2018. This camera offers discreet and unobtrusive

36 se&n

SEM1118_30sage.indd 36

25/10/18 4:27 pm


BY J O H N A D A M S

surveillance and has a dome design that conceals the direction of the lens, and its integrated, automatically adaptable IR LED illumination enables surveillance in total darkness (up to 200 m (656 ft) or more depending on the scene). The camera provides full scene fidelity and sharp images both above and below the horizon thanks to Sharpdome technology. Meanwhile, the speed dry function removes water drips from the dome, for clear images in rainy weather. Sunell is dedicated to development and innovation of intelligent video products and solutions across a full range of CCTV product lines and will bring a selection of its gear to SAGE. Perimeter Systems Australia will show the latest version of its perimeter intrusion detection systems (PIDS) solution designed for critical infrastructure. Perimeter Systems Australia has supplied solutions for major critical sectors including corrective services in all states, Department of Defence, data centres, power and sub-stations, oil and gas storage facilities, water infrastructure and rail stabling yards. Protective Barriers Australia is the Australian supplier of the Mifram, Modular Vehicle Barrier (MVB) range, which is crash-tested and proven to stop cars, vans and trucks for the security and protection of people and physical assets. Supplied in flexible and modular lengths, it’s highly portable and easily moved in and out of position so it can be installed to create a barrier for various road widths and situations, on variable terrain and in allweather conditions. OzTime Technologies is Australia’s leading supplier of high security bollards including automatic retractable, manual retractable and removable bollards in standard or crash rated variants. Meanwhile, Gunnebo will show solutions for hostile vehicle mitigation, bullet resistant doors, windows and partitions, entrance security, cash handling and safes and vaults, along with a full range of services to help government security people manage their security systems and extend the lifecycle of their security products.

At SAGE, Ezi Security Systems will show some of its premium range of metal and electronic perimeter security products for vehicle and pedestrian control. Ezi has an extensive range of AVB and HVB Crash Certified products such as TruckStopper, the renowned shallow mount PAS68 wedge, crash boom gates and crash rated static and automatic bollards. Smiths Detection, which manufactures sensors that detect and identify explosives, weapons, chemical agents, nuclear and radioactive material, narcotics and contraband, will show its latest solutions at SAGE designed for applications like transportation, ports and borders, critical infrastructure, military and emergency response. And SRA Solutions will show its defence-ready racks, SCEC cabinets and enclosures. This year Pelco will bring Sarix, Esprit, and new Spectra Professional IR to SAGE. Spectra Pro IR has above horizon tilting, and built-in IR illumination on areas of interest. Other key features include H.265 and Pelco’s Smart Compression technology. Something else to check out is Pelco’s VideoExpert management solution. Meanwhile, Inner Range will be showing its Infiniti Class 5 solution, which is a full enterprise access control system which adds AES128 encryption to a swag of other powerful features. Meanwhile, Mega Fortris will be showing its range of tamper evident solutions and technologies including seals, bags, security labels and tape. Other products include meter and container seals, as well as security bags for cash in transit and key management systems. n

se&n 37

SEM1118_30sage.indd 37

25/10/18 4:27 pm


● Product review

Fog Bandit Scott Myles drives a well-designed workstation.

FOG BANDIT

AT Security 2018 SEN got a demo of the Fog Bandit, a security fogging system designed to fill the protected space with a visually impenetrable fog, encouraging intruders to beat a retreat. E’VE been hearing about security fogging solutions for decades but never had a chance to experience them first hand until Security 2018 Expo, where we stood in a closed space of around 7 x 3 metres and witnessed the process of activation. The Fog Bandit unit activated featured a standard twincanister Bandit Fog Generator, which emits a cloud of propylene glycol. While I had no clear

W

idea what to expect, time spent on the dance floor at Carmens at Miranda in the mid-1980s gave me a vague sense of the possibilities. To measure the speed of the process, I set my camera to continuous low mode, planning to press the shutter and hold it down as soon as Fog Bandit was activated and keep it held down all the way through the demo. Continuous low mode with the Nikon d750 is 3 frames per second, which gives you a pretty clear idea of how quick the process was when you look at the consecutive images here. What happened? The Fog Bandit was activated and in less than 10 seconds the room was filled with an opaque mist – I couldn’t see my hand in front of my face and there were general outbursts of surprise from others in the demo at the completeness of coverage. The fog reaches out from the unit in 3 plumes – there’s suddenly a point at which it completely fills the protected space. Listening to my recorder I can hear the shutter slapping away until, faced with a wall of white fog, the auto focus system decides to take its bucket and spade and go home. The process

38 se&n

SEM1118_38fog.indd 38

25/10/18 4:15 pm


BY J O H N A D A M S

of the AFS quitting and complete disorientation on my part took less than 2 seconds. It was a bit like the experience of a general anaesthetic – just as you think of a humorous way to tell the surgical team their injection is working, compatability is gone. We all piled out of the demo tent into clear air with a genuine sense of relief. Does Fog Bandit work? Yes, it works. There’s no chance an intrusion could continue once the Bandit activates and anyone exposed to the fog is going to turn around and try to find their way out of the protected space. There’s going to be no smashing up the place, or quickly snatching high value items. By the time the intruder realises what’s happening, they’ll be unable to see the space at all. Dissipation rates are relatively slow, so cool-headed intruders aren’t going to be able to just wait a couple of minutes for the air to clear and continue as planned. Alerted by the activation, police or security officers will be on their way. Fog Bandit delivers 28 cubic metres of fog per second, pushing 6 metres in the first 2 seconds. A single unit can protect areas ranging from 50 to 500 cubic metres. Reaction time from activation is 0.1 of a second to deliver fog at full power. The attraction of this fast delivery is that an intruder opens the door to the protected area and is immediately hit by the activation process, which is extremely hard to ignore and impossible to circumvent. Solid state electronics and robust, high quality casing and components ensure reliability, while a continuous self-diagnostic process reports system status changes by email or text, or to a management system. Fog Bandit has low maintenance and running costs - a clean filled and hermetically

THERE’S NO CHANCE AN INTRUSION COULD CONTINUE ONCE THE BANDIT ACTIVATES AND ANYONE EXPOSED TO THE FOG IS GOING TO TURN AROUND AND TRY TO FIND THEIR WAY OUT OF THE PROTECTED SPACE.

sealed fluid cartridge has a 4 year no-maintenance life span. Engineer call-outs are not required after every activation because each cartridge can deliver up to 25 activations, depending on the size of the space being protected. In terms of overall lifespan, a Fog Bandit unit has a lifespan of 15 years, which is exceptionally good, compared with other electronic security solutions. According to Fog Bandit, the eye to object visibility of the solution is 30cm post activation but it seems much less than that. I put my hand in front of my face and could not see it at a couple of centimetres. Whether or not the compact demo space contributed to this performance is unclear, but the potential is there for very high-density coverage. Important, too, the fog is harmless and safe in any environment. If you have a space that needs proactive protection for high value or sensitive items that’s very low cost, given it has the capacity to stop an intrusion completely, Fog Bandit might be the solution for you. n

FEATURES OF FOG BANDIT: l

Protects an entire room in just a few seconds

l

Delivers 28 cubic metres of fog per second

l

Projects the fog 6 metres in the first 2 seconds alone

l

One unit can protect areas ranging from 50 to 500 cubic metres

l

Reaction time just 0.1 of a second to deliver fog at full power

l

Eye to object visibility is less than 30cm post activation

l

Fog is completely harmless and safe to use in any environment

l

Solid state electronics and robust, high quality casing and components

l

Continuous self-diagnostics and reporting

l

Long life and low running costs.

se&n 39

SEM1118_38fog.indd 39

25/10/18 4:15 pm


● Special report

Security management

AMBIENT ENVIRONMENT Crime prevention through environmental design is built around 9 principles. These principles can be used by security managers to better control and protect their own and adjoining sites. Understanding the nature of space will also help system designers recognize vulnerable locations. PPLYING CPTED principles to a facility isn’t just a matter of whacking in a few planter pots to keep louts from doing burn-outs on the university quadrangle. Properly applied, CPTED allows effective security policy to govern space on a site using physical and electronic means. While you normally think of space design as something that ends the minute an architect’s building plans are signed off, that’s only half the story. Even if the design you’re stuck with creates vulnerable areas, you can make them into strengths. Imagine the darkest, most sinister alley between 2 buildings on the site where normal users are afraid to go - reinforcing the area’s dangerous qualities. Take over the space. Locate 2 help points complete with video surveillance and welcoming lighting at either end, then site the security office right in the middle. You don’t have to stop there. On the evenings of the week you used to experience trouble, shift the twice-weekly astronomy class to a room directly above the alley, with plenty of light and strong principles of surveillance. The same applies on commercial sites. Is there a carpark at the far end of your facility that’s remote from all your buildings yet can’t be moved? Consider installing BBQ facilities and conducting staff lunches and staff drinks over there. The idea is to push safe activities into areas that are perceived to be unsafe, to have normal users challenge abnormal users

C

PEOPLE WHO FEEL SAFE IN THEIR NEIGHBORHOOD ARE MORE LIKELY TO INTERACT WITH ONE ANOTHER AND INTERVENE IN THE EVENT OF CRIME.

for control of space. This is one of the fundamental principles of CPTED. Remember that the concept of CPTED is based on the psychological principle that environmental cues indicate to a normal user that a location is safe while at the same time telling an abnormal user it’s not. A security manger familiar with CPTED should start to see the environment differently, recognizing safe or unsafe space immediately, and knowing why it’s safe or unsafe. Key aspects of CPTED are recognition that: it’s possible to manipulate the opportunity for a crime to occur, the motivation for the crime to occur, the risk to the offender if the crime occurs, and the history of the offender who might consider committing the crime. The way to manage this is by applying

40 se&n

SEM1118_40cpted_V2.indd 40

25/10/18 4:16 pm


BY J O H N A D A M S

principles of defensible space to a protected area. Oscar Newman argued that defensible space must firstly allow people to see and be seen continuously, which reduces fear because a potential offender can easily be observed, identified and apprehended. Further, people must be willing to intervene or report crime. Increasing the sense of security in settings where people live and work, you encourage them to take control of the areas and assume a role of ownership. People who feel safe in their neighborhood are more likely to interact with one another and intervene in the event of crime.

ENHANCING NATURAL SURVEILLANCE Natural surveillance is vital if you want to elevate the

perceived risk of criminal behaviour by improving visibility of potential offenders to normal users. This perceived increase in risk extends to the perceived lack of covert escape routes. Natural surveillance is enhanced by placement of physical features, activities and people in such a way as to maximize visibility of the space and its users, increasing the sense of surveillance and encouraging social interaction among legitimate users of space. l Provide clear border definitions for control of space. That means defining boundaries physically or symbolically with fences, shrubs or signs, so both normal and abnormal users recognize public to private space transitions. Inside a building, you can do the same thing using colour, light and furniture. l Build and clearly mark transitional zones between

se&n 41

SEM1118_40cpted_V2.indd 41

26/10/18 1:23 pm


â—? Special report

Security management

public, semi-public, semi-private and private zones. This reduces the range of excuses for intrusion into private area. l Relocate gathering areas of normal users in order to place them in places with good surveillance with natural access control - a flight of stairs leading up to a grassy area. You can put such gathering places out of sight of areas frequented by abnormal users in order to draw abnormal users out into spaces controlled by normal users. l At the same time try to place safe activities in unsafe locations. This means getting the staff touch football teams to do their training on an oval alongside a mean street in which the majority of staff park their cars. The normal users will dominate the space, including the street and will challenge the presence of abnormal users. l Bring unsafe activites into safe locations in order to provide the greatest measure of protection for them. Put school kids playing areas in front of the staff room windows. If female staff use a grassy area of the site for Tai Chi early in the mornings, make sure the area they use is under surveillance from early starters like security, warehouse or mail room staff. Vulnerable groups or activities should be close to lines of communication and immediate support. You can use your video surveillance system to support such activities. l Redesignate the use of space to create natural barriers of protection. Do this by screening areas and activities that need protection from observation by abnormal users. l Improve the scheduling of space by using open spaces that have other areas under surveillance for productive and effective activities. Build lunching areas in formally unused spaces and provide welltended gardens, both will increase your spatial control. l Improve communication with remote areas and remote activities accommodating company activities. Link remote workshops by phone and ensure some of your more powerful cameras can be pointed in the direction of remote buildings in the event of an incident. Instruct security patrols to regularly call on remote sites and to keep an eye on remote activities. l Design streets to increase pedestrian and bicycle traffic l Place windows overlooking sidewalks and parking lots l Use passing vehicular traffic as a surveillance asset. l Use the shortest, least sight-limiting fencing l Make foyers and shelters transparent l Ensure potential problem areas are well lit: pathways, stairs, entrances/exits, parking areas, ATMs, phone kiosks, mailboxes, bus stops, children’s play areas, recreation areas, pools, laundry rooms, storage areas, dumpster and recycling areas, etc. l Avoid too-bright security lighting that creates

42 se&n

SEM1118_40cpted_V2.indd 42

blinding glare and/or deep shadows, hindering the view for potential observers. Eyes adapt to night lighting and have trouble adjusting to severe lighting disparities. Using lower intensity lights often requires more fixtures. l Natural surveillance measures can be complemented by mechanical and organizational measures. For example, closed-circuit television (CCTV) cameras can be added in areas where window surveillance is unavailable. l Territorial reinforcement promotes social control through increased definition of space and improved proprietary concern. l Maintain premises and landscaping to communicate an alert and active presence occupying the space.

CREATE NATURAL ACCESS CONTROL Natural access control limits the opportunity for crime by taking steps to clearly differentiate between public space and private space. By selectively placing entrances and exits, fencing, lighting and landscape to limit access or control flow, natural access control occurs. l Use a single, clearly identifiable, point of entry l Use structures to divert persons to reception areas l Incorporate maze entrances in public restrooms. This avoids the isolation that is produced by an anteroom or double door entry system l Use low, thorny bushes beneath ground level windows. Use rambling or climbing thorny plants next to fences to discourage intrusion. l Eliminate design features that provide access to roofs or upper levels l In the front yard, use waist-level, picket-type fencing along residential property lines to control access, encourage surveillance. l Use a locking gate between front and backyards. l Use shoulder-level, open-type fencing along lateral residential property lines between side yards and extending to between back yards. They should be sufficiently unencumbered with landscaping to promote social interaction between neighbours. l Use substantial, high, closed fencing between a backyard and a public alley instead of a wall which blocks the view from all angles. n

se&n 42

25/10/18 4:16 pm


C

M

Y

CM

MY

CY

CMY

K

SEM1118_43.indd 1

25/10/18 3:38 pm


â—? Special report

Bollards Scott Myles drives a well-designed workstation.

HOW EFFECTIVE ARE BOLLARDS? Keeping pedestrians safe from motor vehicles has never been more important. Or challenging. While the typical response from authorities has been to install bollards of various types, are bollards effective at keeping people safe?

ECENT incidents where cars and trucks have hit people around commercial property highlight the potential dangers, even when such events are not terrorrelated. In some cases, drivers have deliberately targeted pedestrians. In others, they have simply lost control of their vehicle and ended up on the footpath. The risk of such incidents, whether accidental or intentional, is greater than ever. This means the safe segregation of pedestrians and vehicles around commercial buildings and public spaces is critical, regardless of the perceived level of risk. If your property fronts a road and cars

R

44 se&n

SEM1118_44bollards.indd 44

25/10/18 4:17 pm


BY L U K E P E R CY- D O V E

WE HAVE RECENTLY CONSULTED TO SEVERAL LOCAL COUNCILS ON THE PROTECTION OF PUBLIC SPACES. IN SOME INSTANCES, THEY HAVE BEEN RELUCTANT TO PURSUE HOSTILE VEHICLE MITIGATION IF THE TERRORISM RISK CANNOT BE CATEGORICALLY QUALIFIED.

can access it via the footpath, you cannot assume that it is safe. All premises that attract foot traffic are potentially at risk and property managers must work to minimise the chances of a critical incident occurring. Bollards can help, but they must be appropriately constructed and installed. If not, they won’t stop someone who is determined to cause casualties. If you plan to install bollards, ensure that they are rated to recognised standards such as PAS 68 or IWA 14-1. Bollards and similar structures rated to this standard have had vehicles driven into them during certification, which is the only way to confirm what they can withstand. It is not possible to backward engineer or calculate what a bollard can perform to. If it is rated for 3500 kgs @ 40km/hrs, you can’t assume that a bollard will stop a 4000kg vehicle at 35 km/hrs. It

just doesn’t work that way. Ratings are calculated and then verified so a bollard’s capabilities cannot be assumed for different circumstances. And if a bollard is not certified to a known standard, then we suggest they are not used in high-risk areas. Businesses and organisations must understand this before installing bollards, or the equipment may not fulfil its critical role in the case of a serious incident. We have recently consulted to several local councils on the protection of public spaces. In some instances, they have been reluctant to pursue hostile vehicle mitigation if the terrorism risk cannot be categorically qualified. This is simply impossible. No-one can accurately predict public risk in all circumstances. High foot traffic areas along busy city streets may appear to present a higher risk of a vehicle incident than a quiet shopping strip in the suburbs. But any street is at risk of a driver accidentally hitting the accelerator instead of the brake, or deliberately deciding to target pedestrians. This risk is extremely difficult to quantify and not necessarily mitigated or increased depending upon how busy the area is. Melbourne’s Bourke Street Mall incident and others around the world involving vehicles and pedestrians are almost impossible to anticipate. Can we predict with any level of certainty when and where such incidents will occur? Simply put, we can’t. What we can do is be prepared if, and when, they do happen. This can and is being done. Melbourne City Council, for example, increased its use of bollards in city streets following the Bourke Street tragedy. In those areas, appropriate bollards can prevent vehicles from driving into pedestrian areas. Sydney, Brisbane, Port Phillip and many other councils followed the same strategy shortly after. Standards such as Pas 68 and IWA 14-1 are crucial when it comes to such protective measures. They validate the level of performance the bollard will achieve in the event of a vehicle hitting it. If we don’t know how the bollard will perform, what purpose is it serving? To ensure that it will do its job in a certain location, it is important to first qualify the risk and then fully research its construction, installation method and rating. Bollards that are surface mounted and affixed with bolts alone will not be appropriate. Once the

se&n 45

SEM1118_44bollards.indd 45

25/10/18 4:17 pm


● Special report

Bollards

REMOVABLE BOLLARDS ARE ALSO GENERALLY UNSUITABLE. IF THEY CAN BE LIFTED OUT BY HAND, THEY WON’T STOP A HOSTILE VEHICLE. bolts shear, they will be disabled. It is the same for bollards that are set in asphalt rather than concrete. Removable bollards are also generally unsuitable. If they can be lifted out by hand, they won’t stop a hostile vehicle. Some removable bollards are certified to the PAS68 standard, but the footings are generally quite deep and they need a special lift to remove them as they are so heavy. Whatever your premises’ level of risk, hostile vehicle mitigation is an important part of minimising that risk. Predicting critical vehicle incidents, whether hostile or accidental, is not easy. But you can protect your property and the pedestrians around it by installing the appropriate protection. Bollards that meet relevant recognised standards can offer peace of mind and possibly prevent hostile acts.

46 se&n

SEM1118_44bollards.indd 46

Where bollards are not preferred due to aesthetics or other design elements, engineered street furniture and planter boxes can achieve the same outcome. If someone is planning such an event, they will most likely avoid an area where good bollards have been installed. And if someone accidentally leaves the road, appropriately installed bollards will prevent their vehicle from hitting people behind them. In an ideal world we would not need to go to such lengths to protect the community. But recent events have shown that vehicles can and do leave the road, putting pedestrians at serious risk. In the case of bollards, that risk can be minimised with the right strategy and equipment. n

* Luke Percy-Dove is the CEO of Matryx Consulting and Risk Dynamyx. For 2 decades Luke has been delivering strategic security solutions for hundreds of businesses and organisations nationally. He is a recognised expert in solving complex security challenges including counter-terrorism security. Luke is passionate about everything security. He is also an established writer and commentator in the security field and on the latest technology trends and developments in the physical security space.

se&n 46

25/10/18 4:17 pm


ALTRONIX IS TRULY

OUT THERE!

EVERYWHERE IS WITHIN REACH WITH OUR NETWAY SPECTRUM FIBER AND POWER SOLUTIONS. COMMUNICATING INFORMATION AND SECURING THE MOST CHALLENGING ENVIRONMENTS – NO MATTER HOW “OUT THERE” YOU NEED TO BE…

MADE IN THE U.S.A.

ALTRONIX.COM

8358MP-3_NetwaySpectrum-OutThere-FullPg_Security Electronics & Networks.indd 1 SEM1118_47.indd 1

LIFETIME WARRANTY

10/12/18 25/10/18 12:17 4:26 PM pm


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

Telstra Targets Security, IoT TELSTRA has left the electronic security and home and business automation markets in no doubt of its intentions across seminal technological developments – namely, internet of things and 5G.

NTERNET of things and 5G are so entwined it should come as no surprise to find Australia’s biggest telco lining up ducks in these early stages. Telstra already has more than 2 million IoT devices connected via its Telstra Smart Home platform – that includes security sensors, surveillance cameras and lighting, among other things. Telstra has hidden strengths in this part of the market. As well as planning a soft launch of 5G within 6 months, it’s the only Australian carrier to deliver NarrowbandIoT and Cat M1 services to metropolitan areas and rural centres. Both these technologies are the blood vessels of IoT. NarrowbandIoT is designed to handle applications requiring tiny data packets and long battery life – sensors and tracking devices. Meanwhile, Cat M1 can support 100s of kilobits per second, as well as offering extended range and long battery life. It’s ideal for a wide range of applications – medical monitors, vehicle performance, quirky security sensors and plenty more. The notion that security, automation and stateful sensors of all kinds will one day report directly from the field to cloudbased software solutions for actioning has been slow to sink in for many electronic security people but the ramifications are profound, the time-frame for delivery

I

rapidly closing. Just to illustrate the point recently, Telstra pulled the trigger on a new suite of Internet of Things (IoT) tracking solutions. These come with a consumer-facing Telstra Locator product and an enterprise-focused Track and Monitor solution. Unsurprisingly, Telstra said the Telstra Locator, will be a subscription-based service and there are 3 locator tags that really flex some wireless muscle: A Bluetooth tag for small items like keys and purses; a rechargeable Wi-Fi tag with 4-6 weeks of battery life using more than 1 million Telstra Air hotspots designed to monitor pets, bikes, and bags. Meanwhile, a premium LTE tag utilising the Cat M1 IoT network will kick off early 2019. Importantly, all this tech is an in-house play. “We’ve already deployed the most advanced IoT technology on our mobile network, we’re now focused on harnessing IoT technology to introduce services that make customers’ connected lives easier,” Telstra’s head of innovation and strategy for consumer and small business, Michele Garra, said. Meanwhile, Gerhard Loots, head of IoT and M2M at Telstra, said the enterprise Track and Monitor device – designed to fit between the corrugation of shipping containers – is solar powered, with the

battery lasting 4 months without sun. According to Loots, Telstra has been trialling the device across “every major sector you can think of”, including retail, mining, health, government, agriculture, construction, utilities, transport, and roads. While these first solutions are not strictly targeting the electronic security space, the potential is clear. Combined with NarrowbandIoT and a Cat M1 network covering 3 million square kilometres, it’s hard to ignore the obvious scope of Telstra’s business potential. What’s the best response from the

48 se&n

SEM1118_48monitor.indd 48

25/10/18 4:18 pm


Proudly brought to you by

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

WE’RE NOW FOCUSED ON HARNESSING IOT TECHNOLOGY TO INTRODUCE SERVICES THAT MAKE CUSTOMERS’ CONNECTED LIVES EASIER.

point of view of installers, integrators and monitoring providers? The key thing is making sure your solutions cover off all the necessary bases. There are plenty of low and mid-range security and home automation solutions on the market – make sure your solution has differentiators in all directions. It also needs to offer quality in terms of detection capability, video surveillance, sensor capabilities and the functionality and ease of use of the app. It’s also going to be important to stay open to developments that will have/are having a real impact on solutions – you

don’t want to spend your time chasing vapourware, but you need to ensure you’re not surprised by major shifts in market direction. When it comes to services like 5G, make no mistake that they will facilitate new directions, as well as supporting cloud applications in a way we’ve never seen before. You need to think about how big network bandwidth can enhance your security offering, but you’ll also need to pay attention to customer appetite for the technology – you can’t sell 5G-enabled solutions to clients running narrow band networks.

What will the future of security, home automation, IoT and 5G look like? That remains difficult to say from the point of view of business models, but networks will be reliably fast Ethernet grade at the least and in some cases, much more. Solutions will increasingly be driven by remote machines and smart devices. Successful business models are likely to incorporate local data centres and serious cyber security capabilities, so you’ll need to cover off that side of things and make sure you partner with quality data centres which have unimpeachable reputations and practises. n

se&n 49

SEM1118_48monitor.indd 49

25/10/18 4:18 pm


● Regulars

The Interview

Fighting Crime Together Genetec’s business development manager ANZ, Tiago Ferreira, joins the electronic security industry after 18 years with the Australian Federal Police. Ferreira’s experience and hunger for innovation give him a unique operational perspective certain to benefit end users, as well as Genetec’s engineers.

JA: What’s your role at Genetec? TF: I’m the business development manager for ANZ and the verticals I’m responsible for are law enforcement, the intelligence community, as well as security-focused government organisations, including councils. JA: Tell us a bit about your background and the sorts of experiences you’ve had. TF: Prior to this role I was with the Australian Federal Police for 18 years as a Federal agent, working across the whole of South East Asia, covering transnational crimes. This included things like people smuggling. I also did counter terrorism for 5 years and I’ve worked extensively on drug importation crimes. My role at AFP was the co-ordination

50 se&n

SEM1118_50interview.indd 50

25/10/18 4:18 pm


TIAGO FERREIR A WITH JOHN ADAMS

I WANT TO TELL LAW ENFORCEMENT, INTELLIGENCE COMMUNITIES AND GOVERNMENT USERS LIKE COUNCILS, THAT THERE IS AN EASIER WAY OF DOING THINGS, A SMARTER WAY OF DOING THINGS.

of protracted investigations - finding criminals, investigating, arresting. JA: What does this experience offer Genetec customers? TF: I bring Genetec customers an end user’s perspective when it comes to the application of the Genetec solutions that streamline operations I am very familiar with. Additionally. I’ve always had an innovative mindset, and if using Genetec technology allows me to help law enforcement agencies and other government end users alleviate their operational pain points, I will feel I’ve succeeded. JA: Police work and security work

have differences but there is a crossover, especially when it comes to the protective nature of both vocations – do you feel this? TF: My passion when it comes to Genetec is that the company is focused on building safe cities and protecting the everyday, as well as protecting everyday people. That was one of the reasons I wanted to work with Genetec. In a way, I feel I’m still doing the protective work I did in my old role but instead of doing it for one law enforcement agency, I’m doing it for as many law enforcement agencies as I possibly can. JA: What are the greatest challenges faced by law enforcement and other government end users, in your opinion? TF: In all government sectors there are siloes – duplications of effort, reinventions of the wheel. Seeing what’s available from Genetec technology-wise, it’s clear that this is something that requires education to give greater power to law enforcement and government end users whose main efforts might not go into their core roles but are instead being devoted to trying to make inadequate technology work for them. My role is to say: “I know what you are going through – I have been there. But did you know this technology exists and it can help you so much?” For example, in one of my roles in counter terrorism, we used to have to gather video and photographic evidence from multiple sources and this process could take a whole week – time that was lost to process, rather than being spent investigating. But with products like Clearance, Genetec has the technology to handle this sort of work in 5 minutes. And that little piece of information – the existence and capability of the Clearance software application - can alleviate issues for so many end users. I want to tell law enforcement, intelligence communities and government users like councils, that there is an easier way of doing things, a smarter way of doing things. JA: How did you and Genetec find each other? What was the process of moving from the AFP to a security technology provider? TF: I was doing an MBA and realised there was much more that could be done when it came to applications of technology in law enforcement. I started to put out some feelers – I’ve always been interested in innovation and technology and without my knowing it at the time, that

suited Genetec’s vertical focus. Genetec had an idea about increasing the operational focus of its business – Genetec wanted to become more pointedly solutions driven - the team was open as to exactly how this would be achieved. In a sense, they decided to bring end users into the business to get a clearer translation of what their customers needed, as well as giving customers support from people who understood their challenges first hand. JA: You certainly do bring a unique perspective – there can’t be many BDMs in the market with your suite of experiences and focus. TF: In honesty, it was a daunting change for me – even the interview was challenging. I’ve always had a hunger for innovation but I’m not highly technical. I don’t know everything about analytics software, network topology or servers. But the Genetec people said: “You don’t understand – we have plenty of people who can talk in great depth about our technology – we don’t want another technical person”. Instead, Genetec wanted team members with an operational focus – in my case, a BDM with many years in the field able to translate in both directions - on behalf of customers to our engineers and on behalf of engineers to our customers. That means it’s no longer the engineers speaking with customers and struggling to understand real world issues from a technical perspective, it’s me, with my experience in the real world, communicating both ways. JA: What has the feedback been from law enforcement and government end users – is the reaction positive? TF: Absolutely. It helps that I love the intense operations focus of Genetec solutions. When I first joined and was shown things like Clearance and Citigraf (a decision support system for comprehensive response), I was like: “This really exists? People in law enforcement need to hear about this!” And the Genetec team laughed and said: “Guess what your new job is?” In a way this made it an easier transition because I really saw the operational strengths of the different solutions I was discovering. I could say: “this functionality relates to counter terrorism, that functionality can help out with particular crime prevention techniques, and that functionality over here can help

se&n 51

SEM1118_50interview.indd 51

25/10/18 4:18 pm


● Regulars

The Interview

IN THE SENSE OF HELPING LAW ENFORCEMENT AND GOVERNMENT WITH REAL SOLUTIONS, THIS ROLE IS PERFECT.

the police officer on the street go into a situation with an intelligence-led focus. By that I mean they are not entering premises blind, as they might have in the past, but have information about the situation allowing them to be adequately prepared. They know the action, they know the decisions required. This is what my role is – to make it easier for law enforcement officers to handle their work more efficiently and in greater safety, as well as to help keep the community safe. In the sense of helping law enforcement and government with real solutions, this role is perfect. JA: You’ve mentioned a couple of products that are designed from the ground up to be used in law enforcement and policing applications – could you tell us a little more about them? TF: Genetec has re-organised its business into application groups – small units within the company that have responsibility for creating new solutions that are more operations-specific. The products that have come from this operations focus include Citigraf – a situational awareness solution with a ‘correlation engine’ which allows security professionals to put together a lot of data from different sources and present it on a single screen—making it easy to understand. There’s also Community Connect – a partnership with private business and public law enforcement that leverages end user hardware and Genetec Stratocast cloud to federate that private video back to police. A solution I particularly like from a law

enforcement perspective is Clearance, which allows law enforcement or other organisations to collect and manage digital evidence from any source, as well as managing cases in a way that is secure, encrypted, that keeps the chain of custody, while allowing all possible evidence to be shared between private citizens and law enforcement personal. These are the platforms I have at my disposal to help law enforcement communities. JA: Would you say that police are more open to the application of technology than they’ve ever been before? TF: Police now are trying to develop intelligence-led policing – they’re certainly trying to figure out ways to streamline investigations. They are wondering how all data can be converted into actionable intelligence in a timely manner. Genetec has 3 pillars: Intelligence, security and operations. You need intelligence to ensure you can provide secure operations and that melds with what law enforcement is doing these days – law enforcement is great at collecting information but it’s a lot harder to decipher it in real time. JA: When it comes to operations, what do you think end users need to focus most intently on to ensure the best possible outcomes? TF: Well that all depends on the role of an individual in that operation. Whether an employee/subordinate or a decision maker, each person has their own responsibilities in performing their duties to the best of their ability in keeping the

community safe. Front line officers have many worries when out on the street—and while the superintendent has toiled over these same worries many times, they also have a separate and different load of concerns to contend with. But there is a commonality in all of this, everyone is working towards the same goal; a safe community and city. Therefore, they must all be working off the same operational page. Jonathan Lewis, chief of the Chicago Police Department, says it best: “we are data rich, but information poor...” Law enforcement now has many different information indices with volumes of information to analyse to make accurate decisions. Timely communication and collaboration using the same intelligence is one of the keys to successful outcomes. JA: What big lessons did you learn during your time at the Australian Federal Police, Tiago? TF: The main lesson that I’m proud to have learned and implemented in my AFP career is my earlier point, collaboration. Working well with others in the sandpit leads to successful results, quicker. No person is an island. Not only must they learn to share with others, but learn from others to improve themselves. It’s all about collaboration. The old AFP vision used to be: “To fight crime and win”. It was former AFP Commissioner Keelty who added one word to that vision and changed the attitude when it came to policing: “To fight crime together and win”. JA: What message would you like to give Genetec customers in ANZ, as well as any end users looking for support to meet serious operational goals using technology? TF: The answer comes back to what Genetec said to me. I wasn’t brought in to be a salesperson, but to be a former police officer helping others in law enforcement and government. What is brilliant about Genetec is that we are camera-agnostic, software-agnostic and an open platform wanting to collaborate with others to keep communities safe. This means I’m not restricted in what support I can provide law enforcement and others. Whether it’s improving on current technology, proactive measures for analytics, or discussions on innovative concepts, I’m constantly striving to help clients help their agencies to achieve their operational goals. n

52 se&n

SEM1118_50interview.indd 52

25/10/18 4:18 pm


SEM1118_53.indd 1

25/10/18 4:26 pm


● Special report

Technology

SUPPORTING SECURITY OPERATIONS WITH TECHNOLOGY

Scott Myles drives a well-designed workstation.

How important is security technology when it comes to security operations? When you take a walk around a modern security operations centre, it’s hard to argue that technology is at the heart of things, empowering staff, enhancing safety, facilitating security.

ECHNOLOGY’s central role in security operations isn’t always recognised but you don’t have to look too closely at an end user security department before you find a control room that brings together multifarious technologies into an operational nerve centre. A security control room is likely to incorporate management solutions for alarms, access control, video surveillance, fire management and control, building management, HVAC, lift control and more.

T

54 se&n

SEM1118_54technology.indd 54

25/10/18 4:31 pm


BY J O H N A D A M S

Depending on the level of integration between these subsystems, the complexity of the interfaces between these systems and their operators is going to be variable. In some applications, operators will themselves provide a measure of connectivity while serious integrations are going to merge inputs and outputs in the background and present them to operators via a unified and federated security management system. According to Matryx Consulting’s Luke PercyDove, without security technologies, responsibility for the security of property and the safety of people would ultimately rely on people alone. “This would be impractical to do and ultimately a flawed strategy,” argues Percy-Dove. “People are fallible whereas technology is generally very reliable. Ultimately, whatever security technologies are deployed must be fit for purpose. Considerations will be the type of technology to be used, if it can be easily integrated into the local environment and if it is cost effective. Amenity is also an important consideration. You must be mindful of the environment and maintaining the look and feel of it wherever possible. “Access control and intrusion detection should be the first security technology deployed in almost any property. These set the rules for who can come and go and when, and also provide alerts if rules are broken. Without this, you are almost flying blind. CCTV would closely follow in importance to provide visibility of what is unfolding at any given time.” How important is planning and process when it comes to applying security solutions? According to Percy-Dove it’s integral. “This is something that is so often overlooked but is actually a key element of security,” he says. “As an example, duress buttons are installed widely across a variety of industries, but the response mechanisms are rarely properly considered. Business often doesn’t appreciate that a response could take 45 minutes or more, which in most instances will be far too long. Planning and process is critically important in any security strategy. “Speaking from the perspective of a security consultant, I think we play a very important role. We act as an extension of our client’s team and only ever act in their interests. We bring knowledge and experience when it is needed. Project managers need to implement and get systems to work as designed so their role is equally important. Meanwhile, security integrators must always work in the best interests of the security manager. If the product that they are resellers or agents for is not a good fit, then they need to be able to recognise that and suggest an alternative. The other element is that whatever systems are being implemented need to be manageable and easily operated. Systems that are complex will rarely be fully embraced, which usually means risk or failings in other areas. It must be about the client.” When it comes to new technologies, Percy-Dove says he wants to see the old technologies done properly, first.

ACCESS CONTROL AND INTRUSION DETECTION SHOULD BE THE FIRST SECURITY TECHNOLOGY DEPLOYED IN ALMOST ANY PROPERTY.

“Sorry to be boring, but I am still waiting for the industry to do basic systems integration well,” he says. “At an enterprise level, integration is common but less so in the broader commercial market. I see systems integration as a fundamental of good security risk management. Without it, there will be gaps that will be too reliant on humans to manage. I don’t think there is any one technology that should be top of mind right now because every application is so different.” According to Stuart Rawling, Pelco by Schneider Electric, security technology that can alert a human operator of a potential incident is by far the most valuable offering. “The use of a system for forensic investigation is always after an incident has occurred and invariably such an incident has had some intrinsic cost already,” Rawlings explain. “Having a system detect and highlight potential incidents or suspicious activity before they result in anything negative is what we all want to see as an operator. “The reality is that human operators cannot always successfully review hundreds of camera feeds with the concentration and spatial awareness required to protect an entire site. That’s why having a system that helps direct the operators’ attention improves overall security.” According to Rawlings, at the top of the list of things security managers must bear in mind when assessing technology fixes for their applications comes cybersecurity. “Cybersecurity is a top concern for many involved in the physical safety and security industry,” Rawlings says. “This includes Pelco and its customers, distributors, and system integrator partners. The Australian Government is one of the most demanding customers when it comes to the cybersecurity of its own deployments, namely video surveillance systems used for critical infrastructure and public safety. Being aware of trends, rules, and regulations in this area is important for security managers to keep in mind.” When it comes to foundational security technologies, Rawlings believes the term ‘security technology’ is overloaded. “Those of us in the physical security industry would interpret this to be the technologies being applied in our industry, but I would hazard a guess that the majority would think of technology applied to securing ourselves against cyber-attacks,” he says.

se&n 55

SEM1118_54technology.indd 55

25/10/18 4:31 pm


● Special report

Technology

“However, today’s cameras and video management systems are much more than devices that protect property and people. A camera is the richest data sensor available, and we are starting to see some very creative and focused uses of cameras as a data source. In terms of VMS, certain markets are no longer focused on showing the video as a primary viewpoint, but instead showing an aggregation of the data gathered by intelligent cameras and other systems. The information gathered by these cameras are the oil to the management systems combustion engine. The only question that remains is how fast can we get this engine to take us.” As technology becomes more capable and the expectations placed on it become greater, planning and process has an increasing role when it comes to applying security solutions. “The technologies of today are ever increasing in their complexity, and while there is a huge focus on ease of install and use, the enemy of those concepts is the rush job,” Rawlings says. “When it comes to maintaining and optimizing technologies, a sound rational process can be the difference between a smooth deployment and one that puts people and property at risk. “A successful security strategy is a combination of people, processes, and technology. These days, we see much more direct marketing and connections between manufacturers and technology vendors with the end user market. However, it is critical to realize the development of processes and trained people is not part of that equation. This is where having a good consultant on retainer to provide guidance and recommendations is critical. A project manager that oversees the deployment of the solution will also be paramount.” When it comes to security integrators working with security managers, Rawlings says integrators need to be focused on features as well as price. “In sensitive markets, there will always be a demand for the most value, but the levers we pull to provide value are really in two areas – price and

AS WE DELVE INTO THE WORLD OF AI, WE NEED TO AVOID THE MISTAKE OF BUCKETING THIS INTO VIDEO CONTENT ANALYSIS ONLY.

features,” Rawlings explains. “As more industry and cyber standards become available for manufacturers to conform to, the concept of security as a feature will (unfortunately, in my opinion) become the norm. “End-users will often make a trade-off between security and price, and often unknowingly. However, the risks are less tied to the price of the hardware, and more to the fact that end-users with tight budgets may also be constrained in their maintenance and operational support funds. Since a successful cybersecurity strategy is a combination of people, processes, and technology, a lack of focus in any one of these areas creates risks.” What key new technologies does Rawlings think security managers should be looking at right now? “One of the main emerging technologies is the advancement in artificial intelligence,” he says. “As we delve into the world of AI, we need to avoid the mistake of bucketing this into video content analysis only. As the world is an ever-expanding melting pot of data points, AI can be used to not only vastly improve data generation, but also play a critical role in the consumption and processing of all the various data points. “The first generation of video content analysis was initially all about alert generation, which eventually resulted in the improvement of forensic search capabilities. That said, there was always the challenge of false alerts and missed results. Applying AI technology such as deep neural networks to computer vision will significantly improve performance, provided that the DNN model is properly trained. This will generate much higher quality data in the form of alerts and descriptive metadata. “A more interesting fact is that when we take lots of data points over time and use AI to observe and learn the environment’s ‘normal’, we can then look across a range of data points and flag when a series of events appears abnormal. That’s true intelligence helping us on our mission of protecting communities on a global scale.” Meanwhile Rusty Blake of Inner Range believes technology is integral to security operations. “It’s 2018. Trying to imagine security operations without the use of security technology would be difficult without dusting off an ancient spy novel and being reminded of yonder years,” Blake says. “In today’s world, we have a plethora of diverse technologies that come together and form the entire structure of security operations. Think CCTV, access control, perimeter defence, incident reporting, realtime notifications, drones, intruder alarms and so on. “Security technology differs based on the application. Talking boots on the ground, a security team cannot function without communication and co-ordination. CB radios, real-time notifications and CCTV are 3 examples of audible and visual communication that facilitates co-ordination. At the control room, incident reporting and automation between technology systems (CCTV, access control, PA systems, etc) plays a vital role.” According to Geutebruck’s Anthony Brooks,

56 se&n

SEM1118_54technology.indd 56

25/10/18 4:32 pm


security technology can either make or break a security operation. “In recent years, there has been a disproportionate amount of over-hyped analytics that often create more noise through false positives and distract operators more than helping them,” Brooks says. “A perfect security solution should be the most popular team member in the control room, providing automated alarm actions and events – delivering meaningful and actionable information in a timely fashion. It’s all about creating operational efficiencies that help to save valuable time and support the security personnel. “Security managers who understand their risks and threats are better positioned to mitigate the threat with technology. Defining the operational outcomes is a key to success. The use of a skilled, reliable and trustworthy security integrator (and/or consultant) who consults according to the needs of the customer and understands their individual pain points will further assist in delivering solid outcomes. “For instance, any considered technology/solution should be flexible and easy to integrate/connect to existing third-party systems. It’s also important to consider the true cost of ownership over the long run. A greater RIO will be realised when using systems that are well supported and backed by a manufacture who delivers on long lifecycles and backward compatibility.” Which security technology is foundational, when it comes to supporting security teams, in Brooks’ opinion? “There is no one silver bullet technology; but rather a lot of moving parts all of which, must deliver on the fundamentals of reliability, reliability, reliability,” Brooks explains. “For instance, Geutebruck is very committed to delivering failsafe and redundant solutions that minimise risks and losses while maximising operational efficiencies and profits in retail/ logistics environments. Our open platform and free SDK support a wide range of interfaces, enabling connectivity to third-party systems, which is crucial in delivering utmost efficiency. “I would argue the planning and process when it comes to applying security solutions is crucial

and you need a combination of progress, foresight and prudence. We advise clients to do the same. Comprehensive design and consulting are the best guarantees of success and will help ensure a 100 per cent functional delivery while saving time, money and problems.” According to Michael Kosaros at Mobotix, technology is the very crux of security operations. “Without technology security operations will not be able to function effectively,” he says. “Technology can help a business in many ways and security managers need to plan technology deployments based on an holistic business approach that takes into account work flow and processes. “In my opinion, communications is key to all effective security teams when it comes to technology. Without the ability to communicate, a team becomes many individuals which can cause vulnerabilities. All communication technologies become imperative, including mobile phones, 2-way radios, CCTV and VMS. This said, important technologies of the future include data capture from the images and events to action, as well as creating better processes with the technology available. Also of value is analytics to proactively capture pre and post-event incidents and minimise time consuming work tasks. “Planning and process is the single most important agenda when designing any security solution. The most common point of failure in any technology solution will occur within the planning phase. Without a process to the procedure, a point of failure cannot be determined.” Kosaros believes consultants and project managers are an asset to the process. All security vendors and systems integrators find themselves consulting and project managing daily. What consultants and projects managers provide is a single point of contact to an end user swimming in an ocean of technology, he explains. “Security integrators must never lose sight of the process and work flow, either,” Kosaros says. “The technology deployment must be suitable for the level of monitoring. Without collaboration between the 2 parties, a great security deployment could turn into a problematic one. The technology should be fit for purpose and so should the solution." n

se&n 57

SEM1118_54technology.indd 57

25/10/18 4:32 pm


● Special report

Defending public space Scott Myles drives a well-designed workstation.

VEHICLE MITIGATION Protecting public space against attacks using vehicles is a tough brief for security professionals. Solutions can be costly, often must be temporary, and it’s impossible to cover every area of vulnerability. At the same time, the Australian Government has put responsibility for protecting crowded places firmly onto operators and that means risk analysis and response is vital.

ROTECTING public space from attacks using vehicles is challenging. In the first instance, the threat is real. There have been multiple attacks around the world – the UK, France, Germany, the United States, Australia and across the Middle East. In some attacks, cars or vans have been used but in others, heavy vehicles have devastated crowded areas. In Australia, the response to these and other threats has been the Strategy For Protecting Crowded Places but implementation has been slow and vulnerabilities remain. Ezi Automation’s Rod Acland says given that the federal government’s current National Terrorism Threat Advisory System ranks Australia’s current Terrorism Threat Level as ‘Probable’, the threat of hostile vehicle attacks is something we must learn to live with and manage for some time ahead. “Any attack upon innocents deploying a vehicle as a weapon is obviously an act of terrorism regardless of motive or persuasion,” Acland says. “Many countries including Australia have encountered atrocities at the hands of deranged

P

58 se&n

SEM1118_58mitigation.indd 58

25/10/18 4:19 pm


BY J O H N A D A M S

individuals, sometimes entirely without apparent motive, in bewildering instances of copycat assaults, with terrible effect. It is recognised that without any degree of sophisticated planning and at nil cost, a perpetrator can commandeer a vehicle and commit an atrocity of horrifying consequence, for reasons as unpredictable as drug-induced rage or simply as a means of self-aggrandisement, given the inevitable attention necessarily attracted by such acts of terror.” When it comes to meeting obligations under the Strategy for the Protection of Crowded Places from Terrorism, how important is it that they assess the threat and plan a response, in Acland’s opinion? “A strategic plan must envelope adjacent and surrounding factors to cost effectively oppose the established likelihood of a hostile vehicle attack,” Acland argues. “Collaboration with neighbouring stakeholders and responsible authorities is essential to maximise the value of investment in this challenge. Precinct wide strategies can often dramatically reduce the anecdotal cost of protecting individual locations. “For organisations looking to protect their sites against vehicles, key considerations include identifying and/or introducing choke points – reducing the number of accessible approaches to a precinct above a given speed, is essential. Be aware that the energy to be repelled in any impact event increases exponentially with the velocity of the approach (and accordingly the cost) in comparative proportion to vehicle size. If unavoidably high-speed approaches are confronted in a few locations, you need effective obstruction beyond the entry points.” When it comes to the least expensive solutions for large applications – universities, city centres, malls, major events, Acland says there are plenty of good options. “Introduction of traffic calming measures such as road diversion, undulations and obstacles such as roundabouts, chicanes, speed humps, trees, recreation or beautification spaces, in conjunction with high capability barriers both fixed and deployable at strategic locations, can eliminate a vehicle’s capacity to negotiate precinct boundaries without vastly diminishing subsequent attack velocity,” he argues. “HV barriers proven to repel impacts at 30, 40 or even 60kmph can cost much less than half or even quarter of those effective against an 80kmph impact, so it is obviously an important priority to reduce the requirement for the latter, enabling greater proliferation of less expensive though effective, reduced impact measures.” If money was no object, Acland says he’d be thinking about rising step road blockers to resist hostile vehicle attacks. “Rising step road blockers, or wedges, are far less widely deployed in Australia in comparison to Europe, Middle East and Africa, where the incidence of vehicle borne attacks has been

MANY COUNTRIES INCLUDING AUSTRALIA HAVE ENCOUNTERED ATROCITIES AT THE HANDS OF DERANGED INDIVIDUALS, SOMETIMES ENTIRELY WITHOUT APPARENT MOTIVE, IN BEWILDERING INSTANCES OF COPYCAT ASSAULTS, WITH TERRIBLE EFFECT.

Clint McCaughan

prevalent for much longer,” Acland explains. “These devices are ruthlessly effective at arresting hostile vehicles approaching at high velocity, dead in their tracks permitting zero to minimal penetration compared to alternative methods. “Wherever near full-time vehicular access is essential yet regulated, these systems stand alone in their performance capacity. These systems also derive benefit from lengthy and continual research, design and testing, nowadays achieving outstanding HVB performance requiring vastly diminished foundation depth compared to earlier designs. Another interesting observation is that these devices have been widely adopted in Australia as the sentry of choice at entry points to military establishments. “Often these devices operate at uniquely rapid speed under a detected emergency, sometimes behind, and often in conjunction with softer, more conventional entry controls, as an absolute backstop. They are almost unseen at commercial venues or on public roadways in Australia by comparison, whereas internationally they are quite common, although never in EFO mode (Emergency Fast Operation), due to the inherent danger of accidental encounters, rarely survivable. However, by operating a wedge in reverse mode to ‘EFO’, i.e. ordinarily up as a controlled barrier, like a boom gate (although a ruthlessly more effective HVB by comparison), the wedge can be quickly lowered to permit authorised access. “In another highly effective application, where a space may be a conventional public roadway 5 or 6 days a week, but serving as a market place or event venue on weekends or anecdotally, the wedges may lie unnoticed all week forming part of the surrounding road surface, to be raised only when the

se&n 59

SEM1118_58mitigation.indd 59

25/10/18 4:19 pm


● Special report

Defending public space

area is accommodating a milling crowd enjoying the market or other entertainment, in complete security with the wedges serving as both a prohibitive HV Barrier as well as an emphatic deterrent.” Is it realistic to think of integrating automated rising bollards into a city security solution, allowing activation when a threat was detected? “Potentially so, either as a periodic deployment under escalated assessed risk, or in areas where the mode of the precinct’s operation, as described above changes periodically,” says Acland. “A significant factor in cityscapes is that underground services often exist, either identified or often only discovered during excavation, rendering vertically retractable bollards impractical or uneconomic in comparison to rising wedges as described above, due the depth of excavation necessary to accommodate vertically automated bollards. Whereas bollards that withdraw under the roadway can require up to 2 metres of excavation depth to accommodate the height of the bollard, its mechanism and foundation, a wedge of generally superior HVB performance can be installed in as little as 200mm deep foundation, proving a more cost-effective alternative that can be installed in far less time.” Danny Berkovic of integrator, Fredon Security, agrees hostile vehicle attacks are a threat to public safety. “Tragic events locally and globally have shown that vehicle attacks are a serious threat to public safety,” Berkovic says. “Assessing threats and implementing plans to address them are critical steps in ensuring public safety. The criticality of doing so will clearly depend on the location of the site and the nature of the site’s perimeter. “For organisations looking to protect their sites against vehicles there are a number of factors to be considered. These include: l Potential approach angles and speeds to determine factors such as impact rating and positions of countermeasures; l Public safety when active countermeasures are

SELECTION OF THE MOST SUITABLE BARRIER IS DEPENDENT ON IDENTIFIED THREATS AND THE INSTALLATION ENVIRONMENT.

operating, e.g. active barriers creating pinch points or hitting civilian cars, etc.; l Authorised traffic access via automatic or manual countermeasures, for instance, allowing access to the area for authorised or emergency vehicles. l Not wanting security to overly compromise public amenity of the space in question. When it comes to the least expensive solutions for large applications – universities, city centres, malls, major events – Berkovic says passive countermeasures are the least expensive but these may more drastically impact the traffic flow in the area and provide less flexibility for different usage of the spaces. “The type of countermeasure that is most cost effective differs based on the identified threats and built environment,” he says. “Selection of the most suitable barrier is dependent on identified threats and the installation environment. For example, a rising wedge may be effective at preventing vehicle access to a laneway or driveway but wouldn’t be suitable to prevent access to a forecourt. Rising bollards are often a good compromise as they provide flexibility and are relatively unobtrusive – especially when retracted. The downside of rising bollards is they can be slower to deploy in an emergency and should be supervised when being raised in a public area. “That said, it’s reasonable to imagine automated rising bollards integrated into smart city solutions. In public areas, any active barrier installations should be installed with stringent safety systems to prevent activations causing injury to non-threatening pedestrians and motorists. While these safety measures are critical, they must be designed so as not to prevent activation during a genuine threat, e.g. a single safety beam that can be blocked by a pedestrian to allow vehicle access. “It’s also important to consider the barriers’ integrations with other systems. Typically, automated barriers could be activated by local inputs (e.g. speed or direction sensors) but also by a security management system and/or video analytics platform. While multiple detection and activation methods increase the likelihood of genuine activations, it also introduces additional points of failure and can complicate maintenance tasks and investigations into false activations. The barriers’ safety measures should never be handled or overridden by an SMS or other system.” Berkovic believes it is possible to mitigate such threats entirely, but only by removing or severely limiting vehicular access to the area through physical barriers. “This has impacts on authorised vehicle access and, if done poorly, could create spaces that don’t feel free or open,” he says. “It should be remembered that if vehicle threats were mitigated entirely, there will always be other potential threats to public safety. As such, any strategy to defend public spaces from vehicles should be part of an holistic public safety

60 se&n

SEM1118_58mitigation.indd 60

25/10/18 4:20 pm


strategy that includes policing, CCTV etc yet takes public amenity into consideration.” A consideration of many applications is the impermanence of the barriers required. They may need to be moved around a site, or they may only be needed for several weeks. This poses challenges for security managers, who must provide world-best standards of HV mitigation for a short peiord of time. According to John Ferguson of Protective Barriers Australia, new technology is needed to bring global best practice to temporary hostile vehicle mitigation (HVM) solutions. “Over the past 5 years, moving vehicles have become a weapon of choice for terrorism due to their ability to go undetected and get close to crowded public places,” Ferguson says. “If Australia is to keep pace with global best practice in HVM, new technology and systems are needed to protect against hostile vehicle attacks. The Strategy for Protecting Crowded Places was a positive response to multiple hostile vehicle attacks in Melbourne’s CBD. However, industry, state governments and local councils have been slow to adopt the recommended guidelines particularly in relation to events, crowds and temporary protection barriers often opting for ineffective measures used in road traffic safety, though not appropriate for adequate HVM solutions. “While permanent structures for HVM in key public areas are being implemented effectively,

when it comes to temporary and mobile solutions, this is where the industry is falling behind our global counterparts.” Protective Barriers Australia has brought a new security product to the Australian market to meet this gap in providing adequate HVM for events and crowded public places. The Mifram Modular Vehicle Barrier (MVB) stops all size vehicles in their tracks, from motorbikes to semi-trailers. The MVB range is tough and effective, easily transportable and rapidly deployed by one person within minutes, it is a non-lethal vehicle barrier that is crash-tested and proven to stop cars, vans and trucks for the security and protection of people and physical assets. The MVB is used around the globe by clients, including the US Defence Force and United Nations, and was recently used for the HVM solution at the Commonwealth Games Gold Coast protecting venues, events and public spaces. “We chose the Modular Vehicle Barrier after a careful selection process,” explains Clint McCaughan, senior project officer, security and infrastructure, Gold Coast 2018 Commonwealth Games. “It’s deployable and easy to setup, which was key for us. The product is simple to use and highly effective. The team at Protective Barriers Australia were good to work with. We sought their advice on what we wanted to achieve, and they delivered a solution that fitted our needs.” n

se&n 61

SEM1118_58mitigation.indd 61

25/10/18 4:20 pm


● Regulars

Products

Editor’s choice BOSCH AUTODOME IP 5000I STARLIGHT l BOSCH has released its new AUTODOME IP 5000i with

starlight technology. In addition to features offered by the AUTODOME IP 5000i, the latest AUTODOME IP starlight 5000i cameras provide colour images in extremely low light environments down to 0.018 lux where other cameras switch to monochrome. Combined with an excellent high dynamic range of 120dB, AUTODOME IP starlight 5000i cameras offer the highest image quality in the entire mid-range portfolio of moving cameras. With essential video analytics as standard, the cameras can sense what they’re viewing and alert to any potential threats instantly. AUTODOME IP starlight 5000i cameras are also available as IR models. Distributor: Bosch Security Systems Contact: 1300 026 724 (13000 BOSCH)

NEW INTEGRA BUNDLE PACKAGES FROM CSM l CONSOLIDATED Security Merchants has teamed up with

IndigoVision to offer a selection of exclusive bundle packages that will help set your business up with a reliable security solution that suits your requirements. The bundles consist of IndigoVision’s Integra and your choice of IndigoVision’s GX Camera range which purchased together dramatically reduce your security costs. All you need to do is add a monitor, keyboard and mouse to get a complete security solution up and running. There are 8, 16 and 24 channel packages are available, each suited to a broad range of applications. Distributor: Consolidated Security Merchants Contact: 1300663904

What’s new in the industry.

NEW NESS D8XCEL & D16XCEL ALARM PANELS l NESS reports that the all-new D8XCEL & D16XCEL series control panels are due in November. These new Ness alarm panels feature back to base reporting via CID and/or self-monitoring by SMS and the powerful SMS accessibility includes arm/disarm, programming, check system status, read alarm memory, receive alarm messages and operate AUX outputs by SMS/TXT. The panels support up to 10 mobile phone numbers for SMS reporting, have fully customisable word library for SMS messaging, feature all-new KPX, Saturn and Navigator keypads, supporting cellular operation, including real-time clock display (network time). Distributor: Ness Corporation Contact: +61 2 8825 9222

MILESTONE RELEASES NEW HUSKY X SERIES NVR l MILESTONE says the Husky X Series NVRs can support up to 700+ cameras due to optimized hardware acceleration. The company says the Milestone Husky X-Series NVRs can act as scalable high-performance building blocks for businesses designing small or very large video solutions. The X-Series NVRs feature hardware acceleration so system performance can be boosted by having the graphics processor taking over the heavy lifting in decoding video, leaving room for the system to handle other tasks. There are 2 variations, the Milestone Husky X2 – featuring 2 hot-swappable hard disks and integrated PoE+ switch, which supports up to 133 cameras (720P @ 25 FPS, 2Mbit/s). Milestone Husky X8 – featuring 8 hot-swappable hard disks and dual 10 Gbit/s network interfaces. The internal storage can be expanded with external storage arrays connected via high speed fiber channel over Ethernet (FCoE) and iSCSI connections. Husky X8 supports up to 780 cameras (720P @ 25 FPS, 2Mbit/s) with a maximum recording rate of 1.828 Mbit/s. Includes a 4-core Intel Iris Pro CPU (Graphics Processing Unit) facilitating hardware acceleration and a server grade motherboard design. Distributor: Milestone Systems Contact: +61 3 9016 7877

62 se&n

SEM1118_62prods.indd 62

25/10/18 4:19 pm


HANWHA WISENET X SERIES

HIKVISION ULTRA-COMPACT PTZ FROM CSD

l WISENET X series is supercharged by the most powerful

l HIKVISION’S HIK-2DE2A404ID3 is an outdoor rated ultracompact surface mounted PTZ that is no bigger than a standard varifocal dome, weighing only 530g. Designed to vastly reduce installation time, security integrators can adjust the pan, tilt and zoom remotely or locally from their NVR’s. The horizontal pan is limited to 0-330 degrees and the vertical tilt is limited to 0-90 degrees. Available in 4MP, it features 120dB wide dynamic range, up to 20m IR, 4x optical zoom and H.265 compression. This compact size network camera offers great convenience at an affordable price.

chipset ever incorporated into a full camera range. The Wisenet 5 chip uses an all-new architecture to deliver unparalleled image quality with enhanced intelligent video and sound analytics. Available in 2 and 5 megapixels, the X series features the world’s best WDR at 150dB, ultra-low light performance, dual SD card slot and much more. Hanwha implements the best cyber security policies, namely strict user authentication, firmware encryption, database encryption and backdoor removal. With the Wisenet X series, Hanwha has defined a new standard of excellence for the surveillance industry. Now available at CSD. Distributor: CSD Contact: 1300 319 499

CHASE DISTRIBUTING STID ACCESS READERS AND CARDS

Distributor: CSD Ph: 1300 319 499

PELCO SPECTRA PROFESSIONAL IR

control readers and cards. STid is the most innovative and awarded global manufacturer of secure contactless identification solutions. According to Chase, this reader is a game changer offering high level security, as well as being vandal-proof, water-proof, flame-proof, and using RFID, NFC and Bluetooth technologies, as well as being optimised for the Internet of Things (IoT). The new STid Architect series is intuitive and dynamic and consists of 5 interchangeable modules that can easily be connected to a smart RFID core (optional Bluetooth). The concept can be tailored to your needs, offering the optimum solution for any situation and ensuring that all functionalities and security levels can be upgraded across all your readers.

l PELCO by Schneider Electric has released the Spectra Professional IR - a rugged camera ideal for transportation, city surveillance, airports, seaports and commercial markets. The Spectra Professional IR features above the horizon viewing capability providing greater coverage of bridges, overpasses and building exteriors without mounting additional cameras. The camera also provides built-in IR illumination on areas of interest. Other key features include H.265 and Pelco’s Smart Compression technology, the Spectra Professional IR, which lower bandwidth and storage requirements 30-70 per cent. There’s digital image stabilization, simple installation and full integration with Pelco’s VideoXpert and leading ONVIF-compliant video management systems, allowing the camera to be seamlessly presented in video management systems, so operators can easily track objects moving in the scene and zoom in for greater detail.

Distributor: Chase Security Solutions Contact: 1300 793 316

Distributor: Pelco By Schneider Electric Contact: +61 2 9125 8094

l CHASE Security Solutions is now distributing STid access

se&n 63

SEM1118_62prods.indd 63

25/10/18 4:19 pm


● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: It’s extremely difficult to assess the overall quality of wireless security and automation solutions. There are many on the market, some inexpensive. Could you offer any advice on what we should be looking for? A: You want the fundamentals to be solid if you’re after a serious solution. You want battery backup. You want to meet the Australian Standard – even though this calls for a lockable metal box for the controller. Modern controller/ keypads aren’t just poly, often they have no backup battery and are installed out in the open as a keypad or touchpad. Worse, some systems have an on-off slider switch right on the side of the unit. You want more than one reporting path. That could be dual-SIM or SIM and blue cable. When it comes to sensors, including cameras, you want good sensor designs and reasonable quality. In the case of PIRs, a dual pyroelectric sensor with a well-designed lens is to be preferred. Quality mirror optics offer best performance. Dual technology sensors offer low false alarm rates in challenging environments, but they are not commonly found in typical security and home automation solutions. When it comes to CCTV, you will be getting low cost cameras with modest resolution and very wide

Our panel of experts answers your questions.

angles of view from short focal lengths with large apertures of around F1.2. This combination of wide angle, wide aperture and low resolution is a recipe for low quality image streams. Throw in cheap lenses with poor design characteristics and things are likely to get very murky indeed. For a home automation system, 720p is considered by manufacturers to be plenty of resolution and at a focal length of 4-6mm, that would probably be true. However, most home automation cameras have angles of view that are more than 100 degrees – some even boast of 130 degrees and have the temerity to highlight their digital zoom capabilities. All other things being equal, you’re better to go for cameras with less than 100-degree views with 720p and insist on 1080p for wider angles of view. With digital zoom at such wide angles you’re zooming into softness. Try to avoid cameras with stomach churning levels of barrel distortion and make sure there’s WDR capability. If the camera can’t handle backlight, you’ll have trouble getting consistent performance in a domestic application where cameras are very likely to be installed in brightlylit areas like kitchens, or looking towards glass front or sliding doors. Most users don’t want the surveillance cameras pointing inwards at the family but outwards towards potential intruders. Keep an eye out for chromatic aberration – purple fringing – and try to avoid cameras with lenses that generate ghosting or flare in the presence of strong light sources.

Blooming is a clear sign of a cheap sensor – you don’t want pixels to be spilling electrical signal all over the place. This will cost you contrast, detail and sharpness. You also want minimal latency and the appearance of real time image streams. There are plenty of cameras out there that claim to be running at 25ips yet deliver jerky views of motion. Avoid them. Getting all this through a cloud connection imposes a whole new set of challenges. Mobile interface. Make sure it’s well designed and that no matter where you are in the app it’s possible to go anywhere else without having to back up 3 steps. Things like geo-fencing and auto-deactivation when the system senses your approach could be nice features if this suits you, but you don’t want the house to be disarming every time you drive past on the way to somewhere else. Mapping and imagery are solid features and you want these to be icon-based and easy to drive. In the backend you want a reliable cloud provider, you want low latency – a higher performance internet service is a vital and often unconsidered component of a home automation system. And buy a system that can be monitored by a professional monitoring station. Q: We are interested in a perimeter security system, but we don’t want to use video motion detection or thermal cameras – we don’t have a CCTV system. Which sensor-based systems could we link back to our alarm access control system? And what are the

64 se&n

SEM1118_64help.indd 64

25/10/18 3:51 pm


greatest causes of false alarms with these sorts of systems? A: When it comes to sensor-based perimeter intrusion detection technologies there are many types including: l Fluid pressure systems use a fluid pressure sensor and a thin diameter tube that’s buried in a trench in an open area between external perimeter barriers and a facilities assets or installations. An intruder walking above the sensor compresses the soil and fill, puts weight on the tube, and increases the pressure in the tube and sets off an alarm. l Taut wire systems are installed as part of the physical structure of a fence and located between a wire strand and a support post. A pendulum within their simple sensor housing is fixed in the closed positioned, completing a circuit. When an intruder puts pressure on the sensor or if the wire is cut, the circuit is broken, and an alarm is activated. l Active infrared beams work by passing infrared light from a receiver to a transmitter. If the beam is broken, an alarm is generated and passed through an output to an input on an alarm panel or access panel. Active IR is a capable point-to-point perimeter option. l External microwave systems work using the Doppler effect, which sends out a signal, detects its reflection and alarms if that reflection is altered by intrusion. Microwave sensors (Gunn Diode) are affected by water-filled bodies and changes in reflected signals. It’s possible with microwave to have either single point detection or point to point detection. Range with microwave is excellent and resistance to environmental disturbances like rain, fog and snow is unparalleled. l Photoelectric beams are point-to-point systems with an alarm output at one end of the system. Breaking the photoelectric beam will cause an alarm to be activated. l Fibre optic cable sensors are installed on fences and a regular pulse of light passes through the cable. If the wire is cut or if pressure on the cable breaks the glass, changes the wavelength or removes the expected system signal, then an alarm is activated. l Capacitive field systems generate a stable electrical field around themselves

and go into alarm in the event of intrusion when this field is disrupted. These systems are highly sensitive and are effective in challenging environments. l Electromagnetic cable employs capacitance to detect intrusion and these systems are usually mounted on fences. When these fields are interrupted or altered by intrusion or cutting they’ll signal an alarm. There are a number of threats a perimeter system must be immune to, by virtue of technology, design and installation. The following factors will cause alarm in various perimeter systems: l Passage of heavy transport l Wind movement of tree branches l Soil subsidence l Strong light sources l Microwave interference l Inadvertent intrusion by kids, visitors or staff l Fog, smoke, rain, fumes and dust l Extremes of temperature l Ice and snow l Wind vibration l Drying soils l Ground movement generated by tree root movement l Weight of rain water l EMI and RFI l Lightning l Wind-blown leaves l Long grass, shrubs and bushes.

Q: We have a long cable run in a CCTV installation and the end user wants to continue using an analogue camera which delivers good low light performance and low latency – could you tell us how long we can go? A: Coaxial cable runs should be short and as direct as possible, with straight lines being preferable. Don’t run RG-59 cables further than 150m without amplification at the camera output to give intermediate signal boosting. A good amplifier in a quality installation will pump range up as much as 5x. Another option when faced with long cable runs is to use powered coax. This saves dollars in that power cable need not be run to the camera. You can also use twisted pair cables and with the right setup and protection, these will give you a cable run between 500-1500m. Common signal transmission woes will demand implementation of suppression and fidelity control - they’ll be visible on the monitor during setup. But there are other problems that are harder to pin down. Resolution loss is always difficult and tends to be the result of upper end amplitude loss that results from the use of a cable with a specification that’s too low for the distance of your cable run. Other typical causes can be things like too many bends in the run, kinks under pressure, too many joins, or damage to the cable’s braided outer or inner cores. n

se&n 65

SEM1118_64help.indd 65

25/10/18 4:45 pm


NOVEMBER 2018 ISSUE 404

SECURITY OPERATIONS & TECHNOLOGY l Security Awards For Excellence & OSPAs 2018 l Case Study: Transport Roads & Maritime NSW l New Security Technology at SAGE 2018 l Product Review: Fog Bandit l Security Management: How Effective are Bollards? l Monitoring: Telstra Targets Security, IoT l The Interview, Tiago Ferreira, Genetec l Vehicle Mitigation in Public Spaces

PP 100001158

+

events Secutech Thailand Dates: November 8-10, 2018 Venues: Bangkok International Trade and Exhibition Center Contact: +886 2 8729 1099 Secutech Thailand is a premier platform to showcase the latest innovations and build up strategic partnerships with the supply chains of security, smart home and fire and safety products.

SECURITY & GOVERNMENT EXPO

Security and Government Expo 2018

Date: November 8, 2018 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 Security and Government Expo is a one-day expo with over 30 companies promoting their technologies and products in the nation’s capital. SAGE brings together government and commercial end users, consultants, integrators and installers in Canberra and the ACT to see the latest security solutions in a relaxed and informal atmosphere.

+

ISC West Dates: April 9-11, 2019 Venue: Sands Expo, Las Vegas, NV, USA Contact: Outside the US call +1 203 840 5602 or email inquiry@isc.reedexpo.com ISC West is the largest security industry trade show in the U.S. allowing you to network with more than 30,000 security professionals, with technology encompassing everything from access control to unmanned vehicles from more than 1000 manufacturers and distributors.

SecTech Roadshow 2019 Dates: May 2019 Venues: 5 city Australian tour Contact: Monique Keatinge +61 2 9280 4425 SecTech Roadshow in its 5th year takes leading electronic security manufacturers, distributors and wholesalers on a national tour.

Security 2019 Exhibition & Conference

= DAILY, WEEKLY, MONTHLY.

SEM1118_66events.indd 66

Date: July 24-26, 2019 Venue: International Convention Centre, Sydney Contact: +61 3 9261 4662 Security Exhibition & Conference offers Australia's largest showcase of cutting-edge security technologies from more than 150 exhibitors.

25/10/18 4:50 pm


DON'T PUT ALL YOUR EGGS IN ONE BASKET

N'T PUT ALL YOUR EGGS IN ONE BASKET

WIRELESS EVAC

ASSET PROTECTION

HOME AUTOMATION

ALARMS

CCTV

INTERCOM

CCTV

ACC ESS CO NROL

BE SAFE – NEVER SORRY! WITH CSM’S INTELLIGENT INTEGRATED SOLUTIONS

COMLIT

SEM1118_67.indd 1

TVT

VESTA

CROW

HONEYWELL

25/10/18 3:35 pm


End to end video management solution

Edge Based Intelligent Video Analysis Thermal Cameras On Camera Fire Detection Analytics End To End Encryption Intelligent Bitrate Management Workstation GPU Decoding for H.265

Multiple Analytic Rules Per Camera Scalable Architecture Forensic Search Built-in Trusted Platform Module Failover And High Availability Video Stitching

NOW AVAILABLE AT ANIXTER AND CSD SYDNEY

02 9333 0800 SEM1118_68.indd 1

MELBOURNE 03 9264 0000

BRISBANE

07 3113 4200

PERTH

08 9499 8000

1300 319 499 CSD.COM.AU 25/10/18 3:38 pm


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.