Page 1








How commercial vessels are protecting themselves PAGE 24



Co-ordinated control Creating control rooms that work PAGE 37


Perimeter protection Securing critical infrastructure sites PAGE 43


Axis Communication’s regional manager Baraa Al Akkad explains why encoders can be a costeffective route to IP PAGE 22


S E P T/ O C T 2 0 1 1

The latest upgrade of Siemen’s Siveillance SiteIQ proves its worth at a US chemical manufacturing site even during a mock terrorist attack Baraa Al Akkad, regional manager Axis Communications looks at how encoders build bridges from analogue to IP

Foreword from the editor

07 News

The latest contracts and installations, mergers and acquisitions happening in the security industry

15 Market

A round-up of the latest products launched in the regional market

37 Opinion

Terry Shough, Winsted EMEA’s general manager, provides advice on some of the common issues involved in control room construction

58 Events

20 Installation

22 Cover story

MONITOR 05 Up front


Diary dates of forthcoming securityrelated conferences and trade shows

24 Maritime security

Security Middle East takes a closer look at the technology that is being retrofitted by security professionals to commercial vessels of all types to help them identify and deal with the serious danger posed by pirates

29 Transport security: rail services

There is much more to creating a secure rail travel environment than technology, writes David Watts. Transparent design and good signage are just as important

32 Transport security: bus services

A distributed and scalable IP solution from Indigo Vision is helping the Delhi Bus Rapid Transit System stick to its timetable

43 Perimeter protection

Security Middle East highlights how an integrated approach to perimeter protection provides the best defence for large-scale critical infrastructure sites

48 Access control

Doug Woodbridge, head of Sales and Marketing at S3 ID looks at the latest developments in high-security ATEX certified zone 1 electronically controlled door locking solutions for use in potentially hazardous atmospheres

52 Network security

Nigel Hawthorn looks at the big four social networking risks and the various ways that businesses can protect themselves

I’d like to… transmit IP video & PoE up to 750m install multi-channel IP/Megapixel video over coax deliver camera PoE up to 45 watts avoid disruption to business get built-in transient protection and a Lifetime Warranty

Now, you can upgrade any legacy CCTV system without the expense of re-cabling. Allowing legacy coax cable to be used to transmit Ethernet video, the new NVT NV-EC1701 EoC transceiver enables analogue cameras to be easily upgraded to IP/Megapixel models. To find out more, contact us now. TM

Don’t re-cable. Re-enable! Tel. +971 (50) 652 3936 E-mail: Web: Tel. +44 (0)20 8977 6614 • E-mail:

CONTACT US EDITORIAL Editor Claire Mahoney T: +44 29 2075 6084 E:

Publisher Barry Bebbington T: +44 1708 229354 F: +44 1708 220017 E:

ADVERTISING UK, Europe and Middle East Barry Bebbington T: +44 1708 229354 F: +44 1708 220017 E:

Taiwan Mr. K.H. Pu T: +886 4 23016169 F: +886 4 23019649 E:

Online sales manager Mike Dingle T: +44 1752 605 158 M:+44 7977 243 953 E:

Online sales Ms Sam Stoyan M: +44 7813 924 943 E:

Online sales Ms Beth Atkinson T: +44 1823 662538 M: +44 7793 126662 E:

PUBLISHED BY Publications International Ltd 166 Front Lane, Upminster, Essex RM14 1LN, UK ASSOCIATE PUBLISHER Park Lane Publishers Ltd Office no.210, 2nd Floor, Building 1, Dubai Media City, PO Box 10263, Dubai, UAE T: +971 4 3911020 F: +971 4 3911022

PRINTED BY Express Printing Services PO Box 10263, Dubai, UAE T: +971 4 285 7209

EDITORIAL & DESIGN Dovetail Communications Ltd T: +44 29 2075 6084 E:

UP FRONT We are investing in infrastructure security like never before. According to IMS Research, the global market for perimeter security equipment is currently worth over $400 million dollars, half of this is being spent in the EMEA region. The Middle East and Africa is currently spending the most to secure projects such as airport and other transportation links, and critical infrastructure locations such as oil & gas and nuclear energy sites. Perimeter security is no longer just about physical security. In any modern, networked critical infrastructure security operation, what happens at the perimeter is immediately logged within the control room and linked to any other number of detection devices and software integrated along the network. Perimeter protection these days is made up of a complex web of inter-reliant applications often

powered by analytics software. There are some very exciting new technologies out there that combine a mix of detection and preventative capabilities using both physical and electronic methods to achieve their aim. For example, a perimeter security system can be tailored to the probability of a specific type of attack (ie vehicle or people-based) at different points along the perimeter. A combination of technologies will probably be employed that might include fibre-optic cable, tension alarms, buried cable systems, microwave and passive infra-red detection and analytics. On page 43 we speak to a range of manufacturers about how they are employing these technologies at key sites within the Middle East and how they are bringing monitoring of the perimeter right to the heart of the security operation. Enjoy the issue.

This publication may not be reproduced or transmitted in any form in whole or in part without the written consent of the publishers. Š Publications International Ltd. 2011 Total average net circulation per issue (July 06 – June 07): 13,693

For subscriptions and advertising enquires, or for further information on the magazine visit our website at:

Claire Mahoney Editor



Isolutions listen, deliver market-leading and strive to exceed expectations

I am dynamic vision and these are my cameras Warren B Director Product Management

Listening is an art, sometimes reading between the lines of a customer’s requirements leads to ground-breaking solutions. That’s my challenge and it’s my promise to help customers move forward and make their systems run better, smarter and faster. That’s the power of American Dynamics. That’s my dynamic vision and these are my cameras. Illustra IP cameras offer superior video, H.264 compression and a new way of managing bandwidth that will exceed the highest expectations of any IT team. That, plus an innovative tool which intuitively finds all of your connected cameras make Illustra IP cameras some of the easiest to install and configure in the industry. Illustra IP cameras support PoE and are compatible with ONVIF-compliant NVRs. They also provide outstanding clarity in low light, with true day/night and wide dynamic range capabilities. My dynamic vision - Your solution

For more information:

Call: 0208 750 5660 Email: Visit:

American Dynamics Illustra Cameras

Dynamic Vision, Delivered © 2011 Tyco International Ltd and its Respective Companies. All Rights Reserved


Corporate cybercrime tops global boardroom agenda says BSI report High profile corporate cybercrime is putting information security on boardroom agendas around the world, a global survey reveals. The need for increased measures to protect against corporate espionage and network hacking, the accidental or deliberate leaking of corporate data, and the loss or theft of company laptops, has never been so high, company bosses told the British Standards Institution (BSI), the leading business service for the development of standards, in a survey. According to the research, which analyses responses from 645 businesses, risk of corporate data leaks is a key concern. Two thirds (64%) of the surveyed businesses that have implemented ISO 27001 cited this as the most important driving force behind adopting the information security standard. According to Symantec’s new Internet Security Threat Report volume XV, the UAE is ranked number 18 in EMEA (Europe, Middle East and Africa) and 36 in the world in 2009 for malicious activity. As a consequence of that rise in malicious activity, Symantec reports that the average annual cost of data loss at large enterprises in the UAE was about $2 million (Dh7.34m) in 2009. The vast majority of organisations reported positive impacts. A 66% of the organisations assessed the overall benefit of adopting ISO/IEC 27001 as positive and a further 25% as very positive (91% in total) BSI commissioned Erasmus

University, the Dutch university that houses one of Europe’s top business schools, Rotterdam School of Management, to survey over 645 businesses in Asia, America, Europe and Australia. Notably, 78% of the surveyed organisations, that have achieved ISO 27001 certification, have implemented the standard from the senior management team down, with the board fully endorsing its adoption and adhering to its requirements. This suggests that fears around data security breaches are a real boardroom concern. And with almost all the businesses surveyed (92%) saying that the endorsement of senior management is crucial to fight against information security

breaches, organisations around the world appear poised to revolutionise the way in which data is secured. The research is drawn from all sectors of business, with 27% belonging to the IT industry and another 40% drawn from telecommunications, financial services, manufacturing, engineering, health and public administration industries. Theuns Kotze, regional director Middle East and Africa said:”The increasingly important role of technology in the workplace and the challenging economic climate means that data security is no longer something that businesses can ignore. Boardrooms around the world are finally waking up to the

extreme costs and reputational risk that can be caused by security breaches. The need for a standard that helps to prevent data leaks is now greater than ever. “The implementation of ISO 27001 is impacting businesses around the world, and our research shows that the standard is bringing significant benefits to businesses. 87% of the survey respondents reveal that the implementation of the standard has either had a positive or very positive impact on their companies. In addition to a reduction in the level of risk, 82% of those surveyed note an increase in the quality control of information, while 44% reported an increase in sales and improvement in competitive advantage.” I

Southwest Microwave opens new branch office in Dubai Perimeter security systems provider Southwest Microwave has expanded its operations in the Middle East, North Africa and the Subcontinent with the addition of a Middle East branch office in Dubai. The full-service facility adds a technical support component to the company’s established regional sales

activities and reinforces Southwest Microwave’s commitment to longterm project partnerships in the area. General manager Graeme Howes, who has directed MENA and Subcontinent regional sales activities for Southwest Microwave since 2006 will oversee the new Middle East branch.

“Southwest Microwave’s perimeter intrusion detection systems play a dominant role in the protection of security-sensitive installations and critical infrastructure in the Middle East, which has been achieved through both the quality of our systems and industry-leading customer support,” says Howes.

“By offering on-site technical services to our certified integrators and end users, we further strengthen Southwest Microwave’s value proposition in the region.” The new Middle East office is located in the Dubai Silicon Oasis, a state-of-the-art technology park close to the business district. I




Intersec conferences to tackle challenges arising from the Arab Spring The world’s foremost and comprehensive trade and networking event for security and safety in the Middle East, Intersec trade fair and conference, is building up momentum for its 2012 edition. With that, organiser Epoc Messe Frankfurt has announced a strong conference programme which will tackle the security issues arising from the Arab Spring. Speakers will address concerns in various industries ranging from aviation, IT and maritime security to commercial and homeland security. Presentations will be delivered by industry experts on the stability of business environments, best techniques for minimising security footprints, the latest trends and technologies available to the industry, new best practices, understanding risk tolerance and on insights into some of the most

critical issues facing professionals today in a changing political climate. For the first time ever the topic of maritime security will be addressed at Intersec. The issue of piracy against merchant vessels poses a significant threat, the piracy crisis in the Gulf of Aden, off the coast of Somalia and in the wider Indian Ocean, has worsened since early 2008, when the frequency of attacks in the region began to surge. In 2010, there were 219 reported attacks in which there were 49 vessels hijacked, 1016 seafarers taken hostage, 13 seafarers injured, and 8 seafarers killed. As of mid2011 there have been more than 150 pirate attacks, 21 hijackings, over 360 seafarers taken hostage, and seven seafarers killed by Somali pirates. Currently, more than 20 ships and 430 seafarers are being held hostage by Somali pirates for

ransom. With nearly half of the world’s seaborne oil supply passing through the pirate-infested parts of the

western and northern Indian Ocean, piracy is beginning to strangle key supply routes. The short-term prognosis of this will be examined through the conferences along with what are now increasing insurance costs and legal mitigation. Presentations by legal experts will focus on what the consequences of being armed in international waters are and will also look at what can be done if something happens. The three day Intersec conferences, taking place in Dubai from January 15th to 17th will also feature workshops on compliance namely the recent UK Bribery Act and crisis management workshops. The ongoing uprisings have seen the need for companies to update their crisis management training due to the changing political environment. For further information visit the website : I

NVT appoints Exodus as new Middle East partner

Khalifa University opens Cyber Operations Centre of Excellence Khalifa University, Cassidian and Emiraje Systems LLC. have opened a Cyber Operations Centre of Excellence on the Campus of Khalifa University in Abu Dhabi. The new centre will focus on the research of the security of industrial control systems which are critical for energy infrastructure, encryption and digital forensics. I




Network Video Technologies (NVT), the award-winning manufacturer of unshielded twisted pair (UTP) and Ethernet-over-Coax (EoC) video transmission products, has appointed Exodus Europa LLC as its international representative for the Middle East region. In a move designed to provide an enhanced level of support for the region, NVT’s new partnership with Exodus is set to offer new standards of care for customers wishing to capitalise on the many benefits to be gained by utilising NVT technology. From their Dubai office, Exodus will provide local support to all existing NVT customers in the Middle East region. This support will include system design, equipment specification and aftercare technical assistance, and together with holding emergency stock, all these customer services will be available

throughout local trading hours. “With their vast experience in independent design and implementation of effective system solutions across all aspects of integrated building-control systems, Exodus are the perfect choice of partner for NVT,” says Steve Proctor, NVT sales director. “Innovation and value for money is a key phrase at Exodus, and their ability to offer independent advice and project management fits perfectly with NVT’s philosophy.” “Exodus are delighted to represent NVT across the Middle East region,” says Brett Plumbridge, Exodus director. “Their market leading range of high-quality video transmission solutions is the ideal choice. NVT will join our best-of-breed array of leading-edge products,” he adds. Visit I

SOVEREIGN STATES: 193 KILOMETRES OF BORDERLINE: 600,000 ONE PARTNER FOR SECURITY SOLUTIONS NATIONWIDE SECURITY. Our world is criss-crossed with thousands of kilometres of land and maritime borders. Inside those frontiers millions of people live and work in large cities or small villages. With our outstanding nationwide security capabilities, we are a trusted partner for governments and security agencies that face the challenge of protecting their territory and citizens.


Visit us at Dubai Airshow 2011, UAE From November, 13th to 17th


Fully featured access control from UK company for Qatar daily newspaper TDSi has developed and supplied an integrated access control solution for the new, three storey Al Raya Newspaper production building in Doha, Qatar. At the heart of the system is EXgarde PRO, TDSi’s access management software solution, supporting MICROgarde II IP controllers and EXprox readers and cards. The project has been completed in close partnership with Euro Technologies, TDSi’s systems partner in Qatar, whom the company has built a close relationship. The access control system protects 30 doors in the building, with a reader and controller also controlling the call for the lift in a secured area of the building. Al Raya Newspaper’s project manager, Mohammad Soror, commented: “We trust Euro Technologies’ choice of brands to be one of the best available in the worldwide market”.

EXgarde PRO provides a fully featured access management software application that delivers a wide range of functionality through a user-friendly interface. The latest version of the software, V3, offers unparalleled integration capabilities, providing users with a flexible and dynamic platform and the ability for complete building and security management. Commenting on the success of the project business development manager for Euro Technologies in Qatar, Zakaria El Dandachi, said: “The client required a proven solution that would provide both effective access control and the additional security of lift monitoring and control. The TDSi system delivered on every level”. Al Raya is an Arabic language daily newspaper which provides daily, national and world news, as well as weather, sports, entertainment, business, and travel coverage. I

Aramco chief to speak at Middle East security summit

Oman demo site proves performance of perimeter Perimeter security specialists, FFT (Future Fibre Technologies) has opened its latest regional demonstration site located about 45 minutes from Muscat, in the Sultanate of Oman. Installed on this site is a fully operational FFT Secure Fence perimeter intrusion detection system as well as FFT’s buried pipeline protection system. “This demonstration facility makes it simpler and easier to provide a real ‘hands-on’ experience to our Middle East customers” says



Adam Wilding-Webb, manager of FFT’s Dubai office. “We can demonstrate a real-world installation, plus monitor how the system reacts to different intrusion or attack scenarios and how the systems handle nuisance alarms in the typical desert conditions of the region” he says. “This is far more representative of the performance our Middle East customers can expect, rather than simply extrapolating simulations carried out in Europe or the USA for example”. I


Abdulaziz F Al-Khayyal, senior vice president, Industrial Relations of Saudi Aramco will be a keynote speaker at the ASIS 3rd Middle East Security Conference & Exhibition that will be held in Dubai, UAE on 19-21 February 2012. ASIS International president Raymond T. O’Hara, CPP, said: “ASIS International is extremely pleased with the support of Saudi Aramco to the programme of our Middle East Security Conferences. Mr Al-Khayyal’s contribution will constitute an important added value to the educational programme of the ASIS 3rd Middle East Security Conference & Exhibition.” Al-Khayyal was appointed to this position at the beginning of September 2007. As head of the industrial relations business line,

he is responsible for many of the company’s most vital support operations, including human resources and training, safety and security, government and public relations, community services, and medical services. He joined the company in 1981 as an engineer and then held a variety of managerial positions in oil and gas operations and maintenance for different companies. In particular he was appointed to the board of directors of Saudi Aramco in 2004 and to PetroRabigh in 2005. Al-Khayyal will discuss the development of organisational resilience through international standards and guidelines. For more information visit: I

Uncompromising Vision Capture the details with AutoDome Junior HD camera from Bosch

Meet the newest member of Bosch’s AutoDome family: AutoDome Junior HD. This rugged, compact 360-degree, 10x PTZ camera delivers high-definition imaging up to 1080p resolution – capturing every detail from facial features to small objects. The camera’s sharp, clear video is an indispensible asset for monitoring financial transactions or keeping track of small, high-value items, and its heavy-duty housing is proven to outlast, delivering years of dependable operation. See the full Bosch HD solutions portfolio, including moving and fixed cameras, software and recording platforms at


Airports plough money into EWC detection making up nearly half of global EWC spend Sales of Explosives, Weapons, and Contraband (EWC) Detection equipment to the world’s airport authorities, amassed a significant $834.9 million in 2010, according to a recent study published by IMS Research, a leading provider of market research in the homeland security industry. In its study, IMS Research estimates aviation purchases to comprise 45 percent of the total $1.84 billion global EWC detection market in 2010. That’s nearly double the size of the government and military space. “While hijackings have been an issue since the dawn of commercial flight, the problem of terrorism in air travel reached a boiling point with 9/11,” says Michael Arluck, report author and analyst at IMS Research. Since that time, deployments of EWC detection machines have multiplied throughout the world’s airports.” To its benefit, the market has remained relatively insulated from the slow-down in public spending that has harmed other industries. With the year almost a third complete, IMS Research forecasts EWC detection revenues to grow by 6.3 percent in 2011, with growth being driven by two main sources; namely, purchases from the Transportation Security Agency (TSA) in the US and activity in emerging markets.

“The TSA continues to drive growth within the EWC market,” comments Arluck. “In any given year, whether it’s to recapitalise equipment that has already been installed, or to trial the latest technologies, the TSA spends hundreds of millions on new procurements.” Concerning emerging

markets he adds, “China alone has plans to build 97 airports by the year 2020. Each of these facilities will require some form of detection equipment for screening people and baggage.” Looking ahead, those suppliers who are best positioned to capitalise on these opportunities will

reap great rewards. The World Market for Explosives, Weapons, and Contraband Detection Equipment is now in its third edition. The study is the most detailed and comprehensive of its kind, and is read by the leading decision makers in the marketplace. I

Raytec IR protects hydro-electric dam in Missouri Raytec energy efficient infra-red LED lighting technology is being used to ensure effective 24-hour remote CCTV surveillance of the historic Tunnel Dam, on the Niangua River in Camden County, Missouri, USA. Covert RAYMAX infra-red light has been deployed instead of visible white-light because the dam is located in an area of outstanding natural beauty and the system designers wanted to avoid unnecessary light pollution.

The IP-CCTV surveillance system was recently installed by Will Electronics to improve security and safety at the site, and Raytec’s IR lighting plays a major part in the system’s performance, energy and cost efficiency. Raytec’s RAYMAX 300 series of ultra wide angle illuminators light the entire area up to 1200 feet away, with the capability of providing angles of up to 180 degrees. The units allow the site surveillance

system to capture crisp, clear CCTV images at night, but because the IR light is invisible to the human eye the scene looks totally dark. Traditional lighting, such as halogen and metal halide, often accounts for a large proportion of electricity consumption, running and maintenance costs in any security system. Raytec illuminators employ SMT LED technology to deliver a significantly lower power consumption, lower running costs,

longer life (minimum 10 years) and zero maintenance, compared to alternative lighting technology. They also feature a cool running thermal management system which prevents the technology from overheating like other older style units, ensuring failsafe 24hour operation and a high level of security. The Tunnel Dam, built in the 1930s at Lake Niangua, is a hydroelectric gravity dam run by Sho-Me PowerElectric Cooperative I



3D FastPass™

The Innovation Leaders L-1 Enterprise Access Division/Bioscrypt’s advanced 3D face recognition technology increases security while maintaining high throughput for enterprise access, making the process effortless for employees. Only authorized personnel can enter restricted areas containing vulnerable computer equipment and confidential documents.  t5PVDIMFTTBDDFTTGPSUIFVMUJNBUFJODPOWFOJFODF  t)JHIUISPVHIQVUUFDIOPMPHZGPSFGGPSUMFTTBDDFTT  t6TFTPWFS QPJOUTGPSBDDVSBUFNBUDIJOH

L-1 enterprise access solutions protect and secure identities and assets by helping customers address demanding access control and identity authentication requirements with innovative and reliable systems. Contact us at 1-905-940-7777 or Email

To see our line of 4G products in action scan the QR code or visit


Domera dome The DDZ4020 DOMERA is a high-speed PTZ network dome camera that provides full HD video in real time (up to 1080p/30). It is equipped with the Dallmeier’s Cam_inPIX technology and features a very high dynamic range, which enables an optimal rendition of colour and detail even with scenes that have a high range of contrast and strong backlighting. A special highlight of the DDZ4020 is its 20 times optical zoom, which is complemented by a 12 times digital zoom. The high zoom factor allows for the easy and discreet surveillance even of faraway objects. Relevant applications include large areas such as parking spaces of shopping centres or extensive company premises. It is available in three mounting variants – in-ceiling, surface, weather-proof. Features: Integrated ICR function Auto focus with manual correction A total of 248 preset positions and 18 scans


Express protection XProtect Express is a new addition to the Milestone XProtect IP video management software (VMS) product line. With support for up to 48 cameras, XProtect Express is affordable VMS for small businesses, especially retail, that want to video enable their surveillance installation. If you currently have separate solutions that you want to video enable, XProtect Express is an easy way to integrate them and work with one common interface. It can also easily integrate into your current system to create a video-enabled solution. Flexible licensing options and open platform support. Features: Range of integration possibilities Ideal for retail or small businesses Easy to expand and upgrade


Four stream encoder Said to be the first HDcctv IP video encoder featuring four HDcctv inputs and delivering up to sixteen encoded streams, the HD4 combines all the advantages of high-definition video with the advantages of IP networking. Video streams can be viewed, analysed and stored anywhere on the IP network. To manage high-definition video data the HD4 encodes four streams per camera input to meet the various platform, bandwidth and usage requirements. It features a high-speed Ethernet LAN interface of up to 1 GB/s data transfer. It offers several network security protocols including the secure HTTPS, and the encrypted SSL/TLS network protocols. Features: API is compliant with ONVIF 2.0 Encodes four streams per camera input High-speed Ethernet LAN interface SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2011 |



What is Wide Dynamic Range and why should you care? by Milind Borkar, Infinova Vice President – Middle East, India and Africa It’s always been the Achilles’ heel of video surveillance, with analog or digital cameras, those nasty shadows, glares, reflections and direct sunlight that turn captured images into darkness or wash them into a brilliant, undetectable white. Higher resolution cameras simply exacerbate the problem. That’s because, in traditional CCD cameras, all the pixels in the array have the exact same shutter speed. Conventional image processing – exposure, contrast, color, etc. – is done as an average for the entire image. Overexposure and underexposure are handled on a limited basis after the image is captured. In challenging lighting conditions, the resulting image will show normal exposure with blown-out highlights, dark shadows or both. The viewer sees overexposed regions in bright lights and underexposed regions in dark areas. Contrarily, an all-digital technology can provide Wide Dynamic Range (WDR) in which each of the hundreds of thousands of pixels acts like an individual, self-adjusting camera. Wide Dynamic Range (WDR) is the ratio of the brightest pixel that can be captured by the imaging system to the darkest pixel that can be captured. With high resolution cameras especially, users need a WDR of 17 bits, > 100db. Because each pixel has its own analog-to-digital converter and the information generated is captured and processed independently, each pixel in effect acts as its own camera. WDR increases exposures in darker areas and decreases exposure in brighter areas. Each pixel is processed while the image is

“WDR increases exposures in darker areas and decreases exposure in brighter areas. Each pixel is processed while the image is captured, sampling multiple times per second”

captured, sampling multiple times per second. If an individual pixel senses that it is overexposed, it will close and quit gathering light while pixels capturing shadowed, dark and potentially underexposed image areas continue to gather light. These images are then combined to create a high quality video frame or picture. Details otherwise lost are simultaneously captured vividly with more clarity and color vibrancy regardless of lighting conditions.

What to Look for in the Specifications Don’t pass over the specifications sheet when deciding on a camera. Dig into the specifications and look for the term ‘designated DPS (Digital Pixel System)’. You also want to see that the definition of high resolution is a minimum 540 HTVL x 460 VTVL. Make sure the new camera uses an all-digital chip set and supports both NTSC and PAL video formats. ■





Audio domes from Basler Basler’s upcoming BIP2-D1920c-dn (outdoor) and BIP2-D1920c-dn (indoor) dome camera models provide real-time video with 1080p full HD resolution at a frame rate of 30 fps. To minimise bandwidth consumption and storage requirements at such high resolutions and frame rates, Basler’s IP Cameras offer a choice of two different H.264 compression profiles, one of which is the high profile (up to level 5). This standard is also used in Blu-ray technology and will deliver smooth motion even when image streams are played in reverse. With the integration of audio functionality, both a microphone for audio recording and speakers can be connected to the camera. Basler’s IP dome cameras also have a built-in microSDHC card slot that can be used for local storage of up to 32 GB of data. Features: IP66 certified aluminium housing on outdoor model Operating temperature range from -35° C to +50° C (-31° F to +122° F) Indoor camera equipped with lightweight plastic housing



Extending your network

Lower power high vision

AMG Systems has launched a range of active UTP devices and IP extenders – the AMG 1000 series. Developed as part of AMG’s new integrated CCTV UTP (unshielded twisted pair) system, they are said to provide a reliable, high quality, flexible and expandable solution that can be used in existing structured wiring. The new AMG 1212 and AMG 1213 ranges of active IP extenders allow the transmission of 50 Mbps TCI/IP over existing coaxial or CAT 5 cables up to 1.2Km in length. The products are completely transparent to protocols, codes and applications, ensuring compatibility with any IP camera and its management software and are perfect for sending IP video links to remote cameras situated beyond the usual 100 metres limit imposed by CAT5 Ethernet. Features: Transmit up to 1200 metres One to sixteen video outputs Easy Plug ‘n Play installation

Domehawk IQ is a new rapid deployment CCTV solution from MEL Secure Systems. It is the first PTZ dome camera to feature the latest low power IR-III night vision technology which costs up to 90% less to run during night operations in a wide range of outdoor applications, including parks and other poorly lit or zero light locations. IR-III night vision technology which uses less than 6W to run, compared with 30-60W used by traditional multi-LED equipped cameras, as well as being up to 10 times brighter. This IR-III technology tracks the movement of the zoom lens to direct the light where it is needed most instead of floodlighting the whole area. The effective range of the camera is over 150 metres in night vision mode. It also eliminates the whitening caused by solarisation when recording events close to the camera. Features: Full 360-degree horizontal pan capability Transmission via COFDM Video and UHF Telemetry Available in 1.3GHz, 2.4GHz and 5.8GHz bands




Cost-effective communication KBC Networks has introduced its WESII wireless transmission range. The pointto-point and point-to-multipoint wireless Ethernet units offer a flexible and low-cost solution where it’s not possible or cost-effective to install cable. Supporting a 10/100 Ethernet interface, the units provide wireless connectivity for a range of IP devices such as megapixel or HD cameras, DVRs, encoders and decoders and web servers. IEEE802.11a/n and 802.11h compliance means that the WESII units operate in the license-free 5GHz band; feature MIMO technology to increase system throughput and transmission distance and comply with DFS and TPC standards (Dynamic Frequency Selection and Transmit Power Control). The units provide up to 100Mbps of usable throughput and employ WPA2 encryption to prevent unauthorised access. Features: A built-in site survey tool Antenna alignment tool Wide operating temperature ranges (-40 - +74°C)


All in the detail Samsung Techwin’s new 1.3 megapixel pan-tilt-zoom (PTZ) dome network camera line combines 720p HD images and a 20x optical zoom lens to provide sharper detail. The SNP-5200 is a fully ONVIFcompliant PTZ dome network camera offering multiple resolutions and aspect ratios from CIF (320 x 240 pixels) up to full 1.3 megapixel (1,280 x 1,024 pixels), including HD (high-definition) format at 720p (1,280 x 720 pixels). The day/night auto-iris lens has a focal length of 4.45-89mm for a 20x zoom ratio. Light sensitivity is 0.7 lux in colour and 0.08 lux in black and white. The camera can also stream various resolutions simultaneously to allow the most relevant stream to be transmitted to a chosen viewing or recording device.


New breed of recognition As a complement to their InSight iris recognition systems, AOptix is rolling out Dash Six to bring exceptional matching accuracy to customers looking for openness, ease of integration and strong integration support. Dash Six is a new breed of iris recognition software offering powerful, flexible, iris image processing capabilities that include iris segmentation, encoding and matching. Users can tailor functional attributes to meet deployment needs. The new SDK offers strong support for “one-to-one” authentication (including a compact template-on-card format) as well as large-scale “one-to-many” identification, supported by powerful image quality and anti-spoofing metrics. Features: Built for Windows and Linux operating systems Based on ISO 19794-6 standards Suitable for one to one and large-scale identification




Features: SNP-5200H incorporates an IP66-compliant housing H.264/MPEG-4/MJPEG multiple codecs Hybrid adaptability

BIRD’S EYE VIEW The latest upgrade of Siemen’s Siveillance SiteIQ proves its worth at a US chemical manufacturing site even during a mock terrorist attack

Pittsburgh-based PPG is a global manufacturer and supplier of paints, coatings, optical products, specialty materials, chemicals, glass and fibre-glass. The company recently reviewed the surveillance system at one of its largest and uniquely located sites. While the system recorded activity 24 hours a day, accurate realtime surveillance was limited to periods when security guards watched video-feed without interruption. It was a relatively simple matter to realise that the software intelligence built into the Siveillance SiteIQ Wide Area solution from Siemens Building Technologies Division, would enhance protection of the site, with the additional benefit of simultaneously reducing surveillance costs. 20



Siveillance SiteIQ Wide Area is an automated large-scale video surveillance solution that transforms traditional physical security systems by combining camera and other sensor (intrusion, fire detection, access control etc.) input. It provides protection for industrial facilities, transportation hubs and byways such as seaports and airports, water treatment facilities and other critical infrastructure by continuously monitoring sites through intelligent policy zones and virtual barriers – even across water. It detects, tracks, and classifies activity in real time, filtering critical events from camera and other sensor input, displaying the results on a comprehensive digital map of the entire site – on a single screen. This


tracking objects that move from camera to camera, so operators always know the accurate location of every object in the facility. Detailed information about anything suspicious is readily available. The perimeter and other sensitive areas are protected by ‘alert’ zones. This automated triggering of instantaneous alerts substantially reduces the cost of monitoring, giving around-the-clock protection. When anything unexpected occurs, Siveillance SiteIQ Wide Area automatically detects any activity, pinpoints the location and tracks the perpetrators whilst simultaneously alerting guards through audio, video notifications, and e-mail alerts. This ability to efficiently deploy guards rapidly and efficiently helps prevent the escalation of incidents. Alerts are triggered from changes as simple as a vehicle or an individual entering a restricted area, but can also be triggered by object speed or size. Alert areas are easily and instantly set or changed by dragging area boundaries in the composite image of the site and can be adjusted using preset shortcuts. The open architecture enables Siveillance SiteIQ Wide Area to run on standard hardware and software and allows it to be modified and expanded to respond to changing

Never before had security officials at the site been able to detect and monitor a potential threat to their facility so effectively. They then dispatched guards to their exact locations

security needs. It easily accommodates site-specific operational conditions and varying security requirements allowing the limiting of access to selected areas or the entire site, the specification of varying security level requirements within the site – and the raising or lowering of security levels in accordance with threat levels or evolving governmental mandates. Planning and implementation of the system at the PPG site was assisted by the skill of Siemens staff and the solution was delivered ahead of schedule. This gave security personnel at PPG time to get practical, hands-on experience before the system went live and after just a single day of training, operators were using the system successfully.

Mock attack

enables operators to see exactly what is happening at any time throughout the whole site. Integrated 3D analytics determine object attributes in absolute ‘real-world’ coordinates. This requires fewer cameras and helps lower infrastructure cost compared to 2D analytics.

Detailed information At the PPG site, the software-driven nerve centre of the Siveillance SiteIQ Wide Area solution takes input from many cameras and provides a live, bird’s-eye view of the entire manufacturing facility, spanning over 1000 acres and including a mile of shoreline as well as railway entry and exit points. This composite view takes the guesswork out of

Troy Higginbotham, senior technical analyst at PPG says: “I have been working with Siemens’ surveillance software since 2003. In my opinion, the latest Siveillance SiteIQ Wide Area version is the best upgrade since its inception. The ability to track a single object with multiple interrogation cameras and auto-zoom to a factor – based on how far the object is from that camera – is very impressive.” Troy continued: “I have had the opportunity to work with the system for a few hours in order to re-acquaint myself and the advances made have amazed me. Siemens’ professional services team, along with the technical support team, has done everything needed to make this project a successful upgrade.” Shortly after the Siemens’ solution was operational, a mock attack was staged with actors portraying terrorists. Operators tracked, monitored and recorded the progress of the ‘intruders’ by vessel and on foot, via the screen image of the site. Never before had security officials at the site been able to detect and monitor a potential threat to their facility so effectively. They then dispatched guards to their exact locations. Siveillance SiteIQ Wide Area has now become the foundation of the security program at the site because it seamlessly integrates new and existing sensor types and allows the client to manage all surveillancerelated security issues easily from a single point. ■ SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2011 |



Baraa Al Akkad, regional manager, Middle East, Axis Communications looks at how encoders are the perfect bridge builder from analogue to IP

The name encoder doesn’t do these technological miracles justice. These investment protecting, budget-saving marvels will build a bridge between two generations of CCTV technology and bring harmony to your network. The IP-based video surveillance systems bring many important benefits. The image quality they deliver is a vast improvement. The networks are more scalable and cheaper to run. Better still, computerisation means you can automate systems to bring about event management and intelligent video. Nevertheless, it is too early to claim that this development has rendered analogue CCTV surveillance systems obsolete. Analogue cannot be dismissed. Namely because around 95 per cent




of the world’s video surveillance is over analogue CCTV systems and the people who bought them aren’t going to write off their investment any time soon. There are several options open to installers who want to move their CCTV customers onto Internet Protocol (IP) based surveillance. One option would be to replace everything analogue related. This would mean getting rid of the existing analogue cameras, the coaxial cables that have been laid inside and outside the buildings, the recording systems (AVR or DVR) and the management system. It would then be necessary to introduce an entirely new Ethernet cabling infrastructure – which would involve not insubstantial disruption along with new IP compatible storage hardware and a management system suited to IP or network video. In many cases, that would be a


waste of time and money. Around 95 per cent of the estimated 40 million surveillance cameras installed in the world are analogue. Yes, this technology is fast being eclipsed by IP-based network video, which is growing at 30 per cent a year, according to IMS Research. But there’s no reason why the two infrastructures cannot be rationalised together, apart from a few technological hurdles. These barriers to integration are, in most cases, easily surmountable. In the majority of installations, the most valuable service you can offer your clients is to migrate them from analogue to IP video by making judicious use of their existing network. The key to this magic passage is the video encoder. Encoders will help convert analogue networks into IP friendly formats, so that the existing investment in cameras and coaxial cable is saved and put to good use.

How can they do this? Encoders are the essential ingredients in any conversion from analogue to network video surveillance systems. Networked video surveillance, using IP, can improve picture quality, make the network more reliable and lower the running costs by improving management. They also provide the basis of a future-proof platform, which makes your network ready for the age of megapixels and high definition. A video encoder achieves this by converting incoming signals of an analogue camera into a digital video stream, using universal compression standards such as Motion JPEG, MPEG-4 or H.264. This video stream will be identical to that from a network camera and can be fully integrated into a network video system. The encoder will add extra functions to a camera by converting its output from analogue to digital. The video encoder includes built-in functions like video motion detection, tampering alarms and video analytics. There’s a variety of encoders on the market. The most common video encoder is a standalone version with single or multi-channel connections to analogue cameras. The standalone encoders should be installed close to the analogue cameras, as analogue signals lose integrity the further they travel which could affect the end result of the digital conversion. Video encoders make the network more flexible and adaptable. The network is suddenly given more expansion options. In the new analogueturned-IP system adding new cameras and moving them around will become a relatively straightforward job. This makes installation and system management a lot easier for the service provider. The transition of management systems will become smoother too. You will no longer be forced to choose between keeping the old analogue surveillance system and a new network surveillance version. Existing analogue CCTV systems are transformed by the encoders to become compatible with the digital network systems. Whereas the old analogue CCTV/digital video recording systems were rigid and proprietary, leaving you in a dead end, the encoder opens the network up to greater possibilities. This is because the video surveillance network is built on open and interoperable standards. Your customer may not understand all the technical details, but they will appreciate that video encoders can pave the way for savings on bandwidth and storage. They also allow for integration with other systems. If, for example, your customer has an IP-based building management system or industrial or logistical systems, the video surveillance can integrate with those systems. Your customer can then monitor all aspects of a building from one single interface and can use intelligent video such as motion detection to know when, for example, a light should be switched off. This enables you to merge functions and departments,

helping your customer make organisational efficiencies. Once you have an integrated network, with IP enabled network surveillance, you open your clients’ network to the possibility of using power over Ethernet. This saves money on the installation of power points to power your camera and gives you more options on camera placement. With CCTV images converted to IP technology, the management of the surveillance network can be outsourced. The network installers can move up the value chain by becoming a hosted video-as-a-service provider.

What are the benefits of using encoders instead of replacing the system? The biggest benefit is cost saving. There is clear financial sense in protecting an investment already made and using encoders to bridge the technology gap. A new digital network enables remote access to surveillance images from anywhere and at any time. The cameras can be controlled remotely, picture quality is improved and the images are easier to store, manage and retrieve. Considering that the average lifetime of an analogue surveillance camera is five to seven years, many of them will serve for quite a while yet. Some operators have put significant investment into coaxial cable installations, and in buildings without Ethernet infrastructure. So encoders would bring an immediate payback in obviating the need to pay for a new network installation. Adding a modern network would be an investment that many users would want to postpone.

What factors should they consider? No two set ups are the same. Your plan of action will be determined by a set of conditions. There are a number of questions you need to assess. Does your existing digital video recorder support IP cameras? Which IP camera manufacturers will your existing DVR support? If not, what are the options for a network video recorder? Should you use IP video management software? One difference between images transmitted in digital format, and those sent as analogue signals, is that the former don’t depreciate over distance. Analogue images, unfortunately, do. So using an encoder to convert analogue footage to digital will ensure that the quality of images will be preserved when a camera is placed a long way from the recorder. You may want to assess the impact of long distance analogue cabling. It’s not always the case, of course, that analogue cameras are irreplaceable. They may be at their end of their useful life if, for example, you decide that higher resolution cameras would serve you better and justify the extra investment. Bear in mind though that megapixel cameras will probably end up raising the storage burden of your system, as high intensity cameras generate bigger files. Digitizing analogue footage will also affect your customer’s bandwidth – you may want to assess the impact that has on their network. You will want a single video management system to record and access all cameras. IP Video Management Software only supports IP video streams, so you will need to purchase encoders to convert the analogue video stream from your camera into an IP video stream that the IP Video Management software can handle. Ultimately encoders bring many of the benefits of IP cameras, without the need to install them. They create a similarly IP enabled network at a fraction of the cost and in a fraction of the time. The intelligence that these boxes brings to each channel makes video access fast and flexible and improves the quality of pictures. They are cheap to manage in the short term and help make savings in the long term by future proofing technology. Now that is a nice picture. ■



TAKING SECURITY ON BOARD SME takes take a closer look at the technology that is being retrofitted by security professionals to commercial vessels of all types to help them identify and deal with the serious danger posed by pirates





The threat of piracy in the Gulf of Aden and the wider Indian Ocean, one of the world’s busiest shipping lanes, shows no sign of abating. In recent years the pirates have transformed their operations from smallscale, opportunist attacks into what is essentially a highly organised and extremely lucrative multi-million dollar business, with hundreds of ships being hijacked and crews taken hostage, until their ransom demands are met or naval forces intervene. The array of weaponry that the pirates are now employing, from rocket propelled grenades to AK47 machine guns, underlines their serious intent and with the advent of so-called ‘mother ships’ in conjunction with their smaller speedboats, they now range over thousands of square miles of ocean.

On patrol It is perhaps not surprising that we have witnessed a range of naval forces being deployed to patrol the main shipping lanes given the sheer scale of the piracy problem. Such forces can and do act as a high visibility deterrent to the offenders, within defined areas, providing the potential, with adequate warning, to intervene and offer assistance should commercial vessels be under threat. One such effort is that of

the European Union and EU NAVFOR (European Naval Force Somalia) which is engaged in operation ATALANTA which covers from the south of the Red Sea, the Gulf of Aden and the Western part of the Indian Ocean including the Seychelles. EU NAVFOR spokesperson Harrie Harrison, Commander RN is keen to underline the need for ships to pay close attention to their own security measures: “Given the scale of the area we have to cover – equivalent in size to the whole of Western Europe – we cannot be everywhere so it is imperative that all ship operators work to the Best Management Practice (BMP-4) document to make life as difficult as possible for the pirates. It is all about not being an easy target. Steps that can be taken include fitting razor wire, the spraying of high pressure water and floodlighting so the pirates will think twice about initiating an attack.” Harrison stresses the importance of being vigilant, having a good lookout, especially at the stern and well practised systems in place to respond to any threat: “The crew need to have enough warning so they can sound the siren, increase speed and instigate evasive maneouvers. Where pirates are able to board, some ships now have a safe room/citadel where all of the crew can retreat to, closing doors being them and crucially where they can retain control of the ship until help arrives. A key point is to make sure that no one is taken hostage. We expect as the influence of the current monsoon weather abates there will be greater activity so the message is to be prepared.” To put the ongoing threat into context, the rate of pirate attacks has risen this year – 111 by September compared to 127 for the whole of 2010. The good news is, according to Harrison, that thanks to the measures ships are taking like BMP, and the efforts of the naval forces, the success rate of pirates is down with only 21 successful attacks in 2011 compared to 47 in 2010. A copy of the BMP-4 guidance is available at  SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2011 |



 Electrifying innovations

Secure-Marine BV, which specialises in the protection of ships and offshore facilities, has created a number of innovative systems which are now being deployed to address the piracy challenge. One of its major advances – according to Raphael Kahn the CEO of Secure-Globe (the parent company of Secure-Marine) is Secure-Ship: “We see this as a non-lethal 9000 volts answer to piracy and ship boarding attempts.” According to Kahn: “Secure-Ship addresses the problem of piracy in three distinct ways. It detects the boarding attempt using a sophisticated control system and activates an alarm to warn the crew, scares away the boarders through the use of output devices – like an extremely loud siren and floodlights – and stops the attempt in its tracks with its electrified protection system.” When installed the electrified fence is placed around the ship being protected. The Energizer system produces high voltage peaks with a maximum of 9000 Volts. This high voltage, explains Kahn, guarantees a shock at the slightest contact with the electrified wire: “It is important to underline that the shock effect resulting from this high voltage is a nonlethal deterrent. The maximum current within the wire is limited to 36mA.” Another method of defence offered by Secure-Marine involves the Secure-Waters solution, which as the name suggests applies water to thwart pirates looking to gain access to a vessel. “There are three elements to this, specifically a water jet system, a hot water system and the so-called ‘water knife,” outlines Kahn. The Secure-Marine water jet system is containerised so it can be set-up quickly on a specific ship and, once they have transited the danger area, may be readily moved to another vessel. It involves a water cannon being installed around the ship with very high pressure and associated pumps. By contrast the hot water system requires a special pipe with low pressure nozzles with water being heated up using the ship’s engine, to 80-90 degrees centigrade, and then pumped through the pipes at low pressure. Another proactive approach, offered by Secure-Marine, is the ‘water knife’ where water is pumped at high pressure and volume so there is the potential to deliver a painful deterrent and to flood the attackers’ boats.

Thermal imaging When it comes to thermal imaging solutions, FLIR Systems is a world leader and, in the context of piracy, its cameras can be applied to aid the early detection and identification of threats which may not necessarily be picked up by other techniques such as commercial shipboard radar. A good example of FLIR Systems thermal imaging cameras is the HM-Series. Handheld and shockresistant these cameras are able to produce a crisp image in the darkest of nights increasing situational awareness and providing an early warning for vessels of all sizes, from yachts to commercial ships, when travelling through pirate prone regions. FLIR Systems’ M-Series has become very much the standard for maritime thermal imaging and combines a thermal imaging camera with a low light camera. Not only can the M-Series provide thermal imagery in total darkness but also through light fog or smoke, which is a key feature given that poor visibility can be used by pirates to sneak up on unsuspecting ships.




Future vision Carsten Bojahr, the managing director of German-based WISKA CCTV, which specialises in computer controlled CCTV systems for the marine environment, outlines the company’s role in a major project to create a Pirate and Terrorist Aversion System (PITAS). WISKA CCTV is tasked with developing the illumination, camera day and night detection as well as image treatment. “PITAS is being brought to market jointly by a number of maritime industry leaders (Raytheon, L3/ELAC Nautic, Thales and Christian Albrecht University) to reduce the impact of piracy on shipping. A key focus of the modular system is effective threat detection, analysis and situational awareness.” WISKA CCTV has been involved in the project for three years now, with, according to Bojahr, a likely roll-out timescale of 2013: “The system is designed to have a human interface which can, in principle, be handled by anyone on board the vessel. For the effective detection of threats it involves a combination of radar, sonar, and day/night and thermal imaging cameras. On top of this the cameras are linked with an extremely powerful searchlight. The searchlight uses a certain frequency found to be irritating to humans. “This integration of elements means the potential pirates can be picked up at distance by the radar and sonar and the CCTV system can then be employed to detect, automatically, whether a boat coming towards the vessel is friend or foe. Should it be suspicious the system will initiate a procedure to activate the camera/searchlight and the firefighting system to keep any attackers at bay without the crew having to risk their safety by going on deck.” Ultimately, when it comes to piracy the intelligent application of technology and physical security measures is critical so ships in the firing line have time to take evasive action, implement counter measures to prevent boarding or, in the worst case scenario, are in a position to slow down the pirates progress so the crew can reach a safe room with duplicate controls and call for help. ■

select your mode of perfection

10MPor 1080p There’s only one professional Dual Mode video surveillance camera that delivers both 10 megapixel resolution and the ability to switch to Full HD 1080p at 30 frames per second – the AV10005 from Arecont Vision. At 3648 x 2752 resolution, the AV10005 delivers 30 times more pixel density and forensic detail than standard definition analog or IP cameras – all while minimizing bandwidth and storage requirements by using H.264 compression. The AV10005 can be your one camera solution for most of your megapixel needs by cropping to any other lesser resolution or aspect ratio. Make your mode of perfection the AV10005 from Arecont Vision.

Dual Mode 10MP or 1080p resolution 6fps @ 3648 x 2752 (10MP Mode)  30fps @ 1920 x 1080 (1080p Mode)  Binning Mode for improved sensitivity  

Dual Compression H.264 and MJPEG  Day/Night Functionality  Image Cropping 

+971 (4) 286 3449 MADE IN THE USA


Human touch There is much more to creating a secure rail travel environment than technology, writes David Watts. Transparent design and good signage are just as important Putting the safety and security of rail passengers first has increasingly been the mantra of the rail industry in recent years. Events such as the Madrid train and London underground attacks have focused rail companies on the need for the highest levels of passenger security. Across the globe, rail companies have taken measured precautions to help prevent attacks – including random searches of passengers and baggage, the increased presence of security officers, the removal or hardening of rubbish bins so they cannot hide bombs. At the same time, passengers are encouraged to report suspicious activity, whilst better emergency planning designed to mitigate the impact of a  SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2011 |



 terrorist attack could discourage some terrorists from targeting them.

In addition to security, the broader issue of safety has been foremost in transport companies’ minds. In Dubai, Sheikh Hamdan Bin Mohammad Bin Rashid Al Maktoum, Crown Prince of Dubai and chairman of the Executive Council has said, “Safety and security of passengers is our top priority and there will be no compromise on it,” when talking about the Metro there. So across the world a combination of better trains, more friendly staff and increased reliability have transformed the passenger experience. As people have become more aware of their own personal safety whilst using public transport, it is the perception of the safety of the environment that has become critical in future station planning. Considerations of passenger security and safety have become an essential driving factor in the design and development of station buildings, systems and operational procedures. People’s awareness of safety and security has a business benefit as well. In the UK, for example, government figures suggest that improvements in the perception of personal safety would result in 11% more journeys by public transport. The top three passenger ‘wants’ were: the presence of staff, good lighting and CCTV surveillance at stations and these indicate a good starting point for station designers.

Both on a day-to-day basis and also in an emergency situation, the quality of any PA system is paramount. A local message from a local attendant (rather than a pre-recorded message) gives an impression that local conditions are understood and that help is nearby. Drowned out announcements from train arrivals and departures is also a common source of irritation and frustration to travellers, and an absolute disaster in any emergency situation. There are many services that benefit from being close to stations (doctors surgeries, schools, dentists, emergency services) as well as restaurants and retail etc. Station design and development must be seen in tandem with its role in the community and how the area can be developed in a symbiotic relationship. Designers should maximise the ‘over-watch’ of stations and platforms from others, the positioning of offices, retail, taxi ranks, bus stations etc.

Technological interventions

CCTV, automated barriers and ticket machines are examples of how technology can improve the travel experience. Train companies should provide travellers with a clear indication that the CCTV is operational and recording. Making sure that CCTV can be easily maintained is critical as many systems fall into disuse because maintainers can’t access the system easily. Use intelligent software in high-risk areas: Intelligent software is Beyond the station now providing many benefits for security. It can be used to direct The approach to the station is the first leg of people’s journeys and operators attention to key areas or triggers, whether it’s activity in people need to feel secure even at this early stage. Rail stations specific zones, facial recognition, behavioural recognition (eg running shouldn’t simply be points of departure and arrival; they should be along a platform where there is no train) beacons or lighthouses. They should be etc. Modern technology can enhance the both well lit and inviting. Even if they Good sightlines help both travellers effectiveness of CCTV systems. The use of cannot always be attended by rail staff, and security personnel – architecture intelligent software is likely to increase as there can be huge benefits to cohabiting it can be built into systems to enhance with other businesses or services. and design can be used to encourage traveller’s personal security. For example, Encouraging emergency services or retail transparency. Travellers shouldn’t it could recognise when a single female is to be located close by can increase the have to wonder what’s around the on the platform and flag it to a CCTV ambience of security. Well-maintained next corner operator during quiet times. Equally it lighting and CCTV reassure the traveller could recognise a ‘gang’ of youths is on and deter potential problems. Good the platform or identify a known terrorist and flagging it to a CCTV signage, maps, useful numbers, points of contact and train times operator. should be readily available around the station and at locations away Other questions station designers need to look at are how to from the station. improve the visibility and availability of help-points and to provide a There are a range of other practical measures that can be taken to greater indication to travellers that the help-points are operational and improve the feel of safety and security at a station. Ticket barriers don’t are being manned. just reduce fare-evasion, they also discourage beggars, gangs and Greater signage, improved architecture, better lighting and graffiti other non-travellers from loitering in the area, who can be removal and indeed, perhaps the most important – the presence of disconcerting to real travellers. others (station attendance) all serve to enhance station security and Another example is optimising the way-finding by using clearly safety. In recent times, the use of dogs (often trained to find designed graphics and symbols as well as words make the journey explosives) at our transport hubs is becoming a more familiar sight; more efficient for both locals and visitors. well trained dogs are a great force multiplier. By and large, the public Passenger information is a critical element in station design respond very positively to the presence of dogs (and their handlers) passengers need clear train arrival times in the station or designated and they provide a very tangible icon of greater security. ‘safe zones’ (not just on the platform) so they can choose when to Through a greater appreciation and consideration of traveller stand on the platform if they are travelling alone. Railways can learn motivation and needs, a ‘human factors’ orientated approach, much from the air sector by giving travellers indications of how long it might can be done to improve the ‘ambience of safety and security’ through take to reach a platform and clear route maps for disability access. design. This is an important step forwards in delivering a better rail Designers should also provide ‘always visible’ points of information system that is appreciated by everyone who uses it – travelling public, and salvation (signs, CCTV, help points). visitors and staff too. Good sightlines help both travellers and security personnel architecture and design can be used to encourage transparency. ■ David Watts is managing director of CCD, a design consultancy that puts Travellers shouldn’t have to wonder what’s around the next corner. the science of ergonomics and human factors at the heart of buildings and Identify what they are and avoid adding clutter and distraction from the workspace design. The company is acknowledged as a global leader in important messages. By designing out areas of loneliness or potential control room design having designed more than 350 in the last 30 years. seclusion, the opportunity for terrorists to hide out of sight is reduced. Visit their blog on design and human factors at




Morpho - AG - Photo imagesource - AP056 - 10/2010


Road fatalities are on the rise in many countries across the globe. Morpho has addressed this problem by developing a wide array of modular solutions for its clients, ranging from automated speed measurement and red light running solutions to automated number plate recognition.


On the buses A distributed and scalable IP solution from Indigo Vision is helping the Delhi Bus Rapid Transit System stick to its timetable Delhi, India’s second largest city has developed an innovative Bus Rapid Transit (BRT) system that uses IndigoVision’s complete IP video surveillance solution to help ensure its smooth operation. BRT is a high-quality, high-capacity bus service that travels on exclusive lanes along designated routes. An example of its advanced traffic management technology is the ability of BRT buses to signal a green light at an upcoming intersection to stay on schedule, reducing travel time by up to 30%. Besides giving priority to buses, the system also provides dedicated lanes for pedestrian and nonmotorised vehicles like cycles and rickshaws. By 2020 the local government plans to build 26 BRT corridors in and around Delhi, covering a total distance of 310 km. Currently there are seven corridors completed under the first phase of the project. A key to the successful operation of the system was the decision to deploy a distributed and scalable IP video solution. IndigoVision’s system delivers high-quality video over long distances to a central control room and can be easily expanded as the BRT system grows over the next decade. With such long IP cameras and video encoders, ACF controls the The IP video allows project timescales, deploying future-proof framerate of the video stream based on the amount of operators to monitor technology was very important. motion in the scene. When there is no activity, video is the smooth running of The IP video system was designed and installed streamed at minimal bandwidth; the instant any by IndigoVision’s local authorised partner, Neural motion is detected, video is simultaneously the system, identify Integrated Systems Pvt Ltd for Siemens India transmitted at the maximum configured framerate. illegal use of the bus Limited, the main contractor for the traffic This significantly reduces the bandwidth and video lane by motorists and management and signalling system. storage requirement for cameras monitoring generally ensure bus drivers “The quality and capability of the surveillance static scenes or during quiet periods such as at night. system is key to the operation of the BRT system,” BRT are using other innovative features of abide by the rules and explains Goutam Roy, BRTS project manager at IndigoVision’s solution to provide commuters with do not deviate from the Siemens India. “The IP Video allows operators to live traffic updates. IVSnap is a free simple utility prescribed routes monitor the smooth running of the system, identify that allows still images from a specified camera to illegal use of the bus lane by motorists and ensure be captured at regular intervals. These images are bus drivers abide by the rules and do not deviate from the prescribed then posted and updated every minute on the BRT website, allowing routes. This is achieved because the IndigoVision technology provides users to plan their journeys based on the current traffic situation the operators with very good quality video through intuitive Video around Delhi. ( Management Software (VMS) and smooth control of PTZ cameras over ‘Control Center’, IndigoVision’s VMS, is used by operators in the large distances. The marriage of intelligent traffic management and live central control room to view live video of the system and to analyse surveillance feeds allows the system to be closely controlled, reducing recorded footage in the event of an incident. Video is recorded on commuting times and saving money.” IndigoVision’s standalone Network Video Recorders (NVRs), which It is extremely low latency that enables smooth PTZ control over long provide the authorities with 15 days of footage. Evidential video clips distances. The minimal transport delay across the network is due both to can be exported for use by police for their investigation and the excellent compression deployed and the design of the distributed prosecution of traffic offences. The recorded video is also a very useful server-less architecture. IndigoVision has developed a unique technology tool for the authorities to determine blame in the event of liability call Activity Controlled Framerate (ACF), which reduces overall network claims following accidents. bandwidth, further helping to reduce latency. Operating in IndigoVision’s ■





People Screening

Hand Baggage

Explosives Detection

Small Parcels

Large Packages

Protect your facility at every entry point without interrupting day-to-day operations. At L-3, our screening solutions help maximize security and throughput — from the lobby to the loading dock to the mailroom — without interrupting day-to-day operations. Combining innovative detection technologies with intelligent, flexible system designs, we achieve exceptional detection of current and emerging threats and contraband — including liquid explosives and non-metallic objects. Comprehensive screening solutions from L-3 — configurable, upgradable, networkable and regulatorapproved. Security that supports an open door policy. For more information, please contact our Middle East office at +971 4 609 1906 or visit us at Security & Detection Systems

THE CHANGING FACE OF CONSOLE DESIGN Terry Shough, General Manager of Winsted EMEA, provides an introduction to the important topic of ergonomics and the central value of human factors when planning and designing a control room. The emergence of new technologies, new ergonomic standards, and increased public awareness of workplace health issues has combined to inspire a dramatic shift in console design. Today’s control workstations are smaller, more functional, and more aesthetically appealing than earlier generations. The ergonomic approach to designing consoles into the layout of a control room should contribute to achieving the performance objectives established for the space in question, while ensuring that every aspect of interaction between human, machine, and the environment - from raised ooring to acoustical concerns, from indirect lighting to the overall well-being, health, and safety of each operator - is taken into account. Top-Down Approach A top-down approach provides a framework for ensuring that decisions on such matters as equipment selection, operating practices, working environments, and furniture choices all derive from operating demands. No matter how well designed a workstation might be, the overall system will fail if operators are overloaded, undertaking tasks for which they are poorly trained, or straining to read displays that are illegible. With a top-down approach, the limitations of the operator are automatically included and potential mismatches between operator capabilities and system demands are minimized. The international standard known as ISO 11064 is the backbone of ergonomic design of control rooms. The essence of this approach can be deďŹ ned within a single term: user-centred design. The top-down approach requires that you ďŹ rst spell out the goals of the control centre in various situations, including normal, off-normal, emergency, outage, and startup conditions. Determine what systems are required to accommodate these conditions, then list the functions best undertaken by machines (e.g. repetitive calculations), followed by those functions at which human operators are superior (e.g. coping with unexpected situations). The result will deďŹ ne system speciďŹ cations for computers as well as those tasks to be conducted by human operators. In addition to forcing an evolution in console design, revolutionary changes in technologies are also nurturing improved console aesthetics. The arrival of digital technologies, system integration, and at-panel displays has enabled console manufacturers to design a wider variety of consoles with smaller footprints. Simultaneously, console manufacturers are also discovering more and more about the way people use control rooms. Sharing that knowledge with architects ensures that ergonomic factors will be designed into the larger control environment as well as into the consoles themselves. What is ergonomics and why does it matter?




30-35° 45�

42� 1067mm


22.75� 578mm


49.13� 1248mm

24.37� 619mm 23.50� 597mm

28.5� 723mm

21� 533mm

Figure 1

Ergonomics is the study of the relationship between workers and their environment. Most original console standards were established nearly 50 years ago, back in the 1960s, and have since been revised to accommodate new technologies and new understandings of how our head, neck and eyes operate. Today’s ergonomic standards are based on more realistic assessments of how operators actually work at consoles. In Figure 1, for example, the vertical and horizontal movement diagram demonstrates best viewing angles for an operator. Ideally there is no head movement and minimal eye movement for the most important and most common tasks. For instance, the latest ergonomic studies of people sitting in a relaxed position show that our heads tilt forward approximately 8-15° at a viewing angle of –30° to 35°, and we prefer an average viewing distance of 30 to 35 inches from the screen. Newer consoles are therefore lowering the target angle of the primary displays. Ensuring that human factors are an essential element in the planning and design of a control room will play a signiďŹ cant role in maximising the efďŹ ciency and effectiveness of the operators manning it – thereby maximising return on investment, as well as the control room’s overall performance. A 4-page Human Factors Brochure providing full details on ergonomics is available as a free download from Winsted’s website: Click on ‘Literature’ under the ‘Resources’ tab ( - a range of other informative downloads are also available online.



Coming up in the next issue of Security Middle East magazine INTERSEC 2012 PREVIEW

Official Magazine o f Intersec 2012

We bring you a taste of what to expect from the biggest security show of its kind in the region. If you are bringing new products to the Middle East market at Intersec email us at with the details before November 30th 2011. ALSO IN THIS ISSUE: I

The latest issues facing IP & network-based surveillance


Intelligent camera options: we take a closer look at analytics and 360ยบ CCTV

For more information about the magazine or to subscribe visit where you can view the latest issue online and sign up for our monthly newsletters.





Constructive communication Terry Shough, Winsted EMEA’s general manager, provides advice on some of the common issues involved in control room construction The design, specification and installation of a modern control room for any Middle East project plays a central role in the overall security operation’s effectiveness. As the hub of the site’s protective ‘envelope’, it’s clearly important to ensure that the pre-commissioning process for such a facility is well managed. The control room, after all, is where both electronic security systems are centrally monitored and manned response is despatched to deal with detected incidents – be they security risks or potential health and safety-related hazards. Any new or updated control room venture also represents a sizeable outlay in capital terms and it’s therefore vital for the partners involved to maximise the return on investment. Electronic security systems such as CCTV, access control and boundary detection equipment, not to mention active fire detection/extinguishing systems, are all generally overseen by the control room.

Partnership approach In any sizeable project of this type, the end user will typically be guided by a systems integrator overseeing the whole installation and assisted by specialist suppliers for these various elements, who’ll provide expert advice. So how can this three-way relationship (between equipment suppliers, systems integrator and customer) work best to maximise project efficiency? What should the systems integrator expect from the furniture supplier, and how can the latest design software tools be used to aid a project’s successful completion? As a manufacturer of control room furniture for nearly 50 years (since 1963), recent projects in the Middle East that Winsted’s EMEA operation have successfully supplied include clients such as Qatar Islamic Bank, Johnson Controls, Group 4 Qatar, the Burj Dubai mixed-use tower building and a number of high profile hospital control room installations. With such an extensive background, it’s fair to say that we’ve learned where things can go wrong and how we can apply our extensive experience to help our project partners ensure that any obstacles are surmounted. It’s vital that we communicate effectively with our project partners, ironing out likely problems at the quotation/specification stage. The devil is in the detail and one important area where we can make a substantial contribution is providing detailed CAD (computer aided design) drawings/renderings to help ensure that furniture such as consoles, media walls and desking arrives on site ready for immediate installation. The aim is to avoid any project delays that might otherwise be caused, for instance, by furniture alterations required in-situ. One of the biggest mistakes that can occur is in failing to pull together all the required information and ensuring that it’s clear to the parties involved. Coordination of information plays a key role in this process. For instance, one end user had to revise their original specification from 19"

to 23" monitors, meaning the console design needed to be reworked onsite to accommodate the larger screen casing size. Another common area where mistakes can be made is in room sizes being inaccurately surveyed, with radiators and windows not being sufficiently accounted for, for instance. Apart from the potential problems of resizing furniture to fit around these items, the orientation of the building may also mean that sunlight intrudes onto monitor walls, causing unwanted on-screen glare, leading to necessary room layout changes. Typically, system integrators are our partners and provide a local presence and point of contact for the client. Where possible, we conduct supporting site visits as this improves the information gathering process and enables us to assist our partners on-the-ground by double-checking measurements and other detailed elements which are often overlooked – such as access for installation, and positioning of power inlets. A constructive partnership approach demands tangible input and Winsted provides an additional package with each equipment consignment that it despatches, to help ensure that on-site assembly is user-friendly and minimises time required. This comprises an AVIformat video on DVD, describing how the particular furniture involved is put together, plus a set of specific assembly tools and cleaning materials – all designed to speed up the process to the point where the client can begin using the control room furniture as quickly as possible. Opportunities are also available for system integrators and end users to use the free WELS 3D software tool. Users can experiment with specific room size configurations, as well as import WELS via DWG, DXF and JPEG formats into their own building and wiring diagrams. The software enables the use of monitors, LCD displays, recording units, keyboards, blank panels and doors in the design visualisation. ■ SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2011 |



Better control for border protection CCD has worked with the Australian Customs and Border Protection Service to redesign a number of major port and airport CCTV control rooms. The new state-of-the-art facilities provide the latest technology, desking, room environment and control interfaces. Customs and Border Protection acting national manager, technology and enforcement capability, Nicola Viney said the new facilities will help customs and border protection officers carry out their role more effectively. “We recognised that the success of our operations depends on how staff interact with the facilities and equipment and asked CCD to work with us to develop this.” CCD undertook human factors and behavioural studies within existing control rooms to develop a facility design that meets the needs of staff and supports the complex monitoring, tracking and communication activities undertaken within these environments. Customs and border protection officers were consulted in the design process to ensure the skills of the staff were integrated with new digital technology to deliver a high performance control platform. The new designs will be rolled out across Australia under a phased upgrade program. CCD project leader Helen Gagg said the project was important to ensure the ongoing security of Australia’s borders: “The work we have undertaken means that the new facilities and the latest technology are optimised according to the needs of the people that work there,” she said. ■

Adding versatility with new Slat-Wall consoles Winsted Europe & Middle East has introduced a new range of Slat-Wall consoles. Based on Winsted’s popular and award-winning Sight-Line consoles, they provide added versatility by featuring a 15-inch tall slat wall for mounting a variety of flat-screen monitors and other accessories. The new Slat-Wall consoles are modular, configurable and expandable to meet the changing needs of control rooms over their operating lifetime. They also take flexibility to a new level – with several monitor mounts to choose from, there are a virtually infinite number of ways to configure and adjust display monitors. Slat-Wall panels can also be used to add an element of privacy to each operator’s personal workspace. The slat-wall itself is constructed using high quality extruded 6105T5 aluminium with a black anodised finish that is attractive and smooth to the touch. Terry Shough, Winsted EMEA’s general manager says: “Slat Wall units take all the existing features that customers have enjoyed about our Sight-Line consoles and add extra versatility. For instance, you can eliminate clutter and add space with a selection of Slat-Wall accessories that are designed to help control room operators keep themselves organised.”■ 38




Efåciently and quickly regulate pedestrian and vehicular trafåc at your entry points...and even stop a speeding truck with EZI TRUCKSTOPPERTM. TRUCKSTOPPERTM AND TRUCKSTOPPERTM RDSM* – PREMIER SLIDING GATE SYSTEMS The design affords bi-directional protection, high opening and closing speeds of up to 1.5 metres per second and the highest levels of impact resistance. It is designed to prevent entry by pedestrians right through to speeding trucks. It has been successfully tested by independent authorities and has stopped a 7.8 tonne truck at 82.7kph. It is US K12 and UK PAS 68 rated and has received Australian Government SCEC endorsement.

› Opening and closing speeds of up to 1.5 metres per second › State of the art electronics provide a true 100% duty cycle product

The TruckStopperTM system is versatile and provides various options for top gate design including electric fencing variants.

› Provides high levels of safety to pedestrians and vehicles › Fully compatible with all access control systems › Approved and tested by US, UK and Australian Governments


As a cantilevered system, all mechanicals and electronics are above ground for ease of installation, maintenance and reliability under all conditions. Its state of the art electronics provide a true 100% duty cycle product and reliability through proven industrial quality components, PLC (programmable logic control), and UPS (uninterrupted power supply) back up. TruckStopperTM also has sophisticated safety systems capable of providing high levels of safety to pedestrians and vehicles. All safety systems can be overridden in the event of an emergency and TruckStopperTM is fully compatible with all access control systems. The TruckStopperTM is approved and tested by US, UK and Australian Governments and has a true K12 tested impact rating. * Rapid Deployment Shallow Mount

For USD 51,500 (ex factory), this heavy duty cantilevered gate offers affordable, permanent, crash tested protection.

For further details and a full list of features visit:

enquiries ›

Perimeter intrusion detection technology choices With increasing global energy prices and regional instability, the protection of critical infrastructures is paramount. The challenge facing operators is to provide adequate levels of security and the effective detection of perimeter breaches at an acceptable price. As a ¿rst level of defence, fence intrusion detection sensors are designed to detect the disturbances associated with climbing, cutting, spreading or lifting of the perimeter fence fabric. When an intruder attempts to penetrate the perimeter fence, his actions will generate mechanical vibrations and/or stress in the fence. All of the fence mounted sensor systems convert these vibrations or stresses into discernable signals using a variety of technologies and methods. Today, the current generation of ¿bre optic based fence mounted intrusion detection technologies are very sophisticated, handling nuisance alarms using advanced techniques such as Digital Signal Processing, learning algorithms, and Arti¿cial Intelligence. This level of signal processing is the only way to successfully maintain full detection sensitivity during all of the extreme weather conditions experienced in the GCC without the penalty and inconvenience of nuisance alarms. Importantly, this amount of signal processing requires a centrally located system, so a big plus is that these newer more advanced ¿bre optic detection systems do not require any power or electronics to be installed on the fence line, resolving potential power and communications infrastructures supply issues, and saving considerable installation and ongoing maintenance costs. The more advanced ¿bre optic systems such as FFT Secure Fence have the ability to not only reliably and consistently detect these illegal intrusions, but will pinpoint and report the precise location of the intrusion activity to security staff, and activate cameras, lights, alarms etc. If your site is situated in a coastal environment, the type of perimeter intrusion sensor selected also needs to take this into account. For example, copper sensors or communications cables will rot out quickly in salt air so should be avoided, and any electronics or controllers installed in the ¿eld should be completely sealed to prevent corrosion and subsequent reliability issues. Any metal components such as camera housings, electronic enclosures, junction boxes etc. should be avoided altogether. Even the very best sensors available today will deliver less than optimum performance if not correctly tailored to meet the speci¿c requirements of the site. The role of any perimeter security system (that is, the perimeter fence, the perimeter intrusion detection system, and the response mechanism) is to act as the ¿rst level of protection—de¿ning the boundary of the site, providing both an early warning of intrusion attempts as well as deterring, detecting, documenting and delaying any intrusion. This integration of components and systems is a major design consideration and is best accomplished as a part of an overall site security plan and not simply as a stand-alone package. For more information on Future Fibre Technologies go to or call FFT’s Dubai of¿ce on +971 4 4345361. For more detailed information and to download a free copy of Boundaries of Security Global trends in perimeter security, go to


Taking it to the edge Security Middle East highlights how an integrated approach to perimeter protection provides the best defence for large-scale critical infrastructure sites There are two distinct and equally important priorities in perimeter protection – and different tools and techniques are used to address them. Broadly speaking these priorities are: the protection of sites against direct, open attack in force and the protection of sites against covert intrusion. The threat of direct, open attack is usually, but not exclusively, terrorist-related (it also potentially includes organised criminal activity, such as hit-and-run raids or unauthorised access by groups wishing to cause disruption). The solutions are primarily physical and, aside from site re-landscaping, can include vehicle barriers, bollards (fixed or automated), robust fencing, gates and access points. These solutions are generally used in close proximity to facilities, at entranceways and approach roads, and where key risk zones are located near to unsecured, public areas. In these situations the threat of assaults in vehicles remains a major concern for security planners. “There’s been a lot of recent development in ways to stop vehicles Right The Ganz C-AllView being driven at speed through perimeter lines,” Graham Sharp of Thermal Vision camera can Bristorm tells us. His company is very active in the region, providing spot intruders in total solutions for major border projects, oil and gas facilities, desalination darkness up to 1km away plants and other key infrastructure sites, with physical Where critical infrastructure and security measures including high-risk sites are being protected, barriers, bollards and fences. “One of our most important it is no longer a question of choosing innovations, which is proving between physical security & electronic particularly useful, protects monitoring: both are needed against both vehicles and people – these separate threats usually require two distinct lines of defence and as a result are more costly to Whilst these covert attacks may also be terrorist-related, the install. We’ve successfully combined the two.” solutions used to prevent them are the same as those deployed to This recently-developed system called Bristorm IVP has a much counter the risks of more general intrusion. This aspect of perimeter narrower fence line and is installed with a single foundation, yet in security is concerned with detection as much as with physical barriers; official UK attack testing (to BSI PAS 67) it has performed very well, the aim is to deter intruders if possible, to delay them, to detect their with the two elements behaving as if installed independently. attack quickly and reliably and to give security teams the time and the “A variety of anti-vehicle systems can be used at different points on information they need to respond. the perimeter, for example depending on the terrain, the anticipated Integration with general security control systems, and especially CCTV, speed of attack and type of vehicle that might be used,” Sharp adds. is now regarded as an essential element of perimeter security. Particularly Further out from buildings, where there is some distance between where critical infrastructure and high-risk sites are being protected, it is the site boundary and the key risk zones, the risk assessment will no longer a question of choosing between physical security and electronic usually call for different measures. Here attackers are more likely to monitoring: both are needed. This is especially true in addressing the risk take their time, with rapid hit-and-run assaults less likely than careful, of covert attack and the protection of perimeter lines which are well away stealthy incursions. from occupied areas. Physical barriers will delay, but continual, accurate 




 remote monitoring is essential.

There are various technologies for perimeter intrusion detection, including: fence-mounted piezo-cable technology, fibre-optic cable, tension alarms such as those incorporated into electrified fences, buried cable systems, microwave and passive infra-red detection and, emerging in the last few years, analytic CCTV detection. Several airports in the region are using Southwest Microwave’s Intrepid MicroPoint Cable to secure extensive sites. Graeme Howes, the company’s Middle Eastern regional branch manager, explains that problems with detection can arise because fence quality degrades over time and that protected areas may be altered, often with different fence types, resulting in inconsistencies in the fencing framework. “With traditional fence sensors, achieving uniform detection sensitivity on fencing of varying conditions or dissimilar fabric is nearly impossible,” he says. “The result is a high rate of nuisance alarms and unreliable detection of cut or climb attacks.” MicroPoint Cable, he explains, is calibrated in 1.1 metre increments – called subcells – compensating for variations in fence quality or material. The system’s alarm threshold is then set to correlate with measured detection sensitivity at each subcell, for more consistent sensor performance. MicroPoint is tie-wrapped to the perimeter fence, typically attached at the midpoint, and one run of cable is sufficient for the protection of enclosures up to 3.75 metres tall. For sites facing harsh climatic extremes on a regular basis, minimising weather-generated alarms is an important factor. “MicroPoint is an intelligent sensor,” says Howes. “Other systems call for the lowering of detection sensitivity to avoid environmental disturbances, which can similarly mask the detection of fence attacks. Our system relies on patented technology that discerns between legitimate fence attacks and distributed disturbances, such as high wind, sheeting rain or aircraft vibration.” Other solutions from Southwest Microwave include the MicroTrack buried RF sensor and the K-Band microwave sensors for gates, rooftops etc. Future Fibre Technologies (FFT), is a leader in fibre optic intrusion detection and has supplied major projects in the region (including, as reported earlier this year, a 500 kilometres buried pipeline in Iraq). The FFT Secure Fence system is a good example of fibre optic perimeter security technology, capable of pinpointing intrusions and attacks down to 10 metres on perimeters up to 80km long. Multiple systems can be networked together to monitor longer distances such as national borders. Fibre optics have the advantage of not distributing power or electronics in the field and being immune to EMI/RFI.




Above and below left Future Fibre Technologies demonstration site in Oman

Meanwhile electrified fencing systems provide both deterrent and detection capability. Typically mounted on host fences or other structures (such as walls and roofs) these electrified systems present a formidable psychological obstacle to intruders, delivering a painful (but safe) pulse shock to anyone attempting to climb them and with the advantage that tension alarms will reliably be triggered only by genuine attacks. Two specialist electrified fencing companies currently expanding their presence in the Middle East are AFSCO, from the US and distributed by Sprint Industrial, and the UK developer Harper Chalice, which is growing rapidly and exhibiting at Intersec in January for the first time. The AFSCO system delivers a high voltage pulse to defend unauthorised access and an LED light indicates the system status, such as armed, disarmed, tampered, short circuited or cut. High and low voltage operation can easily be switched remotely using a keypad. Harper Chalice has won a number of major contracts since its success in UK official trials last year, where it performed significantly better than competitors. “Our PulseSecure system incorporates important technical innovations and as a result we are getting a lot of interest in the region,” confirms managing director Graham Harper. “We are in discussion with distributors and customers across the Middle East.” Whichever detection system is used, a means of verification will be needed to check whether the activation is a false alarm, determine the nature of any risk posed, and provide details for a response team to deal with the threat. Control room operators can use suitably equipped surveillance cameras to provide this capability. CBC is just one supplier worth highlighting here because of its experience in providing perimeter solutions for Middle East applications. Hassan Ahmed, the company’s export sales manager, explains that the company’s Ganz C-AllView Thermal Vision is particularly useful in these applications because of its combination of up to 36x optical zoom capability and thermal imaging technology. This allows potential intruders to be spotted up to 1km in darkness, without the need for lighting, as well as through smoke, fog, mist, foliage and other obstacles which reduce normal vision. This type of perimeter surveillance can be combined with video content analysis (VCA) software to provide automated 24/7 intrusion detection alerts. For example, CBC’s Ganz VCA system alerts staff of potential intrusions in a sterile zone, or the event of fence violations, and offers ‘black wall monitoring’ whereby video is streamed to a monitor only when the analytics software triggers an alarm, freeing up operators for other tasks in the meantime. ■

The low-cost solution to high-cost crime Install an unobtrusive AFSCO electric fence – the ultimate in perimeter protection for residential, commercial and industrial sites.


Defend… Deter… Deny… Detect





SEE THE TOP SECURITY SOLUTIONS IN ACTION Visit IFSEC Arabia, the only commercial security and fire safety event to bring the entire security industry supply chain together. IFSEC Arabia is supported and endorsed by the Saudi Ministry of Interior and has the Royal Patronage of Prince Nayef bin Abdul Aziz Al-Saud. Visit IFSEC Arabia to: Source cost-effective solutions from international exhibitors such as AMG Systems, Axis Communications, General Dynamics, March Networks, NITTAN and Tyco Security Learn from industry-experts at the MOI’s 14th International Conference and Exhibition for Industrial Security, developed in association with the Institution of Occupational Safety & Health (IOSH) and ASIS Benefit from exclusive networking opportunities and meet with other high-level security professionals


Co-located with:

Organised by:


An open and closed case Doug Woodbridge, head of sales and marketing at S3 ID looks at latest developments in high-security ATEX certified zone 1 electronically controlled door locking solutions for use in potentially hazardous atmospheres

Continued unrest around the world is prompting governments, business owners and managers alike to focus on how best to protect their critical infrastructure, assets and personnel from attack. Threats commonly experienced today range from simple criminal attacks, focussed on the theft of goods or assets, to the extremes of terrorist attack on-shore and piracy off-shore. We regularly hear stories of modern-day pirates attacking vessels off the west coast of Africa or of terrorist insurgency in other parts of the world. The consequences of such events are both traumatic for the families involved and expensive for the companies that must choose to either pay a ransom or sit it out in the hope that the pirates will 48



eventually release their hostages or abandon their assets. Against this background is the worrying concern that it is only a matter of time before terrorists or pirates turn their attention to other ‘higher value’ targets. Oil, gas and petrochemical installations and infrastructure are potentially ‘high risk’ targets in all of the above areas and pose some very unique protection challenges requiring, as they do, specialist solutions specifically designed to operate safely in potentially explosive ATEX zone 1 & 2 atmospheres. With the potentially severe consequences posed by a breach of security both in terms of personnel, equipment and the damage to the environment, we are finding that companies in these sectors are now 

INE L N O R E T REGIS ! AND WIN ase fill an iPad ple in w d n a e 00 onlin ode: ISAD18 C To register n o ti o m r Pro in the Visito

The largest and most comprehensive exhibition and conference for security and safety in the Middle East • Commercial Security & Information Security • Homeland Security & Policing

• Fire & Rescue • Safety & Health

January 15 – 17, 2012 Dubai International Convention and Exhibition Centre, Dubai, UAE

Intersec 2012 • 850 exhibitors expected • 23,000 visitors expected • 10 Halls • 3rd UAE International FireFit Championships • Exciting Outdoor Demonstrations + Conferences


 very receptive to advances in technology, particularly where it can help

them address both safety and security issues in one move. For many years S3 ID has specialised in providing safe secure solutions designed to locate personnel and get them to safety in an emergency. This technology uses special ATEX certified ‘active tags’ issued to each member of personnel that uniquely identify them to the system and special strategically located ATEX certified intelligent reader subsystems. Some time ago we recognised that this technology also had the unique potential to extend its use and functionality so as to also enhance security – the ‘one tag’ literally becoming the ‘key’ to enhancing both safety and security.

Lock-down Historically, the layers of security and personnel safety protection tended to operate wholly independently. In high risk environments this created the challenge of both providing high-security ‘lock-down’ capabilities in areas where only ATEX certified systems can be used whilst still allowing safe passage for the evacuation of personnel in an emergency. In 2010, we implemented our first fully integrated solution; providing off-shore location awareness, mustering and access control in one holistic solution for the BP Angola FPSO. The system also incorporated an emergency lock-down anti-piracy facility, allowing the vessel to be secured ‘at the press of a button’. With the award of this milestone contract we recognised that the marketplace too now also saw the need for taking an integrated approach to both safety and security, and took the decision to extend our range of specialist eSecurity solutions to cover all aspects of access control. The benefit of combining eSecurity functionality with our eLocator software suite, is that access to facilities and restricted areas can now be controlled and personnel movements and the access histories recorded, all within a single, integrated, safety and security solution. A further benefit of our eSecurity software is that it has also been designed to be integrated (if required) with other ‘third party’ solutions in order to restrict access to other critical functions as well as doors. This works by allowing ‘permissions’ to be set within it associated with controlling specific assets thus enabling only suitably qualified personnel who possess an appropriate valid electronic ‘permit to work’ to access critical functionality.

High-security for ATEX zone 1 As part of the BP Angola project we designed and engineered a unique ATEX certified electronically actuated Shoot Bolt eLock system to physically secure doors and restrict access around the vessel. Designed for use ‘inside’ the vessel in potentially hazardous or explosive zone 1 or 2 atmospheres, the eLock Shoot Bolt system was created in both fail safe (open) and fail secure (locked) versions to satisfy varying client needs. Following this development, we saw our next logical step in developing and offering specialist high-security attack resistant locking solutions that could be applied to both physically protect assets against a concerted attack or even be used to secure blast doors in both zone 1 and 2 environments. To do this we decided to exclusively partner with the UK’s leading high-security locking systems manufacturer, MICO Tindall. Our simple objective: to combine the very best mechanical and electronic technologies to create the ‘ultimate high-security locking system’ for ATEX zone 1. As the starting point for our high-security solution we chose the MICO Abryll single point range, which is extensively proven in use in the utilities, energy and government sectors. Multi point locking variants of this popular and proven product are also available. The




Abryll range is the highest security rated locking system available in the UK today, and is tested to LPCB SR 2, 3, 4, 5 and 6 on selected single and double doorsets. By working in partnership with MICO Tindall to create a special new lock body to house the mechanical and electrical components we have created a comprehensive new range of locking systems capable of satisfying the highest demands for physical security, yet specifically engineered for use in ATEX zone 1 & 2 hazardous areas. It also met our requirement for all electrically actuated eSecurity products to be seamlessly integrated with our other location and mustering technologies, incorporating as it does some very unique monitoring and alarming options. Manufactured entirely from 316L stainless steel, the new highsecurity S3 Abryll eLock system has been designed for use within all areas of the oil, gas, chemical and shipping sectors world-wide. The locks have been designed to be easily installed in new installations or retrofitted to an existing facility and are supplied with comprehensive mounting instructions. The S3 Abryll range is primarily designed to provide high-security, and operate as a key released mechanical ‘slam-lock’ incorporating both ATEX certified electromechanical over-ride and full electronic monitoring and ‘alarming’ facilities. The S3 Abryll range can be offered with a choice of single and multi-point locking options and can be fitted externally (where required) with a high-security ‘mastered’ key cylinder (complete with cylinder guard) from industry renowned suppliers such as Abloy and Kaba. Internally, tamper monitored ‘break-domes with thumbwheel release’ or emergency push bar release options are also available to suit every application. The resulting S3 Abryll eLock range can now be used with an appropriate integrated access control system to both physically protect and control personnel access to restricted facilities located in hazardous areas. Within a large oil, gas or petrochemical facility, this enables high-security door locking and alarming systems to become part of an integrated approach to security, personnel location awareness, emergency evacuation and electronic muster system, thus ensuring the safe evacuation of personnel, whilst protecting vulnerable physical assets from attack. Integrating, real-time location awareness, mustering and security systems has obvious advantages in minimising the risk of human error and improving decision making in a real crisis. It also means that the facility can both be readily ‘unlocked’ and evacuated in a process emergency or rapidly locked down against physical attack. ■

Every Integrator Needs Support Will your manufacturer be there for YOU?

V6221-G Series 2.0 Megapixel H.264, 10x Zoom

At Infinova, we say Yes. Infinova will be there for you at each stage of your project. Listening to your requirements and offering you a competitive proposal that meets your customer’s business needs. Integrators we work with tell us that Infinova is an industry leader in customer service and we would like to hear the same from you. We want you to stand-out and shine in-front of your customers. That’s what we call being “The Integrator’s Manufacturer”.

Call Infinova TODAY and test us out. North America, World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States. Phone: +1 732-355-9100, +1 888-685-2002 (toll-free), Fax: +1 732-355-9101, Email: Latin American & Caribbean: +1-954-990-0787, Europe: +40 723 536600, Email:, Asia, Hong Kong: +852 2795 6540, Email:, Middle East: +965 2247 5678, Email:, India: +91 20 26698599, Email:


Social networking without the risk Nigel Hawthorn looks at the big four social networking risks and the various ways that businesses can protect themselves

Companies, large and small, can no longer ignore or try to block social networking in their environment. It’s a part of the fabric in which we now learn, play and work. The reality is you need to go where your target audiences are – and people are more likely to participate in a social media forum than any other venue. Customers, partners, and employees, alike expect to engage with you via social media – it’s a way for you to stay connected, gather feedback, recruit, and collaborate. As a result, you need to support social media in your environment to enable the innovation, increased productivity, and accelerated growth that will drive your business.




All the things that make social media so attractive to users – the personalisation, the ease with which information can be shared and the real-time nature of the medium – pose significant risks to your business. The following are the top four risks you face when you use social networking media:


MALWARE In 2010 social media became the preferred communications vehicle for users, who are spending more than 700 billion minutes per month on Facebook alone, making social networking sites and their 

Tired of paying to have your guard tour hardware repaired? Here’s a simple solution for busy security managers

Does your faulty watchclock or guard tour recorder spend more time being returned for yet another costly repair while it should be protecting your investment? Do you lose the accountability you expected because of downtime? Then you should consider THE PIPE®, the super-rugged tour data recorder from TimeKeeping Systems.

The world’s most rugged tour recorder

You’re in good company

The best warranty in the industry

THE PIPE® is endorsed and recommended by many of the world’s largest security companies because of its ruggedness and durability. These and other major companies were plagued by reliability problems with other equipment before adopting THE PIPE® as their preferred guard tour recorder.

Because THE PIPE® is so reliable, we offer an industry-best 5-year warranty on hardware and battery. Why use a product that offers anything less?

Here’s what makes THE PIPE so durable: It has no moving parts. It is manufactured from #304 stainless steel. Its electronics are protected against shock and moisture. And each unit spends a day in final testing at -20° and +50° Celsius before it leaves the factory. ®

Systems EMEA Telephone +32 3 285 95 70 | |

You have better things to do than worry about your old hardware! Next time, before you send your guard tour hardware back for repairs, call us. We’ll show you how THE PIPE® and our GUARD1 PLUSTM software can reduce your repair costs, increase your uptime, and simplify your job.


 users ideal malware targets. According to Sophos, 40% of users were

infected by malware from social networking sites. Typical attacks draw on the trust relationship established between users and their connections. They try to trick users into giving up information and access that can be exploited for financial gain. Some examples of malware particularly successful in social media are: ■ Phishing: With increasingly sophisticated techniques, attackers pose as one of your legitimate social networking connections and try to lure you into providing sensitive information, such as your login credentials. They prey on the tendency of most people to use the same passwords for all their accounts, hoping that by tricking you into giving one username and password they can get access to more profitable banking, financial and other online accounts. Most users have their radar ON concerning financial accounts, but their daily login to a social networking site is just a speed bump, creating an opening for cybercriminals to steal online assets. This is why more and more phishing attacks are targeting seemingly “nonrelevant” online user accounts. ■ Click-jacking: Attackers lure you into clicking on a link, perhaps posting it on your wall and then spamming your friends to ‘check it out,’ or ‘view my photos.’ When someone clicks on the link, they unwittingly install malware (code or script) that can be used to steal information or take control over their computer. Clickjacking uses the dynamic nature of social networking and a willingness to click on links from those you know, and even those you don’t, to quickly reach a large audience, cajole you into revealing private information (eg through surveys), collect hits for ad revenue, and eventually allow access to your entire social network.


DATA LOSS Social networking is about making connections and sharing experiences and information. However, sometimes that information is not meant to be made public. It’s not uncommon for people to inadvertently post confidential information – “hey, I just met with xxx and I think I am about to make a huge commission,” or “I’m pulling my hair out, if we can’t fix this software bug soon, I don’t know that I will ever sleep again,” that provides ‘insider knowledge.’ There have also been cases in which employees have unintentionally posted proprietary software code to social networking sites, exposing sensitive intellectual property. These actions, though unintentional, can potentially violate industry specific regulations, impact your reputation, or put you at a competitive disadvantage.


BANDWIDTH CONSUMPTION As much as 40% of employees report that they are on social networking sites at work, creating a potential strain on bandwidth to the detriment of other business applications. Last year, when the US government mandated open access to social networks, traffic on the network increased by 25%. Video alone (think of all the videos your friends share and you link to through Facebook or Twitter, can overwhelm many networks. A single video stream usually consumes between 500k to 1.2 Mbps (and that’s not even HD, which can be up to 4 to 7 Mbps), and when you have tens or hundreds of people accessing videos it’s easy to see how overall performance can degrade.


PRODUCTIVITY LOSS Social networking sites are becoming online destinations, enabling you to post and read messages, date, shop, upload or check out videos and play games. This makes them increasingly convenient and engaging for users, drawing them to spend more and more time there, as well as increasingly challenging for the business to

appropriately control. When unchecked, the time spent on social networking sites can affect productivity, as your employees spend more and more time playing Farmville during business hours.

Keeping your business safe While you find yourself compelled to allow social media to compete and thrive in today’s global economy, you do not need to expose your business to undue risk. There are ways to protect against and mitigate the risks posed by social networking. Specifically, your solution needs to provide: ■

A real-time web defence: social networking is constantly changing, as are the tactics used by attackers to exploit it. As a result, your solution needs to analyse your web traffic on the fly and uncover threats that may be hidden there. Real-time analysis of dynamically changing links provides risk analysis and timely protection to keep social media safe. So when you see “hey you should take a look at this,” you can either allow or deny based on the potential risk it poses.

Selective social networking controls: to protect against data loss and comply with industry-specific regulations, you need to be able to manage the actions your employees can take within social networking sites. For example, you may want to prevent employees from uploading attachments, photos or video to social media sites, thereby preventing risks of inadvertent data loss or risks to your corporate reputation. The key is to have granular control over what can be done within social networking. This requires a solution that not only looks at where the initial traffic is coming from (eg Facebook, YouTube, etc), but also at what is being done within that application (email, posting messages, downloading attachments).

Caching: you can’t allow social media to overrun your network and adversely impact business critical applications, however, because social networking is becoming so integral to business, you cannot simply block it. What you can do is offset any potential performance degradation with caching, which allows you to locally store data and video files after an initial download and make them readily available to users who want to subsequently access them. In this way, you can enable access to social networking without compromising the performance of other traffic on the network.

Policy flexibility: to manage productivity, you need to be able to set acceptable use policies within social media. You may choose, for instance, to block access to Farmville during work hours; or if you allow it, you may want to give it a lower priority, so it doesn’t impact business critical applications. With a flexible policy framework, you can prioritise and manage the activities that are allowed or disallowed, and when. The ability to delineate between social networking sites and specific applications or content within those sites is crucial to setting an effective acceptable use policy. So, if you elect to block games, you can block both standalone games, as well as games within social media sites

Realising the promise of social networking no longer needs to be a potential risk for the business. Embracing social media only requires the right security. ■ Nigel Hawthorn is vice-president EMEA marketing at Blue Coat Systems.

He has worked in the computing and networking industry for 25 years and has presented at security, e-commerce and networking forums in over 50 countries. He has also contributed to a number of computing books on protocols and security. SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2011 |




Please sig n up for our monthly email new sletter. Em ail your full co ntact deta ils to:

newsl securitymiddl etter@ m to

Are you a security product manufacturer or reseller wanting to do business in the Middle East?

register n ow

Then now is the time to take advantage of our online marketing opportunities at Security Middle East Security Middle East magazine e-zines

Security Middle East Buyer’s Guide

Security Middle East magazine website

Communicate directly with your customers with our monthly email service. Delivered direct to our reader’s inbox the Security Middle East e-zines keep them up to speed with industry news, information, products and offers. With over 3,000 senior purchasers in the Middle East now receiving our emails this is an extremely cost-effective way of communicating with your customer base.

Are you a security specifier or integrator looking to source products and suppliers for an installation? Then the Security Middle East magazine buyer’s guide is for you. This quick and easy online directory enables you to source companies, information and products specific to your requirements and make direct contact with them. If you want to make sure your company is listed contact us now.

Alongside an online version of the magazine visitors to our website have access to a full events diary, a searchable product and supplier directory, as well as news, features and product info. An average of over 28,000 hits per month* confirms that not only do readers value our magazine but that the website is an equally integral resource for security professionals in the region. *Statistics taken from January to September 2010.

If you are interested in any of the above opportunities call Beth Atkinson now on +44 1823 662538 or email:

Official Magazine o f Intersec 2012

NEXT ISSUE Reach over 66,000* security, safety and fire professionals with our Intersec 2012 preview issue The November/December issue of Security Middle East magazine is the biggest of the year. This issue is the special edition for the Intersec exhibition which is held in Dubai in January 2012 and we have been appointed by the organisers as the Official Magazine for the Commercial Security sector of the show. We will be mailing out this issue three weeks before the show to our 14,000+ subscribers plus we will print an extra 8,000 copies to be given away to every visitor to the Intersec show. This means a total of 22,000 copies will be printed. Our readership survey* indicates that a copy of our magazine is read by an average of three people which gives us a readership of 66,000 for this special issue. As well as a 16 page section of the magazine dedicated to the Intersec show, we will also be publishing features on: ■ ■ ■

IP & networked security Analytics 360-degree cameras

This is the issue to get your advert most publicity and exposure to 66,000+ security professionals. For advertising details please contact: Barry Bebbington Publisher Email: Tel: +44-1708-229354


Security Middle East magazine | The Middle East’s first choice for security technology news *based on a pass-on rate of 3 per issue (source: reader survey January 06)

MONITOR EVENTS International security trade shows, exhibitions and conferences taking place over the coming months


January 2012



20-22 November

15-17 January

19-21 February

19-21 March

IFSEC Arabia


RICEC, Riyadh, Saudi Arabia

DIEC, Dubai, UAE


ASIS International 3rd European Security Conference & Exhibition Dubai, UAE

Abu Dhabi National Exhibition Centre, Abu Dhabi, UAE

28 February 1 March

Protex Arabia Jeddah Hilton Convention Centre, Jeddah, Saudi Arabia

10-13 December

MEFSEC International Exhibition Center, Cairo, Egypt





Reg. Charity No. 1080839

Datacard Group proudly supports women in their fight against breast cancer. Through March 2012, we will donate to the Pink Ribbon Foundation with every purchase of a pink Datacard® SD260™ Card Printer. For complete details, contact your authorized Datacard provider or visit E-mail :

Datacard is a registered trademark and/or service mark of DataCard Corporation in the United States and/or other countries. ©2011 DataCard Corporation. All rights reserved.

Security Middle East Magazine, September/October 11  

September/October 2011 issue of Security Middle East Magazine.

Read more
Read more
Similar to
Popular now
Just for you