SECURITY
THE MAGAZINE FOR SECURITY PROFESSIONALS
MAGAZINE VOL.21 | ISSUE 2 | JUN/JULY 2016
EXCEPTIONAL SECURITY COMPANIES & INDIVIDUALS TO BE RECOGNISED AUSTRALIAN SECURITY INDUSTRY AWARDS
82 18
PP255003/02390
ASIAL LAUNCHES INDIVIDUAL PROFESSIONAL RECOGNITION PROGRAM
Trust SCSI for all your Security & Communication needs..
DirectConnect is a 4G Fixed IP Address SIM Service that allows secure connections via PC or Mobile devices to CCTV, Access Control, BMS, Medical Alerts and IP devices via SCSI Dedicated VPN Network. The power and flexibility of BOLD’S Central Station Monitoring Automation Software enables you to increase revenue, Improve efficiencies and offer new revenue streams to existing and new customers.
SCSI’S DirectWireless is the most cost effective, Australian made, reliable, wireless alarm communicator that connects you to Australia’s only dedicated Private alarm transmission network, DirectWireless.
SecureCall portal is an extremely powerful tool used to monitor rebates via reports and search tools over all alarm traffic.
OUR PRODUCTS:
POWERED BY: PROUD SPONSORS OF ASIAL’S SECURITY INDUSTRY AWARDS FOR EXCELLENCE
www.scsi.com.au . sales@scsi.com.au . 1300 555 570
DirectConnect NEW 9 Fixed IP Sim Service
9 Optus and Telstra flexible data plans
9 Secure VPN Connection
9 4G high bandwidth data rates
9 CCTV, Access Control, BMS, Medical and IP Device supported
9 All NVR’s supported
BOLD Technologies 9 Central monitoring automation software 9 Increase revenue and improve efficiencies 9 Offer GPS Tracking and Lone worker
9 Change Truly automated and autonomous to Virtual Operator & Bidirectional Text 9 Social Media monitoring 9 Failover to multiple locations
9 Alarm verification
DirectWireless 9 iPhone and Android support
9 True end to end polling
9 Self activation
9 10 year warranty
9 Over the Air Download to over 20 panels
9 NBN Ready
9 Australia’s only private security network
9 Plug ’n’ Play alarm panel connections 9 Dual Sim 3G Technology
SecureCall 9 Receive competitive rebates on your 1345 alarm traffic
9 Zero network access fees and no monthly fees
9 Paid directly by Optus
9 Maintain ownership of your 1345 number
9 No lock in contracts
www.scsi.com.au . sales@scsi.com.au . 1300 555 570
INSIDER_Mar/Apr 2014 Iss1_48pp
31/3/14
7:27 PM
Page 6
CONTENTS CONTENTS VOL.21 | ISSUE 2 | JUN/JULY 2016
VOL.19 | ISSUE.1 | APRIL 2014
20
22
RECOGNISING EXCELLENCE
SECURITY 2014 IN THE AUSTRALIAN BREAKS INTO SECURITY INDUSTRY MELBOURNE
18
09
22
FOR 24CYBERSECURITY SENIOR EXECUTIVES
ASIAL LAUNCHES SEE THE LATEST PROFESSIONAL INNOVATIONS AT THE PROMOTING THE USE INDIVIDUAL THE NBN - WHERE RECOGNITION PROGRAM SECURITY EXHIBITION OF ASIAL MEMBERS TO NOW? 06 | President’s message 08 | Tackle the issue of late 08 | President’s message payments 09 2014world Gala leaders dinner in 10 | | Security Learn from security and conference 12 | The security industry’s night of 10 | Privacy legislation changes nights 14 | ASQA inquiry 14 | | 2014 Cybersecurity 16 Australian projected Security to drive $7.6 trillion of digital value over Industry Awards for Excellence
ASIAL Strategic Partners:
4 | JUNE 2016 | SECURITY INSIDER 6 //SECURITY INSIDER APR 2014
15 20 | 16 | 32 17 | 34 28 | 36
the next decade | New industry service - Class 5 Changes to specialist cabling Capability Certification | competencies Raising awareness of members among Help your consumers employees catch | their IEDsuper Guidelines for Places of Massyear Gathering A busy ahead in | Workplace Employment Contracts - worth Relations the effort? ASIAL new member listing /
24
30
ARE YOU PREPARED?
32 34 37 34| 37| 38 | 42 38 42
| What the Federal Budget means for super Recognition | ASIAL newprogram member listing ASIAL Monitoring | ASIAL Member centre Recognition Program listing listing certification | ASIAL monitoring centre Hot products certification ASIAL Calendarlisting of events | Hot products | ASIAL calendar of events
The future of alarm reporting is already here!
0 Multipath-IP brings Alarm Monitoring into the internet and smart-phone age. Multipath-IP enables a host of alarm panels and alarm communicators from Inner Range to connect to its vast network of Partner Monitoring centre’s. 3G Communicator
Full Smart-phone control
The T4000 provides a Dual SIM and dialer-capture solution to enable a magnitude of legacy alarm systems in the field to take advantage of super-fast 3G and IP communications. The T4000’s upload/download feature enables installation techs to continue to remotely maintain older generation alarm systems long after physical phone lines have replaced with the NBN.
SkyCommand is a fully featured smartphone app providing full control over all Multipath-IP enabled hardware products. SkyCommand ties various hardware platforms into one easy-to-use end-customer app. SkyCommand allows the user to have many sites with different hardware devices all controlled by the one app.
Home Automation and Security
Direct-IP monitoring is now a viable option for security installers using the Multipath-IP network. Previously, configuring an alarm system to report to a monitoring centre’s IP alarm receiver meant programming static settings into the alarm panel. Multipath-IP now offers a true ‘plug and play’ connectivity option for alarm reporting. The Integriti and Inception systems are now fully supported by the Multipath-IP network allowing alarms to be delivered to the customers Monitoring Company via their own internet provider.
New to the Multipath-IP ecosystem is the SkyGuard security and home automation product. SkyGuard brings an IOT (Internet of things) solution to the Security installer and Monitoring Company alike. Utilizing its inbuilt Z-wave module end-customers can control their alarm system, door locks, lights and appliances all from the user friendly SkyGuard app.
NBN and IP alarm monitoring
T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com
T: 1300 319 499
W: csd.com.au
PRESIDENT’S PRESIDENT’S MESSAGE MESSAGE
Showcasing the significant PROMOTING contribution our industry makes PROFESSIONALISM to the Australian economy
A A
SIAL has long been an advocate for higher professional and fter more than a decade, the ethical standards within the Security 2014 Exhibition and security industry. Conference returns to Melbourne The February release of the Australian in early June. Judging by the strong Skills Quality Authority (ASQA) investigation response from exhibitors, the long awaited into training in the security industry return has been well received.This year’s highlighted a failure of the regulatory event will run from the 4-6th June at the system to control the quality of vocational Melbourne Exhibition & Convention training delivery. Centre. ASIAL’s response to the report has is now nearly 30 years beenIt provided to ASQA and state/territory since a small group of ASIAL regulators. In our position paper we called industry representatives for a uniform and consistent national organised first industry approach tothe security industry licensing. exhibition. It is pleasing This included a single set to of see 15 units of that the event continues to go competency to be introduced across all from strength toastrength jurisdictions; that durationand of 130 hours an training opportunity for the ofprovide auditable be introduced for entry industry to showcase the level training by all jurisdictions; that a more impressive array of assessment products and services rigorous testing and regime it offers.Through partnership be introduced and the thatongoing Registered Training between Diversified Communications Organisations are actively audited against Australia and ASIAL, the Association these requirements. continues play a key in helping The time to has come forrole regulators to to showcase the industry’s capabilities.a step up to the plate and demonstrate year’s approach expandedtoexhibition moreThis proactive enforcingfloor space and outstanding vocational training deliveryconference requirements. program excellent opportunity Over theprovides past twoandecades ASIAL to view the latest its security technologies, has demonstrated commitment to promoting professionalism hear fromindustry internationally renownedthrough aexperts, range ofas initiatives. For example, we have well as network and socialise organised the Australian Security Industry with industry colleagues from across the Awards for Excellence, which provides country. an opportunity to recognise excellence Another important industry event I within security industry. For more wouldthe like to bring your attention to than is the three we have been involved in 19thdecades Annual Australian Security Industry organising the annual showcase forin the Awards for Excellence to be held many products services the2014. security Sydney on theand 23rd October Our industry offers through the industry’s industry performs an increasingly annual exhibition important role inand theconference. Australian economy Further evidence of ASIAL’s and it is important that this is recognised commitment to raising the level of as this. through awards programs such professionalism is an exciting new initiative Nominations are now open for the awards, that I am pleased to announce the so I urge you to consider lodging an ASIAL Individual Professional Recognition application. Further details are available on Program; an initiative that provides peersite. page 28 and through the ASIAL web recognition of an individual’s qualifications, Later this year ASIAL’s board elections experience and achievements as a security will be conducted by the Australian professional. Electoral Commission. Members will be Participants receive post-nominal notified in duewill course by athe AEC about
610| //SECURITY JUNE 2016 | SECURITY INSIDER INSIDER JUNE 2014
credential that recognises their arrangements for the election.This security experience process allows for every Duly Authorised and capability, Representative of a financial corporate commitment member the opportunity to submit a to practice in postal vote. accordance with the In my previous President’s Message, I highest professional wrote about the importance good and ethical standards and yourofstrong governance practices. Failure to do the affiliation with the industry’s peak body – right thing more often not ASIAL. The professional recognitionthan levels will result in negative include: yourindustry • Memberconsequences – MASIAL: 3+for years organisation. experience – someone who is looking an Association ASIAL to grow andAs develop their career in the actively enforces its security industry. Professional Code of Conduct, • Associate Fellow – AFASIAL: 10+ a position matched our years industry experience – aby security actions.The ASIAL Board’s professional committed to developing recent decision to advancing expel their professional skills and Hootspah Pty Limited from its the industry as a whole. and to impose a $120,000 • membership 20+ years industry Fellow – FASIAL: financial sanction specific and experience – an and experienced compliance thehas Kings respected requirements industry leaderonwho Security Groupsignificantly highlights this.The contributed to the growth continuation of the Kings and development of the Security industry.Group’s was conditional on • ASIAL Life membership Fellow – FASIAL (Life): Awarded accepting and complying with payment of to individuals who have provided thedistinguished sanction andservice meeting specific to the industry over a longrequirements.The period of time. company compliance advised that it was unable to maintain its
For more information on this new membership as required byexciting the ASIAL Individual Member initiative, Board, and as a result theirplease ASIALturn to page 22. membership was relinquished. InWhilst the coming months,tomembers willthe it is important learn from receive information the Australian mistakes of others,from it is equally as Electoral Commission regarding the important to understand that compliance Association’s Board elections. is not a dirty upcoming word. For our industry to I grow urge all members to participate in the and flourish, it is vital that we process. develop a stronger culture of compliance. The Security Exhibition & many of Finally, I look2016 forward to seeing Conference runs from the 20-22 Julyor 2016 you at Security 2014 in Melbourne later atinthe Melbourne Convention & Exhibition the year at the 2014 Australian Security Centre - IAwards look forward to seeing you there. Industry for Excellence.
THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Publisher
Editor Bryan de Caires | security@asial.com.au Editorial Enquiries communications@asial.com.au Advertising Tania Laird | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Digital Webfx2 Digital | design@webfx2.com.au Editorial Contributors Contributors AON, Chris Delaney and Greg Jennings Arno Brok, Georgina Williams, Chris Delaney
and +Kirsty Jagger Print Distribution Print +Advertising Distribution Nationwide Group Fineline bi-monthly Printing Published Published bi-monthly Estimated Readership of 10,000 Estimated readership 10,000do not Views expressed in SecurityofInsider necessarily reflect the opinion of ASIAL. Advertising
Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL.Advertising otherwise stated with permission. All contributions does not imply endorsement by ASIAL, unless are welcomed, the publisher reserves the otherwise statedthough with permission. All contributions are welcomed, though the publisher right to decline to publish or to reserves edit forthe style, right to decline publish to edit for style, grammar, lengthtoand legalorreasons. Press Releases grammar, length and legal reasons. Press Releases to: security@asial.com.au. can be emailed to: communications@asial.com.au. Internet references in articles, stories and Internet references in articles, stories and advertising werecorrect correct at the of printing. advertising were at the timetime of printing. ASIAL does not not accept accept responsibility responsibilityformisleading for misleading Copyright©2016 (ASIAL) views. Copyright©2014 (ASIAL) All Allrights rightsreserved. reserved. Reproduction of Reproduction of Security SecurityInsider Insidermagazine magazinewithout without permission is strictly prohibited. Security Insider is permission is strictly prohibited. Security Insider is a subscription based publication, rates and further a subscription based publication, rates and further details can be found at www.asial.com.au.
does not imply endorsement by ASIAL, unless
details can be found at www.asial.com.au.
[NEXT ISSUE] AUGUST 2016 [Next Issue] AUGUST 2014
ISSN 1442-1720
ISSN 1442-1720
Kevin KevinMcDonald McDonald President President
Simple & Easy Installation Integrated Security - Access Control
Inception is an integrated access control and security alarm system with a design edge that sets it apart from the pack. Featuring built in web based software, the Inception system is simple to access using a web browser on a Computer, Tablet or Smartphone. With a step by step commissioning guide and outstanding user interface, Inception is easy to install and very easy to operate.
Access Control
Automation
No Software Required
T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com
IN
Security Alarm
AU
Multiple Devices
Easy Setup with Checklist Prompting
T: 1300 319 499
IGNED
IA
S DE
For more information, visit www.innerrange.com/inception. There you will find installation guides and videos to help you get the most out of your Inception system.
STRA
L
Send IP Alarms via the Multipath-IP Network
W: csd.com.au
ADVERTORIAL
TACKLE THE ISSUE OF LATE PAYMENTS
H
aving a healthy cash flow is a vital part of any successful business: cash flow is what keeps your business ticking over and the bills paid. Many security businesses, however, find that while their profit and sales are good, their cash flow seems to be constantly low. But why? Often, unpaid invoices are the reason behind a strained cash flow. This causes many business owners stress as they find themselves spending too much time chasing late payments, searching for old invoices, and making manual adjustments. So, if you’re wondering why you’re not getting anywhere but are using all of your resources, it may be time to revisit the way you issue invoices and follow them up. For security businesses that want to get on top of spending and invoicing, there are systems available to help solve your cash flow issues.
Speedier invoicing and payment simPRO Payments, the all-inone payment feature in simPRO Software, makes invoicing and collecting payment simple. See the cash faster as you collect payment from your customers quickly and securely by credit card, with all payment processed through the simPRO system – eliminating the hassles associated with bank merchant facilities. Using simPRO Payments with the simPRO mobile app extension enables your security technicians to create invoices and process
payment on site as soon as a job is complete. Your customers can also pay you online through a customer portal, by following a link in an emailed invoice, or over the phone.
Improved customer service Offering your customers flexible payment options with simPRO Payments not only improves the likelihood that you’ll be paid promptly but also provides a high standard of service that your customers will appreciate. Improved invoicing provides greater transparency during and after the job, giving customers a clearer picture of what they’re paying for, therefore building stronger client interactions.
More time The time spent updating and adjusting quotes, filling in timesheets, and following up unpaid invoices can be costly to a security business. The extra administration often ends up
diverting resources from the job, costing you and your business money. Making it simpler for your technicians and customers through the use of technology ensures your business is putting its time and money where it’s most needed. Once you have a system in place to help boost your cash flow, it won’t be long until you see the associated advantages. Investing into your invoicing and cash flow systems can also offer greater insights into your business, making it clear where your money is going and where it needs to be.
simPRO offer for ASIAL members ASIAL members receive 20% off the initial cost and 10% off ongoing costs of simPRO Enterprise and one free simPRO Connect licence with every Enterprise licence*. Please get in touch with us today on 1300 139 467 to take advantage of this offer, or visit simprogroup.com to learn more.
*ASIAL members receive 20% off the initial cost of simPRO Enterprise and one free simPRO Connect licence with every Enterprise licence.
8 | JUNE 2016 | SECURITY INSIDER
Serious Job Management
INDUSTRY NEWS
LEARN FROM WORLD LEADERS IN SECURITY Bringing together leading local and international security experts, ASIAL’s Security 2016 Conference will discuss strategies to combat the changing security threats and challenges faced by business, government and the broader community.
ASIAL Conference program
The ASIAL Security 2016 Conference offers an intensive 1½ day program, plus practical ½ day Executive Briefings, that will address important issues and challenges faced by security professionals. Among the conference speakers are: • Duncan Lewis, DirectorGeneral, ASIO (or a nominated representative) • Roman Quaedvlieg, Commissioner, Australian Border Force • John Yates, Global Director of Security, Scentre Group at Westfield • Mark Duckworth, Chief Resilience Officer, Department of Prime Minister and Cabinet • Neil Gaughan, Assistant Commissioner, Counter Terrorism, Australian Federal Police • Dave Crossley, Head of Security, Emergency Planning
and Response, Sydney Opera House. You can view the full line up of speakers at www.asial.com.au.
Executive Briefings
To form the complete educational experience you may package your conference pass with one or two of the following sessions:
Thursday 21 July, 2.00-5.00pm Core crisis leadership competencies Caroline Sapriel, Managing Director, CS&A International (Belgium) CPTED: Past, Present & Future Dr Kelly Sundberg, Associate Professor, Mount Royal University (Canada) Friday 22 July, 9.30am-12.30pm Introduction to crowd safety and risk analysis Dr. G. Keith Still, Professor of Crowd Science at Manchester Metropolitan University (UK), Director of Crowd Risk Analysis Ltd Making social media sensing work for you Thomas Helmer, Senior Director, CS&A International Risk & Crisis Management (Hong Kong) CCTV for Critical Infrastructure and Local Government Arthur Barker, Principal Consultant, Electronic Security
10 | JUNE 2016 | SECURITY INSIDER
and Video Systems Specialist
Who should attend? • • • • • • • •
Security Managers Venue/Event Security Managers Facilities Managers Chief Security Officers Operations Managers Chief Information Officers Critical Infrastructure Managers Business Continuity Managers
How to register
Conference passes will be available to purchase onsite, subject to availability. Visit the registration desk outside Door 8 upon arrival at the Melbourne Convention & Exhibition Centre for more details. Avoid disappointment by booking online now at securityexpo.com.au. Advance bookings for the Conference available until 5pm on Tuesday 19 July.
RELATED ARTICLES The security industry’s night of nights, page 12 See the latest innovations at the Security Exhibition, page 18 Cybersecurity for the boardroom, page 24
SPEND LESS ON VIDEO SURVEILLANCE STORAGE
SO YOUR CLIENTS CAN SPEND MORE ON OTHER TOOLS
Quantum’s multi-tier storage solution provides total usable capacity for less of the overall budget, allowing your clients to invest more in cameras, retention times, and analytics.
See us at Security Expo Melbourne 20-22 July, Booth F36 Find out more from Quantum ANZ: ANZsales@quantum.com or 1 800 999 285 (Aus) or 0800 105 999 (NZ) www.quantum.com/video-surveillance © 2016 Quantum Corporation. All rights reserved.
INDUSTRY NEWS
DON’T MISS THE SECURITY INDUSTRY’S NIGHT OF NIGHTS
H
osted by Dave Hughes the annual Security Gala Dinner is held to celebrate, reward and engage security professionals, suppliers and clients from across the country. Taking place on the first night of the exhibition and conference, the Security Gala Dinner is the industry’s night of nights incorporating a threecourse meal, fine wine and great entertainment from afore mentioned Hughesy. Since 1999, Hughesy has become one of the biggest and most loved names in Australian stand-up comedy as well as a renowned television and radio personality. Honest and imperfect is how Australians like their comedy and Dave Hughes will deliver exactly that in spades. After the overwhelming feedback last year, the dinner venue will again be the stunning Plaza Ballroom at the Regents Theatre in Melbourne’s CBD. This is the ideal event to catch up with peers, host your clients and congratulate your staff or colleagues so don’t miss the industry’s ultimate networking evening and put it in your diary now. DETAILS Venue: Plaza Ballroom, Regent Theatre Address: 191 Collins Street, Melbourne VIC 3000
12 | JUNE 2016 | SECURITY INSIDER
Date: Wednesday 20 July Time: 6:30–11:00pm Find out more and book at www. securityexpo.com.au.
A word from our sponsors Gold dinner sponsor
Entertainment sponsor
MSS Security is one of Australia’s leading security and emergency response companies, with more than 5,400 employees. Whatever their size, our clients receive a tailored service, with measured results, delivered by carefully selected, fully trained security personnel, who are directly employed whenever possible. Our frontline staff are backed by specialist account management and support in every state and territory, 24 hours a day. MSS Security operates in all market segments – aviation, commercial property and retail, defence, education, government, health, resources, industrial and manufacturing, maritime, logistics, and arts, events and recreation. To learn more, visit msssecurity. com.au.
The Interlogix product range is extensive, catering for most security applications from small domestic installations to the largest airport, prison and educational facility. Our products have been designed to cater for the specific needs of these applications with flexible product design and application specific products. To learn more visit utcfs. com.au.
RELATED ARTICLES Learn from security industry leaders, page 10 See the latest innovations at the Security Exhibition, page 18 Cybersecurity for the boardroom, page 24
INDUSTRY NEWS
CYBERSECURITY PROJECTED TO DRIVE $7.6 TRILLION OF DIGITAL VALUE OVER THE NEXT DECADE In a business environment, being transformed by digital disruption at an unparalleled rate, companies that make cybersecurity a vital foundation of their digital growth strategies are uniquely positioned to take advantage of new innovation and growth opportunities to help them realise financial benefits. “Cybersecurity as a Growth Advantage,” a research study conducted by Cisco (NASDAQ: CSCO), reveals that more than 30% of executives view cybersecurity primarily as an enabler of growth tied to digitisation. One-quarter of the survey’s respondents exhibited characteristics of security-led digital organisations due to their commitment to growth through digitisation, with cybersecurity as a critical foundation. Security-led digitisers feel more prepared than others to address cybersecurity challenges in three key digital technology areas: analytics, Internet of Things (IoT), and cloud computing. As a result, these organisations are far more confident about incorporating digital technologies into their business processes and offerings. In fact, 44% of executives surveyed
consider cybersecurity to be a competitive advantage for their organisations. Cisco estimates that cybersecurity will drive $7.6 trillion of digital value over the next decade. More than three-quarters of this amount – $5.8 trillion – will result from cybersecurity’s enablement of digital use cases that instigate innovation and growth. Conversely, a lack of cybersecurity strategy can cripple innovation and slow business, because it can hinder development of digital offerings and business models. Seventy-one percent of executives said that concerns
over cybersecurity are impeding innovation in their organisations. Thirty-nine percent of executives stated that they had halted mission-critical initiatives due to cybersecurity issues. The global survey includes input from more than 1,000 C-suite and line of business executives, with significant cybersecurity experience and responsibilities, from 10 countries. For additional findings, head to www.asial.com.au/news. To read ‘Cybersecurity for senior executives’, by Australian Information Security Association Ltd (AISA) CEO Arno Brok, turn to page 24.
REVISED MIGRATION OF LEGACY SERVICES INDUSTRY GUIDANCE NOTE The deployment of Australia’s upgraded broadband network being deployed by nbn will create significant change within the Australian telecommunications environment. Under the new arrangements the majority of telecommunications services will be progressively transitioned from circuit-switched copper-based network technology to the new fibre-based and other Multi-Technology Mix (MTM) access networks where voice services will be delivered using Internet Protocol (IP) standards. One of the consequences
14 | JUNE 2016 | SECURITY INSIDER
of these changes is the effect on non-telecommunications ‘Over the Top’ (OTT) devices that make use of copper-based telephony services for their operation. These OTT devices include (but are not limited to) the following: • Personal medical and back to base security alarms (referred in this paper as alarm services); • EFTPOS / payment systems; • Monitored fire alarms; and • Lift emergency phones (emergency phones in lifts of multi storey buildings).
The Communication Alliance has now published the updated Industry Guidance Note (IGN 004). ASIAL has contributed to the revised IGN as an NBN OTT Services Transition (NOST) Working Group Member. View the full document at www.asial.com.au/news. The information covered in this paper focusses on the migration of legacy services off the copper networks as determined by the Migration Plan. The principles contained apply generally to legacy services, although there may be certain specific considerations required for certain legacy services, such as monitored medical alarms, security alarm panels, monitored fire alarms and lift emergency phones which are connected to back-to-base monitoring centres (which are called out in the document where appropriate).
INDUSTRY NEWS
NEW INDUSTRY SERVICE - CLASS 5 CAPABILITY CERTIFICATION Recognised as the leading body for grading security monitoring centres in accordance with AS2201.2, ASIAL has announced a new service for the electronic security market; Class 5 Capability Certification. This capability recommendation is based on AS/NZS 2201.1 2007 and its referenced standards. The control equipment may be capable of meeting Class 5 Capability Certification subject to full ongoing compliance with the referenced documentation. As part of the certification process, the equipment supplier completes a detailed Compliance Statement, together with associated test procedures. The actual Class 5 Capability Certification will list the name of the
control equipment, plus the revision number and date of the: • Installer Manual • Routine Maintenance Manual • Installer Compliance Statement • Client Compliance Statement The last two documents may also be used as a basis for system compliance audits following installation. Certification is for a period of two years and all documentation must be maintained for that period. The supplier must agree that: • the required documentation will be maintained up-to-date for the period of the Certification, with ASIAL being advised in writing of any such changes, and • they will maintain compliance throughout the certification.
Any changes that may have an impact upon this will notified to ASIAL within 14 days. ASIAL may withdraw and cancel a certificate should it become aware of any non-compliance during the certification period. The new service offered by ASIAL will provide you with options to better align your long term product strategy and provide greater predictability for development success. To apply for certification please visit www.asial.com.au/resources for more information.
؟ ؟PUZZLED ? ? ABOUT WHERE TO BUY SECURITY PRODUCTS
ONE-STOP SECURITY SOLUTIONS PROVIDER info@n2ndistribution.com www.n2n-group.com
AMAZING PRICES WITH EXCELLENT CUSTOMER SERVICE SECURITY INSIDER | JUNE 2016 | 15
INDUSTRY NEWS
RAISING AWARENESS OF ASIAL MEMBERS AMONG CONSUMERS In early 2016, ASIAL launched a new high visibility Consumer Awareness Campaign to promote the use of licensed security professionals who are ASIAL Members to decision makers in SME, Corporate and Government organisations around Australia. The offline campaign comprised primarily of digital screen advertising in CBD office towers and domestic airports around Australia. The CBD tower screens had a reach of 1, 126, 007 viewers across 268 sites. The domestic airport advertising comprised 44 digital panels at six domestic airports, which had a reach of 2, 173, 077 viewers. Offline advertising continues in selected trade publications, while the campaign continues online, with website and social media marketing. All advertisements have sent consumers to the SecureBiz Quiz at
www.securebiz.com.au, where they complete a 10 question survey that generates a diagnostic based on the information submitted. These results encourage consumers to seek out a licensed security professional who is an ASIAL Member for expert advice. Meanwhile, we’ve been able to collect some interesting insights into how secure Australian businesses are. Some interesting insights so far include: • Around 70% of participants consider security to be an important or increasingly important part of their business. o However 43% of participants say they don’t have a security plan o And only 42% review their security needs on an annual basis • That’s despite 58% rating the level of risk they face as moderate to high and 53% saying they have experienced
security threats or incident/s • 57% of participants say they use a licensed security professional to meet their security needs, but concerning the other 43% say they o Don’t have any security systems o Do it themselves o Hire a local tradesman or handyman Data will continue to be collected until December 2016, with a full report on findings made available to members in early 2017. Meanwhile members providing security services to Australian businesses are encouraged to use the SecureBiz Quiz as a marketing tool.
Professional Courses Delivered By Internationally Experienced Canine Law Enforcement Experts. • •
Certificate III in Security Operations Guard Dog Handlers Course (1D)
• Security Dog Operations Course • Detection Dog Operations Course
W: dogforceaustralia.com.au
E: info@dogforceaustralia.com.au P: 0447 809 444
16 | JUNE 2016 | SECURITY INSIDER
Training available in NSW, Queensland and Tasmania RTO No. 41371 | NSW Police SLED Approved Training Organisation
INDUSTRY NEWS
IED GUIDELINES FOR PLACES OF MASS GATHERING The Improvised Explosive Device Guidelines for Places of Mass Gathering (IED Guidelines) have been released and were developed by the Australia-New Zealand Counter-Terrorism Committee (ANZCTC) to guard against the threat of IEDs. This information is designed to help governments and businesses protect Australians from the potential use of IEDs in places of mass gathering and to prevent, prepare for and respond to an attack. This information is not in response to any specific threat. While Australia’s threat level remains at probable – which means credible intelligence, assessed by our security agencies indicates that individuals or groups have developed both the intent and capability to conduct a terrorist attack in Australia – the incidents overseas highlight the need to be prepared.
The ANZCTC developed these IED guidelines over the last two years, based on international and domestic research and important lessons learned from international attacks. These guidelines supplement other publicly available national guidance developed by the ANZCTC, including the National Guidelines for the Protection of
Places of Mass Gathering from Terrorism and the second edition of the Active Shooter Guidelines for Places of Mass Gathering. These guidelines and other information on what business and the public can do to prevent, prepare for and respond to an attack are available on the National Security website at www. nationalsecurity.gov.au.
Close more sales Remove the upfront cost barrier
You can now offer clients:
$0 upfront – system & installation costs financed Instant approval and signing at point of sale Payments treated as operating expense* Fully tax deductible* * All applications to Security Lease are subject to normal approval criteria, and terms and conditions apply. No part of this document is to be construed as an offer capable of acceptance or as a solicitation to obtain a financial product. The information is not an expression of opinion or recommendation and does not constitute financial, accounting, taxation, general or personal advice and should not be relied upon as such. The recipient should make their own assessment of any product or service referred to in this document and seek appropriate advice.
For a free demonstration call us 1300 795 695
www.securitylease.com.au
SECURITY INSIDER | JUNE 2016 | 17
ADVERTORIAL
DON’T GET LEFT OUT IN THE COLD…
SEE THE LATEST INNOVATIONS AT THE SECURITY EXHIBITION
W
ith so many existing products and services in the market today, Executives are often left wondering which type of platform is the best fit and what to look for when considering a security solution. Organisations considering their security alternatives should be certain that the solution they choose: • easily integrates into existing systems; • allows mobile access for better responsiveness and control; • correlates data in real-time; and • incorporates helpful tools to create a smart, comprehensive strategy to ensure an organisation’s efficiency through managing and mitigating risk. As an organisation’s security needs change and evolve, so too should their solutions. Preparing for the future today will help ensure your security function is ready to meet the challenges of tomorrow. When it comes to security, proactive is always more efficient than reactive. So time spent finding the best solution is time saved fixing breaches and problems down
18 | JUNE 2016 | SECURITY INSIDER
the line. The Security Exhibition & Conference, which is returning to the Melbourne Convention and Exhibition Centre from July 20 - 22, connects a community of leaders and showcases the most innovative solutions to hit the Australian market, supporting the future direction of the security industry. With more than 170 brand leaders and 4,500 industry professionals from 20 countries in attendance it’s safe to say that your time spent at this year’s premier security industry event will help you get the job done. Due to popular demand live demonstrations will offer attendees the possibility for an interactive and tangible product experience. The live demonstrations will feature an exciting and diverse range of cutting edge technologies and equipment, from a vast host of exhibitors, which will address the growing demand for more sophisticated solutions. As the only event that annually that brings together the upper echelon of the security industry under one roof, the Security Exhibition also features the
renowned ASIAL Conference. Aimed at security end-users, offering a tailored education experience across three days, the conference program features a world class line up of expert speakers who will discuss strategies, present case studies and provide workshops to combat the changing security threats and challenges faced by business, government and the broader community. Find out more on page 10. Ultimately, the Security Exhibition & Conference presents an unmissable yearly opportunity to reunite you with your peers whilst discovering and experiencing the latest cutting-edge products and innovations to hit the marketplace. Visit www.securityexpo.com.au to find out more and register now. Use promo code INSIDE when registering.
RELATED ARTICLES Learn from security industry leaders, page 10 The security industry’s night of nights, page 12 Cybersecurity for the boardroom, page 24
THE ANNUAL REUNION FOR AUSTRALIA’S SECURITY INDUSTRY SOURCE
LEARN
NETWORK
1000’s OF PRODUCTS & SOLUTIONS
THE LATEST TRENDS & TECHNIQUES
WITH YOUR INDUSTRY PEERS
PRINCIPAL EXHIBITION SPONSOR
LEAD INDUSTRY PARTNER
ORGANISED BY
REGISTER ONLINE NOW SECURITYEXPO.COM.AU USE PROMO CODE INSIDE WHEN REGISTERING
2016 RECOGNISING EXCELLEN AWARDS FOR EXCELLENCE
AUSTRALIAN SECURITY
Organised by the Australian Security Industry Association Limited (ASIAL) and World Excellence Awards, the event is designed to be both independent and inclusive, providing an opportunity for outstanding performers, whether buyers or suppliers, to be recognised and their successes to be celebrated. Over the course of two decades the Australian Security Industry Awards for Excellence has provided recognition for hundreds of Australian security companies and individuals. The event also provides a chance to showcase the outstanding pool of professionals working within the security industry. For a second successive year, ASIAL will host its awards in collaboration with the Outstanding Security Performance Awards which form part of a global initiative with events in Germany, Norway, Poland, Romania, United Kingdom and United States of America. Once a core number of national OSPAs programmes are established it is World Excellence Awards intention to enter OSPA winners into a worldwide OSPA. In all countries the aim is to 20 | JUNE 2016 | SECURITY INSIDER
encourage security associations to come together to celebrate excellence and the outstanding performers in their country. In Australia this is no different. ASIAL is once again the lead partner and organiser. The other industry partners include ASIS, AISA and Security Professionals Australasia. Nominations will be assessed by an independent panel of judges chaired by an ASIAL representative, who does not vote in selecting a winner. The 2016 judging panel includes: • Damian McMeekin, Head of Group Security, ANZ Bank Damian joined ANZ in 2005 after working previously in the Australian Department of Foreign Affairs & Trade. He is on the Boards of the International Banking Security Association, International Security Management Association, the not-for-profits iDcare and Australian Security Medals Foundation. • Mark Edmonds, Manager, Security Capability, Sydney Trains Mark Edmonds has been with Sydney Trains for almost ten years, having previously been the Security
Risk Manager for Qantas Airways. He is currently responsible for improving security outcomes in Sydney’s rail network though the use of technology and business processes. • Chris Beatson, Director, NSW Police Force - PoliceLink Command Chris’s Command employs approximately 400 personnel, operates 24/7, 356 days of the year, and receives over 32,000 contacts per week. In 2014 Chris was awarded the prestigious International Crime Stoppers ‘2014 Civilian of the Year Award’ in Cape Town South Africa. • Vlado Damjanovski, CCTV Specialist, ViDi Labs Pty Ltd Vlado Damjanovski is an author, inventor, lecturer and closed circuit television (CCTV) expert based in Sydney, who is well known within the Australian and international CCTV industry. Through his company ViDi Labs he provides consultancy, design
AWARDS FOR EXCELLENCE
ENCE IN THE TY INDUSTRY The 21st annual Australian Security Industry Awards for Excellence and 2nd annual Outstanding Security Performance Awards provide a platform for exceptional security companies and individuals to be recognised. & project management, systemcommission, product testing, desk-top publishing and training. • John Adams, Editor, Security Electronics Magazine SEN’s editor John Adams has been covering the security industry since 1991, first as editor of Security Australia Magazine, then as editor of Security Electronics & Networks Magazine, first published in 1998. John provides a holistic and historical sense of electronic security technology, as well as considerable exposure in Australia and overseas. • Sean Giddings, Director of Security Operations, Australian Parliament House. Australian Security Industry Awards for Excellence categories • Individual Achievement – General Security • Individual Achievement – Technical Security • Individual Achievement – Security Student • Gender Diversity • Indigenous Employment • Special Security Event or Project (under $200, 000)
• Special Security Event or Project (over $200, 000) • Integrated Security Solution (under $200, 000) • Integrated Security Solution (over $200, 000) • Product of the Year (Alarms, Access Control, CCTV, Communication/ Transmission System) Outstanding Security Performance Awards categories • Outstanding In House Security Team • Outstanding In House Security Manager • Outstanding Contract Security Company (Guarding) • Outstanding Security Consultant • Outstanding Security Training Initiative • Outstanding Security Partnership • Outstanding Investigator • Outstanding Police / Law Enforcement Initiative • Outstanding Risk Management Solution • Outstanding Cyber Security Initiative • Outstanding Female Security Professional
Award nominations are now being accepted via www.asial.com.au. Any company or individual working in the Australian security industry is entitled to enter.You may nominate more than once in multiple categories. Detailed information on the criteria for each of the award categories along with the conditions of entry can be found at www.asial.com.au. Awards Ceremony and Dinner The awards will be presented at The Westin, in Sydney’s iconic Martin Place, from 7pm on Thursday 20th October 2016. Media personality James O’Loghlin will emcee the event.You may recognise James O’Loghlin from Good News Week, Rove Live, Sunrise, Lateline, The Evening Show and more than 300 episodes of The New Investors. For further information on the event visit www.asial.com.au. Thank you to our Lead Dinner Sponsor:
SECURITY INSIDER | JUNE 2016 | 21
19335_ASIAL A4 PROGRAM.ai
1
24/05/2016
5:31 pm
ASIAL Individual Professional Recognition Program An individual recognition program for security professionals committed to the highest standards.
Setting the benchmark for security professionals.
The ASIAL Individual Professional Recognition program sets the benchmark for security professionals looking to progress their careers and to be recognised by employers, peers and clients. Individuals who meet the entry criteria are eligible to receive the post-nominal credential of either MASIAL, AFASIAL, FASIAL or FASIAL (Life). Post-nominals provide a clear picture of an individual’s security experience and capability, a commitment to practice in accordance with the highest professional and ethical standards and a strong affiliation with the Association. Four levels of post-nominal recognition are available: • Member – MASIAL – 3+ years industry experience – someone who is looking to grow and develop their career in the security industry. • Associate Fellow – AFASIAL – 10+ years industry experience – a security professional committed to developing their professional skills and advancing the industry as a whole. • Fellow – FASIAL – 20+ years industry experience – an experienced and respected industry leader who has contributed significantly to the growth and development of the industry. • Life Fellow – FASIAL (Life) – awarded to individuals who have provided distinguished service to the industry.
ASIAL Post Nominals can be used on your email signature block, on business cards, in resumes or in other formal correspondence, and all eligible members are encouraged to display them proudly. How does the program work? Successful applicants need to meet the eligibility criteria to participate in the program. These include educational qualifications, security industry experience, professional achievements, individual membership of ASIAL and adherence to the ASIAL Code of Professional Conduct. Who can participate? Anyone committed to pursuing a career in the security industry. What’s in it for me? In a word – Recognition. Employers and clients will see you for what you are – qualified, experienced and professional. Participation in the program will differentiate you from others in the industry and demonstrate your commitment to ongoing professional development to maintain your competitive edge. Participation in the ASIAL Individual Professional Recognition Program shows you are a security professional recognised by your peers for the experience and qualifications you have attained. It is a benchmark of your expertise and a measure of your career progress.
What’s in it for employers? As an employer, when you hire an individual participating on the ASIAL Individual Professional Recognition Program, you are selecting a candidate whose skills and experience have been assessed against professional standards set by the security industry’s peak national body – ASIAL. The program provides a valuable measure of an individual’s expertise and capability. How do I apply? Read through the criteria to see whether you meet the eligibility criteria. If you do, then complete the application form and provide evidence of your achievements that includes, a resume or CV, copies of certificates/evidence of your education qualifications, written recommendations, along with evidence of your experience working in the security industry. If you do not meet the eligibility criteria, for example you are a recent entrant to the industry with less than 3 years demonstrated security industry experience, you can apply to become an individual member of ASIAL. Once you are able to meet the eligibility criteria you can then apply to enrol on the ASIAL Individual Professional Recognition Program.
To enrol in the program go to www.asial.com.au/professional
19335_ASIAL A4 PROGRAM.ai
2
24/05/2016
5:31 pm
ASIAL Individual Professional Recognition Program Recognition Level/Post Nominal
Cost
Eligibility Criteria
(incl. GST)
(applicants must satisfy the criteria specified below)
Benefits
MEMBER MASIAL
$195.00 per year
• Evidence of a minimum of three years demonstrated security industry experience in an operational, consultancy, technical or management capacity; • Two current letters of recommendation from an employer/client; • Qualification of a Certificate III or higher; • Where an individual is not the holder of a current security licence, a current National Police Check is required; • Fulfilment of the ASIAL Individual Professional Recognition Program Continuing Professional Development requirement of 12 points per year; • Adherence to the ASIAL Code of Professional Conduct.
• Use of the post-nominal credential – MASIAL – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development activities; • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Visual identifiable recognition through a lapel pin displaying your recognition level; • Access to an online community of MASIAL members.
ASSOCIATE FELLOW AFASIAL
$215.00 per year
• Evidence of a minimum of ten (10) years demonstrated security industry experience in a senior operational, consulting, technical or management capacity; • Two current letters of recommendation from an employer or client; • Qualification of a Certificate IV/Diploma or higher level; • Where an individual is not the holder of a current security licence, a current National Police Check is required; • Fulfilment of the ASIAL Individual Professional Recognition Program Continuing Professional Development requirement of 12 points per year; • Adherence to the ASIAL Code of Professional Conduct. • Evidence of contribution to advancing the security industry which can include, but is not limited to, activities such as presenting/lecturing, writing and contributing to academic papers, participation on standards development/industry committees or advisory groups.
• Use of the post-nominal credential – AFASIAL – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development. • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Visual Identifiable Recognition through a lapel pin displaying your recognition level; • Access to an online community of AFASIAL members.
$235.00 per year
• Evidence of a minimum of 20 years demonstrated security industry experience in a senior operational, consulting, technical or management capacity; • Three written references / testimonials from senior executives, specifically supporting the application for fellow and addressing the criteria of the nominee’s security expertise, demonstrated service and commitment to the security community; • Qualification of a degree or higher qualification*; • Where an individual is not the holder of a current security licence, a current National Police Check is required; • Fulfilment of the ASIAL Individual Professional Recognition Program Continuing Professional Development requirement of 12 points per year; • Adherence to the ASIAL Code of Professional Conduct. • Evidence of contribution to advancing the security industry which can include, but is not limited to, non-work related activities such as presenting/lecturing, writing and contributing to academic papers, participation in standards development, mentoring, participation on industry committees or advisory groups.
• Use of the post-nominal credential – FASIAL – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development activities; • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Visual Identifiable Recognition through a lapel pin displaying your recognition level; • Access to an online community of FASIAL members.
(includes Individual annual Membership fee) plus one off application fee of $65.00.
(includes Individual annual Membership fee) plus one off application fee of $65.00.
FELLOW FASIAL
(includes annual Individual Membership fee) plus one off application fee of $65.00.
LIFE FELLOW FASIAL (LIFE)
No annual fee is payable.
The Board of ASIAL may, at any time by resolution, invite a person to become a Life Fellow on the grounds of their distinguished service to the industry and the Association. In order to be eligible the individual must have been a Fellow of the Association for at least 5 years. Life Fellows are not required to undertake the ASIAL Professional Recognition Program professional development requirement.
*individuals who do not possess a degree or higher qualification but who can provide demonstrated evidence of 30 years + security industry experience in a senior operational, consulting, technical or management capacity are eligible to apply as a Fellow.
• Use of the post-nominal credential FASIAL (Life) – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development activities; • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Access to an online community of FASIAL members.
Raising the level of professionalism and expertise in the security industry. To enrol visit www.asial.com.au/professional
CYBERSECURITY
CYBERSECURITY FOR SENIOR EXECUTIVES g
By Arno Brok, CEO, Australian Information Security Association Limited (AISA)
Technology has revolutionised how many of us live and work. The internet, with its three billion users, is powering economic growth, increasing collaboration and innovation, and at the same time creating jobs. Reliance on technology is rapidly increasing as Australian businesses adopt more digital services to provide simpler and faster services. Now, users expect high quality services that also assure security of their information.
C
ybersecurity is becoming a key topic for many organisations and executives. The threat landscape has evolved significantly over the past 20 years due to the increased use of technology as well as the shift from physical to virtual computing. A recent study found that 80% of the total value of Fortune 500 companies consists of intellectual property (IP) and other intangible assets. Organisational risks associated with cybersecurity challenges have evolved to include traditional threats by ‘old school’ hackers taking systems down, to a more modern view with a bigger impact. Many organisations have conducted a threat assessment and have an educated focus on how the loss of Intellectual Property (IP) and Personally Identifiable Information (PII) can impact their business, through the destruction or alteration of corporate data; negative impact in public confidence; harm to reputation and branding; disruption to critical infrastructure; and organisations are
24 | JUNE 2016 | SECURITY INSIDER
now thinking about how the new legal/ regulatory sanctions could affect them both legally and financially. Each of these risks can adversely affect competitive positioning and shareholder value as well as public confidence and trust in the market. Protecting key information assets is critically important to the sustainability and competitiveness of businesses today. Organisations and agencies need to be at the forefront of cyber preparedness and resilience. Cybersecurity is all too often thought of as an IT issue, rather than a strategic or operational risk-management issue. Some organisations and departments feel that because they are relatively small or don’t hold substantial amounts of sensitive consumer data, such as credit card numbers, PII or medical information, that they are unlikely to be the victims of a cyberattack. In fact, cybercriminals target organisations of all sizes and across a range of industry verticals (e.g. health, education, defence, manufacturing, services and finance) seeking anything that might
be valuable, that can be monetised or to simply gain access to another organisation along the supply chain. Historically, many organisations and agencies have categorised information security as a technical issue to be managed by the IT department. This misunderstanding is fed by siloed organisational structures, leading to the view that the responsibility for data resides within IT rather than the business as a whole. As a consequence, the typically resourcestrapped IT department is left to address the security challenges from both a people and/or funding perspective. Furthermore, deferring responsibility to IT inhibits critical analysis and communication about cybersecurity issues and hampers the implementation of effective security strategies. Cyber risks should be evaluated in the same way an organisation assesses all other risks such as physical security of its users and physical assets and the risks associated with their potential compromise. In other words,
CYBERSECURITY
cybersecurity is an enterprise-wide risk-management issue that needs to be addressed from a strategic, cross-departmental and economic perspective. Businesses benefit from managing risks across their organisations, drawing effectively on senior management support, risk management policies and processes, a risk-aware culture and the assessment of risks against objectives. There are many benefits to adopting a risk-management approach to cybersecurity, including: • Strategic benefits: organisational decision-making is improved through the high visibility of risk exposure, both for individual activities and major projects, across the whole of the organisation; • Maintaining community and customer loyalty and trust; • Financial benefits: providing financial benefit to the organisation through the reduction of losses and improved ‘value for money’ potential; and • Operational benefits: organisations are prepared for most eventualities, being assured of adequate contingency plans. The impact of cybersecurity incidents can be far-reaching. Recent high profile incidents show that cyberattacks can strike an organisation’s financial
performance and also inflict unquantifiable reputational damage. The reputational damage to public services will often result in the loss of trust in organisation and their capability to offer secure services to their users. No one is immune. Large and small companies as well as individuals are at risk. As a result, boards and management are being called upon to address cyber risk alongside other risks that face businesses. This means Australian businesses should start to take steps to increase their awareness and understanding of cybersecurity with a view of the potential impact on overall business performance.
So what should CEOs, senior executives, board members and directors do? A primary responsibility of every board of directors is to secure the future of its organisation. The very survival of the organisation depends on the ability of the board and management not only to cope with future events, but to anticipate the impact those events will have on both the company and the industry as a whole. Forty-one per cent of respondents to a recent survey of Australian security professionals believed that the CEO should hold ultimate responsibility for
breaches, with only 6% believing it should be the responsibility of the Chief Security Officer (CSO). Therefore, cybersecurity is one such topic for which businesses must demand information and insight. The overwhelming number of cybercrime incidents has forced organisations to become more educated about the topic and ask strategic and thoughtful questions directed toward management and internal auditors. Some of the highest profile data breaches to date have had little to do with traditional hacking. For example, spear phishing, a common e-mail attack strategy that targets specific individuals, is a leading cause of system penetration. Product launches or production strategies that use long, international supply chains can magnify cyber risk. Similarly, mergers and acquisitions (M&A) requiring the integration of complicated systems, often on accelerated timelines and without sufficient due diligence, can increase cyber risk. Another obstacle organisations face in creating a secure business environment is interconnection with its partners, suppliers and affiliates to deliver services or products to customers. This can be seen in many of the recent breaches highlighted in the SECURITY INSIDER | JUNE 2016 | 25
CYBERSECURITY
media, where too often, the breach did not actually start within the target company’s IT systems, but through vulnerabilities in one of their vendors or suppliers. Organisations are often interconnected with elements of the national critical infrastructure, raising the prospect of corporate insecurity becoming a matter of public security or even affecting national security. As a result, boards should ensure that management is assessing cybersecurity not only as it relates to the organisation’s own networks but also with regard to the larger ecosystem in which the organisation operates. Progressive boards and councils will engage management in a discussion of the varying levels of risk that exists in the organisation’s ecosphere and take them into consideration as they calculate the appropriate cyber risk posture and tolerance for their own organisation or department. Organisations should also understand what ‘crown jewels’ the organisation should protect and ensure that management has a protection strategy that builds outward from those high-value targets. The board should guide management to consider not only the high-probability attacks and defences, but also low-probability, high-impact attacks that would be catastrophic.
Cyber risk oversight responsibility at the board level Organising the board to manage the oversight of cyber risk and more broadly, enterprise-level risk oversight is a matter of considerable debate. We see a large percentage of boards continue to assign the majority of tasks related to risk oversight to audit committees. We strongly believe that risk oversight should be allocated to the full board and not the audit committee. Therefore, chairs of boards, board executives and directors need to understand and approach cybersecurity not just an IT issue but also as an enterprise-wide operational riskmanagement issue.
Identifying the company’s ‘crown jewels’ 26 | JUNE 2016 | SECURITY INSIDER
Executives should engage management in a discussion of the following questions on a regular basis: • What are the organisation’s most critical data assets (what are our ‘crown jewels’)? • Where does it reside (one or multiple systems, internally or externally)? • How is it accessed and by whom? • How is it protected (what controls and how often are those controls assessed)? • What dependencies are there on suppliers or vendors (3rd parties)? • What is the organisational plan if the data assets are compromised (destroyed or stolen)? IT departments will implement security controls based on their best knowledge of the systems they manage on behalf of the business or agency. These departments are often too far removed from the business or agency to have a comprehensive understanding of what are the most critical data assets. Many IT departments apply their limited resources to keeping the lights on, rather than focusing on cybersecurity. It is therefore imperative not to relegate the cybersecurity topic to the IT department. Councillors and Directors need to take an active role in the organisation’s cybersecurity, or face the possibility of potential lawsuits and even the possibility of being removed from their position. Only by working collaborating with the IT Department will Executives and Risk Managers gain an understanding of: • data assets within the organisation; • appropriate security controls required to protect the data asset; • resources (people and funding) required to adequately implement, manage and monitor security controls.
Cyber mastery in the boardroom Despite the significant escalation of risks posed by the use of technology, many boards have found it challenging to develop a comprehensive response. Generally, IT expertise is lacking at the board level. Recent studies revealed that more than three quarters of public
company respondents admitted that they personally could use more IT knowledge, and almost 90% felt their board’s IT knowledge could be improved. Notably however, a demand for IT experience generally has not surfaced in director recruitment. Apart from the IT industry, which has an above-average need for directors with IT expertise, this area of expertise was viewed as ‘most important’ for just 7.8% of directors of companies recruiting in 2013. How much knowledge is enough? Lack of boardroom expertise makes it challenging for directors to effectively oversee management’s cybersecurity activities. Without sound knowledge of, or adequate sensitivity to the topic, our most senior leaders cannot easily draw the line between oversight and management. The board may overly rely on C-suite experts, such as the chief information officer (CIO), chief technology officer (CTO), or chief security officer (CSO), who can lead the dialogue into technical areas beyond the realm of oversight. Once ‘in the weeds’, directors can find it difficult to assess the appropriate level of involvement in risk management. A lack of technical comprehension, or even inadequate planning by management for board meetings to discuss cybersecurity, can easily result in poor communication and information sharing from the C-suite. Are directors adequately equipped to understand the information they receive from management? Are organisations confident that their boards possess a director with the necessary expertise to provide effective oversight in regard to cybersecurity? Generally, directors are significantly less likely to challenge what is presented at board meetings when they lack knowledge of the topic. In the face of this real and urgent threat to oversight, should directors be experts in cybersecurity? AISA’s view is that directors should have the basic cybersecurity knowledge to ask management suitable questions when it comes to determining the organisations risk exposure. In many boardrooms the rapid rise of cybersecurity has often left directors struggling to find the balance
CYBERSECURITY
between the necessary comprehension and expertise.
The ‘people’ component Leading practices and policies surrounding cybersecurity are rendered ineffective if employees are not trained in their use. Cybersecurity at its core is a human issue. Too often the biggest problems are caused by an unintended employee clicking on a link or opening an infected attachment or leaving highly confidential information in a public area. In effect ‘people are the constant weakness’. Their actions are frequently the result of careless behaviour rather than malicious actions. In my discussion with directors of various organisations, they repeatedly emphasised the need for ongoing training and consistent implementation of appropriate procedures in order to embed cybersecurity awareness into the organisation’s culture at all levels. Data privacy and cybersecurity should be part of the organisation’s brand. Having cyber-aware staff is an important line of defence and could be more effective than a technology security perimeter. Although many technologies will prevent the delivery of a large number of threats from reaching individual employees, there is always a risk that an unidentified threat could reach employees and there is no technology that can prevent users from opening these unidentified links or files. As a consequence adversaries use flaws in human behaviour to easily trick the average user time and time again. Once clear standards and practices are established, companies must focus on employee education and awareness. A strong communications program that heightens the overall awareness of cyber risk greatly complements strong technical security controls (e.g. firewalls, antivirus, antispyware, and web-filtering
technology). To reduce the negative impact of cyber threats on the business, all employees should understand how the organisation’s commitment to security translates into specific policies and required procedures, avoid risky behaviour and respond quickly once an incident has been detected. Employees across the organisation should have at least some foundational training that covers the purpose and importance of cybersecurity. In addition employees should also have an understanding or appreciation of how they can be tricked by unauthorised users or cybercriminals. This will help them to understand the benefits of implementing cybersecurity controls that are not technical in nature.
Cyber resilience Once organisations accept that cyberattacks will be made against their organisations and will be successful, they can move to the next step: becoming more cyber resilient. As stated by APRA: “Cyber resilience is the ability to prepare for, respond to and recover from a cyberattack. Resilience is more than just preventing or responding to an attack, it also takes into account the ability to operate during, and to adapt and recover, from such an event” Although this is targeted at APRA’s
regulated population, to support investor and financial consumer trust and confidence, AISA feels that similar basic cyber hygiene should be applied by all organisations and the right place to start is in the boardroom.
In conclusion Managing cybersecurity risk requires informed decision making throughout the organisation or agency, based on reliable insights and intelligence. The tone of cybersecurity has to be set by the board and executive management. Unfortunately, as in a majority of cases, speed of change has taken place in technology and cybersecurity risks are commonly least understood by the board and executive management. Cybersecurity will continue to pose a serious risk that executives (chairs of boards and board directors) need to actively measure and continuously monitor as part of the organisation’s overall strategy. The questions outlined in this article should be used to initiate discussions with management as the onus is on the executives to take its strategic role seriously in: providing oversight, implementing a robust cybersecurity resilience plan and ensuring that plan becomes a necessary line of defence in cybersecurity governance.
Arno Brok will deliver a presentation titled ‘Cyber Security for the Boardroom’ as part of the ASIAL Security Conference, being held from 20-22 July at Melbourne Convention and Exhibition Centre. This session will provide tools to ask those pertinent questions and start the dialogue to identify the balance between security and ease of usability within an organisation’s IT structures. More information on speakers, sessions and how to register your attendance at the ASIAL Security Conference can be found on page 10.
About the author Arno Brok is the first CEO to be appointed by the AISA Board of Directors. Having proven himself as a leader within AISA, Arno shares the Board’s vision to continue delivering value to members, the community, and the industry. Arno has been an executive with AISA since 2008 and in the role as National Director since December 2013. Arno’s experience within AISA is supported by considerable commercial experience, most recently as Director of Information Security, Audit and Advisory firm Protiviti, and in similar positions at BAE Systems, Deloitte and Accenture. SECURITY INSIDER | JUNE 2016 | 27
WORKPLACE RELATIONS
EMPLOYMENT
CONTRACTS WORTH THE EFFORT? g
By Chris Delaney, ASIAL Industrial Relations Advisor
At ASIAL we get many enquiries about employment contracts. Unfortunately these are often after something has gone wrong in the employment relationship and there is a dispute about the terms of employment. Disputes are much more easily resolved if a well-crafted employment contract was agreed at the recruitment stage. Here Chris Delaney discusses employment contracts, Confidentiality and Restraint Clauses for your businesses. Properly constructed and written employment contracts are essential in setting the ground rules of the relationship between the employer and the employee. Combined with the Fair Work Act 2009 (Cth) (the Act), the National Employment Standards (NES) and the Modern Award provisions, well crafted agreements also limit risk for employers and provide probative assistance when resolving workplace disputes. Like with any contract, the law requires certain conditions to be met before it will recognise an employment contract. These include: • An offer of employment which has been accepted by the prospective employee; • Each party must provide 28 | JUNE 2016 | SECURITY INSIDER
consideration in return for the obligations undertaken by the other party (wages, labour); • There must have been intention by the parties to enter into a legal relationship; • The parties must be capable of entering into a contract; and • The agreement must be clear and comprehensive. In developing employment contracts there are many areas an employer must consider to include, such as: • Name of employer (full name and ABN or ACN) and employee • Position Title • Commencement date • Type of employment (full-time, part-time or casual) • Classification (if under a modern award) • Hours of work • Confidential Information • Restrictions on working for other employers • Flexibility Agreements • Wages and Salary details, including any entitlement
to bonuses or commission payments • Allowances, Equipment provided and work related expenses • Leave entitlements • Probation period • References to Position Descriptions, Policies and Procedures, NES, Award or Enterprise Agreement • Termination and/or Redundancy provisions • Notice periods • Restraints This list is not comprehensive, as many terms will depend on the role and nature of the employment relationship, and may need to be supported by the legislation that affects employment arrangements.
Factors To Consider When Paying Aggregated Wages or Annualised Salaries • Is there a “set-off” clause in the employment agreement that will allow some award conditions, allowances, or leave loading to be covered by the over award
WORKPLACE RELATIONS
component if the salary? • Does the Flexibility Agreement (FA) clause in the Award or Enterprise Agreement allow FAs to be made about the payment of overtime, penalty rates and allowances? • Is the employee covered by an award, which provides for annualised salaries? • If the arrangement is pursuant to an employment contract or award provision, is the annual salary sufficient to compensate the employee for all of their entitlements – does it pass the BOOT? (Is the employee “better off overall” than if the Award and or NES were applied?)
Making variations to the contract of employment • In the case of employees covered by a modern award consultation will be necessary. • Does the employment contract provide for variations in work or type of work? • Do you have a term in your employment contract that states the terms of the contract continue to apply regardless of changes to an employee’s position, wage/salary and location?
Termination Provisions in the Contract Minimum notice periods are set by the NES. In the absence of a defined notice period, particularly with more senior employees a court may decide on “reasonable” notice upon termination. This may vary from case to case, however, for senior or executive employees, this could be something far greater than the minimum periods set out in the Act and NES; in some cases Courts have determined that 12 months notice or salary in lieu of notice will be considered reasonable.
When determining the appropriate notice period consider: • What type of employment agreement is it (fixed term, maximum term, permanent or casual)? • How much notice do you want the employee to give you if he/ she resigns? • Does the employer have to give the same notice? • Is less notice required in the probationary period?
Include bonus and commission • These may be a clause in the contract or a separate letter. • Conditions, KPI’s, Sales targets should all be clear and unambiguous. • Calculation should be simple. • Eligibility should be only while in employment with the company. • There should be an opportunity to review and change at the discretion of the employer. • Is superannuation included in the amount or do you have to pay superannuation on top of the bonus/commission?
Drafting a restraint clause • The clause should clearly identify the employer and should be varied if there is a name change, transfer of business or takeover. • Ensure all clauses make sense. The periods of restraint and geographical areas for various acts should be relevant and reasonable. • Include an acknowledgement that the restraint(s) and the reasons for them are necessary and reasonable. • Competitors should be clearly defined and/or specifically identified. • Consider what kind of postemployment restraint would provide a reasonable protection
for the business.
Defining what is “Confidential Information” What is confidential information? The legal definition of “confidential information” is in most instances too vague. You need to determine what is confidential for your business and what you want/need to protect. Answering the following questions will assist in developing an enforceable confidentiality clause: • How widely is the information is known in the public domain? • How much the information was known by employees and others within the organisation? How much time and resources have gone into developing the information? • Is the information something that others may already have or is it unique to your organisation? • Is access to the information protected and if so how strongly? • Is the information of to the organisation and its competitors?
What should be in a Confidentiality Clause? Ideally you should have a contractual term that sets out what information is confidential and prohibits employees from misusing the information. If there is specific information or there certain documents that you want to protect, then describe them in the contract. This might not always be possible, things change, so it will still be necessary to have a properly constructed universal clause that will prevent the use and disclosure of confidential information. Any and all of your trade secrets (if developed by your organisation), will be confidential. Your client lists, pricing or costing data, contact lists (stored electronically on a SECURITY INSIDER | JUNE 2016 | 29
WORKPLACE RELATIONS
company device are arguably yours, so it is best to ensure this is specifically stated in the contract of employment. Courts have, depending on their content, excluded diaries from the confidentiality restrictions.
Avoiding Confidentiality and Restraint Breaches Remedies for breaches of restraint and/or confidentiality clauses can be difficult and time consuming. Worse than that, the information you sought to protect has already been taken and used. An injunction and compensation might be accessible but often the damage to the business has already been done. When key employees are leaving
your business you should move quickly to protect your intellectual property. The following should enable you to introduce simple strategies that should overcome the need for you to resort to legal action: • Contact your customers as quickly as possible during the employees notice period, let them know the changes that are occurring and secure their commitment to your business. If you neglect the customer at this time you could lose them. • In some instances (where there is a long notice period) it may be appropriate to consider sending the employee on “gardening leave”. • Meet with the exiting employee
and reinforce their post employment obligations in a positive way. • Document the meeting and follow up by formal letter identifying the clauses relevant to confidentiality and restraint in the employment contract. • Send another letter on termination and include a reminder about the restraint, and • Write to the new employer advising them of the employees’ restrictions and postemployment obligations. ASIAL can assist members in drafting employment contracts, confidentiality agreements and all policies necessary for the professional running of your business.
*Chris Delaney is ASIAL’s Industrial Relations Advisor. He can be contacted at ir@asial.com.au Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations specialist.
Teach your trade
30 | JUNE 2016 | SECURITY INSIDER
Flexible employment
Collaborative environment
the peak body for security professionals.
emPOWERing security professionals since 1969 Chat to us while recharging your smart device at Stand B6, Near Express Entrance Bay 16, Door 8.
#ASIALpower
ADVERTORIAL
What the Federal Budget means for Super g
By Georgina Williams, Group Executive Engagement, Advocacy and Brand, AustralianSuper
There were quite a few changes to super proposed in this year’s Federal Budget. AustralianSuper is one of the largest super funds in Australia, managing more than $95 billion on behalf of 2.1 million members. AustralianSuper Group Executive Engagement, Advocacy and Brand, Georgina Williams explains some of the key changes.
WHAT ARE THE CHANGES FOR LOW INCOME EARNERS? Under the current rules, people who earn less than $37,000 a year, receive a Low Income Super Contribution (LISC) of up to $500. This helps to offset the 15% tax low income earners pay on their before-tax super contributions. The LISC was due to be removed next year, but has now been reinstated and will become known as the Low Income Super Tax Offset from 1 July 2017. The Government has also extended the offset for spouse contributions. From 1 July 2017, you could be eligible for a low income spouse offset if you make contributions to your spouse’s super and they earn up to $40,000 a year (previously $10,800) and are under 75 years old. The offset is capped at $540 a year.
WHAT SUPPORT IS THERE FOR PEOPLE WHO TAKE BREAKS FROM THE WORK FORCE? People who have less than $500,000 in super, can make catch-up payments to their super if they haven’t reached their $25,000 a year limit over a rolling five year period (the cap for pre-tax super payments has been reduced). This means they can make higher payments from their pre-tax pay when they’re working to help them grow their super. This is great for women, 32 | JUNE 2016 | SECURITY INSIDER
part-time workers and carers whose super balances often fall behind when they take a career break.
SO, HOW MUCH CAN YOU CONTRIBUTE TO SUPER? From 1 July 2017, the most people can pay into super from their beforetax pay at the concessional 15% tax rate will be $25,000 a year. This includes employer and salary sacrifice contributions and is the same for everyone regardless of age. From 1 July 2017, anyone under 75 can claim a tax deduction for personal payments they make to super up to $25,000. This limit also includes employer contributions. A 15% contributions tax apply. There will also be a lifetime limit of $500,000 on how much people can add to super from after-tax sources. This change is effective from 3 May 2016, and applies to any after-tax payments made since 1 July 2007.
CAN PEOPLE STILL USE A TRANSITION TO RETIREMENT STRATEGY? Yes, you can still use transition to retirement if you’re 56 or over to work less or save more. At the moment, people don’t pay any tax on their investment earnings on money in their income accounts. From 1 July 2017, investment earnings in TTR income accounts will be taxed at 15% until you permanently retire. The new pre-tax contributions caps can also impact TTR members if they’re using this strategy to add more to their super. From 1 July 2017, the most you can add to your super from your pre-tax pay is $25,000 regardless of age. It’s important to note that these changes will need to be passed to become law. We’ll be keeping members updated on any changes, particularly with the federal election coming up. You can find out more about these changes at australiansuper.com.
Run only to benefit members
“AustralianSuper’s size and stability are important to me.” Michael, AustralianSuper Member
AustralianSuper looks after $95 billion* for 2.1 million members. How much better off could you be? Go to australiansuper.com/compare To join, call 1300 300 273
* As at 31 December 2015. Prepared in March 2016 by AustralianSuper Pty Ltd ABN 94 006 457 987 AFSL 233788 the Trustee of AustralianSuper ABN 65 714 394 898. Consider whether AustralianSuper is appropriate for you. Read our Product Disclosure Statement, available at www.australiansuper.com/FormsPublications or by calling 1300300 273, before making a decision about AustralianSuper. Statements made by AustralianSuper members have been reproduced with the members’ consent.
ASIAL NEW MEMBERS
WELCOME TO OUR NEW MEMBERS ASIAL is pleased to welcome the following members who have recently joined the Association. PROVISIONAL CORPORATE MEMBERS
Redfish Technologies Pty Ltd
Israil Zahida Begum t/a Holler Security
Safeguard Protection Group Pty Ltd
Services
Aim Communications Pty Ltd
SDC Solutions Pty Ltd
Lispas Enterprises Pty Ltd t/a Lispas
Aus Watch Protective Services Pty Ltd
Security Data Communications Pty
Security Services
Austral Marshals & Protection
Ltd
MCM Electronics Pty Ltd
Management Pty Ltd
Security International Solutions Pty
NPS Security Pty Ltd
Beauchamp Security Pty Ltd
Ltd
OPEC Systems Pty Ltd
Ben Shapardon t/a Peninsula Security
Sequoro Security Services Pty Ltd
OPI Holdings Pty Ltd t/a Ozland
Services
Starcare Security Services Pty Ltd
Security Services
Black Scorpion Security Services P/L
Steadfast ICT Security Pty Ltd
PKR Security Pty Ltd
Brendon Purdom t/a On Point Security
Thinkbox Solutions Pty Ltd
Quantum Vision Pty Ltd
& Investigation
Trinity Corporate Services Pty Ltd
Red Scorpion Security Pty Ltd
Curtis Jelle Pty Ltd t/a Sentry
Wilson Aviation Services Pty Ltd
Secure Watch Security Solutions Pty
Solutions
Ltd t/a Secure Watch Security
Damien Kaufline t/a Automate Smart
CORPORATE MEMBERS
South Coast Security
Home Solutions
Linkbox Technology Pty Ltd
Communications & Electrical Pty Ltd
Fastsec Pty Ltd
Luke Daniel Casey t/a V-TEC
Sub Protection Services Pty Ltd
Fire & Security Services TSV Pty Ltd
Electronics
Yao Wang t/a Auspalmy Consulting
t/a Fire, Security & Marine
Marke Joel Isacowitz
Fire and Safety Australia Pty Ltd
Ozwide Skills Training Centre Pty Ltd
JAM Squared Pty Ltd t/a Mengels
Star Training Academy Pty Ltd
Mongrels
ASIAL MEMBER RECOGNITION PROGRAM The ASIAL member recognition
Leigh Fusion t/a Sophisticated
CORPORATE UPGRADES
program acknowledges longstanding
Electrical Services
AApex Protection Group Pty Ltd
association members. Recognition
Marshal Security Services Pty Ltd
Attila Nagy t/a P & G Security
categories include Platinum (25
Millennium Hi-Tech Holdings Pty Ltd
Ausguard Pty Ltd
years+), Gold (16-24 years), Silver (11-
Milligan Security Pty Ltd t/a Southern
Baseline Security Pty Ltd
15 years) and Bronze (6-10 years).
Cross Protection Darling Downs
Brett Reginald Kemp t/a Electrolite
N7 AUS Pty Ltd
Crete Security Pty Ltd
GOLD
Ossietech Pty Ltd
DHG Security Sales and Services P/L
Access Electronics Australia Pty Ltd
P Dhir & Sons Pty. Ltd. t/a A to Z
Elite Protective Security Services Pty
ARA Security Services Pty Limited
Corporate Security Services
Ltd
Australian Cash in Transit Security Pty
Phocus Services Group Pty Ltd
Emizon Pty Ltd
Ltd t/a Davlin Security Group
Proex Security Pty Ltd
Golden Security Group Pty Ltd
Australian Public Address
34 | JUNE 2016 | SECURITY INSIDER
ASIAL NEW MEMBERS
Welcome to the following members Brighton Security Services Pty Limited
Safe Alarms
Access Group Solutions Pty Ltd
David Warren Hathway t/a Citicom
Adrian Leslie Samways
Solness Electric Pty Ltd t/a Soltronic
Communication Services
AD-Tech Security Pty Ltd
Systems
Energize Australia Pty Ltd
Joe Tuck-Milekovic t/a Metro Security
Ramstop Pty Ltd
Hide Away Safe Securities Pty Ltd
Agency
Huxley Hill & Associates
Quality 1 Security Services Pty Ltd
SILVER
Jagged Futures Pty Ltd t/a JAG
ADACS Systems Pty Ltd
Abeltek Pty Ltd
Security & Communications
Alan Goltz
Accord Security Pty Ltd
Joe Tuck-Milekovic t/a Metro Security
Metropolitan Watching Pty Ltd
Bankso Pty Ltd t/a System Security
Agency
G & G Sutherland Pty Limited t/a
Bargoon Pty Ltd t/a Pantac Protective
John Derek Security Pty Limited t/a
Centron Communications & Security
Services
JD Security
Defender Alarms Pty Ltd t/a National
Commercial Surveillance Systems Pty
Joseph Tony Tadros
Electronic Security
Ltd
LAPS Security Pty Ltd
Burnside Security Pty Ltd
David Allan Strauss t/a Blanket
Pallal Holdings Pty Ltd t/a Melcris
Boston Security Services Pty Ltd
Security
Security
Home Security Group Pty Ltd
Garry Raymond Gillard t/a Gotcha
Pedro Benitez t/a Alma Aus Securities
Cottrell Timothy J & Vicki A t/a Tri Star
Security Services
Securacore Pty Ltd
Security
Hillstone Holdings Pty Ltd
Specta Security Service
Brizan Pty Limited
NCA Consulting Pty Ltd
Stephen Piniotis t/a Inter City Security
Pacer Electronics Pty Ltd
Neil Andrew Kelly t/a Digital Video
Services
Lazer Security
Management Services
Sycon Security Consultants Pty Ltd
Perisher Security Pty Limited
Sam Saba t/a Saba Security Services
Techquality Enterprises Pty Ltd
E.L.K. Security Pty Ltd
Shiatsu Pty Ltd t/a Griffins Leading
Triple R Corporation Pty Ltd
Don Hodge Security Services Pty Ltd
Edge HI FI & Communications
Oxley Electronics Pty Ltd
Herbert & Violet Payne t/a H W & V A
Southern Cross Group Services Pty
Onyx Security Pty Ltd
Payne
Ltd
Peter Warren Automotive Pty Ltd
CIT Solutions Pty Limited
Zaytex Security Monitoring and
Byron Clapham t/a Farrer Security
Surfdish Pty Ltd
Services Pty Ltd
Service
BJ Security & Investigations Pty Ltd
Australian Security Brokers Pty Ltd
AMC Consulting Services Pty Ltd t/a
Techquality Enterprises Pty Ltd
Robinette Pty Limited t/a Regal
MCC Security
Peter Siman t/a ACAM CCTV
Security Systems
Secureme Group Pty Ltd
Special Squad Pty Ltd
S L Security Pty Ltd
P M Securities Pty Ltd
KES Pty Ltd
Nobile Protective Services Pty Ltd
Comvision Pty Ltd
Brink’s Australia Pty Ltd
Total Security Management
Secta Pty Ltd
PM Security and Data Pty Ltd
Platinum Security Systems Pty Ltd
Electron Appliances Pty Ltd
Statesman Security Services (NSW)
Stephen Piniotis t/a Inter City Security
Mibyte Technology (Aust) Pty Ltd
Pty Ltd
Services
Selec Developments Pty Limited
Pakman Security Pty Ltd
Coffs Coast Security Pty Ltd
Shellharbour Security Systems Pty Ltd
Security Communication Solutions
Rojac Electrics & Security Pty Ltd
Capevista Pty Ltd t/a Security 2000
International Pty Ltd
DA Fryer & MA Fryer t/a Code Seven
Security Specialists Australia Pty
Olivetti Electronic Security Pty Ltd
Security Service
Limited
David Wadwell t/a ESS Elite
Cite Security Unit Trust t/a Cite
A C L Installations Pty Ltd
Surveillance Services
Security
Darren and Debbie Rayner t/a Feel
Ironsea Pty Limited t/a K Contracting
L Moore & P Moore t/a MobileGUARD
SECURITY INSIDER | JUNE 2016 | 35
ASIAL NEW MEMBERS
Welcome to the following members Kemcoss Pty Ltd t/a South Burnett
Jonnex Pty Ltd
Zelimir Milovic
Security & Traffic Control
The Pride Group (QLD) Pty Ltd
SPS Security Services Pty Ltd t/a
Pius X Aboriginal Corporation
Nathan Lee Do Rozario t/a Dr Lock
Excell Security & Surveillance
Andrew Ian Payne trading as MK
24h
Bulksave Pty Ltd t/a Nation Security
Electronics
Dome Management Pty Ltd
Safeguard Security Group Pty Ltd t/a
Best Purchasing Power Pty Ltd
GD Security Concepts Pty Ltd t/a
Safeguard Security
Controlled Access Solution Pty Ltd
Scope Installations
Secusafe Pty Ltd
Stephen Peter Ribone t/a A & S
Quest Security Solutions Pty Ltd
B-Sealed Pty Ltd
Locksmiths
Zitak Pty Ltd
Dirrevin Pty Ltd
Associated Security Services Pty Ltd
Christian Rudolf Halbmeier t/a Chriann
ITD Security Pty Ltd
t/a Natale Security & Consultancy
Electrical
Hawks Eyes Security Services Pty Ltd
Services
Kabaris Proprietary Limited t/a
Bankso Pty Ltd
Jacob Edward Nalbandian t/a Austral
Pinkerton Security North East
Eagle Eyes Group Pty Ltd
Surveillance
Skilled Maritime Services Pty Ltd
A.C.N. 70 125 727 022 Pty Ltd t/a
Able Security Group Pty Ltd
Chase Security Solutions
Conn Industries Pty Ltd
BRONZE
Abroadmit Pty Limited
Falaan Holdings Pty Ltd
Australasian Protective Services Pty
Aksem Pty Ltd
Network Vision Group Pty Ltd
Ltd
Brent Paull Installations Pty Ltd
Comsec Surveillance Pty Limited
Australian Security Private Protection
Jason Mark Caruso t/a JJC Security
Optic Security Pty Ltd
Pty Ltd
John Lania t/a Guardwatch Security
Paul Anthony Vanstone t/a Mountain
Clearvision Security and Automation
Services
High Communications & Cabling
Pty Ltd
Inovo Technologies Pty Ltd
All Access Locksmiths and Security
Crete Security Pty Ltd
Lanwill Pty Limited
Pty Ltd
Dennis Michael Maloney t/a Brant
Natural Power Solutions Pty Ltd
Cablevision Antenna and Cabling Pty
Corporation
All Suburbs Security Services Pty Ltd
Ltd
Emizon Pty Ltd
Workforce Services Pty Ltd
AC & RS Stroud Pty Ltd
George Ibrahim t/a G.M. Electrical &
Metro Security Pty Ltd
ACG Fire & Security Pty Ltd
Security
Hi-Tech Security Solutions Pty Ltd
Austronic Security Pty Ltd
Independent Security Services
Woodmac Pty Ltd t/a QLD Covert
Johnson Controls Australia Pty Ltd
Australia Pty Ltd
Investigations
Rod Carroll Security Installations Pty
LMNT Group Pty Ltd t/a Element
Australian Security Rentals Pty Ltd t/a
Ltd
Security
ASRIT
Lancaster Investigations Pty Ltd
Oberix Group Pty Ltd
ESP Holdings (Aust) Pty Ltd
VuFast Pty Limited
Omega Power Equipment Pty Ltd
Citywide Patrol and Security Services
Grace Electronics Pty Ltd
Peacock Drive Pty Limited t/a Shadow
Pty Ltd t/a CPS Security Services
Lynx Security Services (SA) Pty Ltd
Protective Services
Hillside Security Service Pty Ltd
B&C Security Services Pty Ltd
Poseidon Technologies Australia Pty
Community Security Group (VIC)
Secmon Pty Ltd
Ltd
Limited
Security 1 Partnership
Quad Services Pty Ltd
Safe Security Systems Pty Ltd
Service Risk Australia Pty Ltd
Secure M Pty Ltd t/a Private Guard
Harbourside Communication &
Adept Security Pty Ltd
Security
Security Services Pty Ltd
Schmidt & Muller
Security Response Alarms Pty Ltd
Stephen Kisur t/a ASP-Absolute
(Telecommunications) Pty Ltd
Sentrex Corporation Pty Ltd
Security Protection
J & U Sorrentino Family Trust t/a
SPL Security Services Australia Pty Ltd
36 | JUNE 2016 | SECURITY INSIDER
ASIAL Graded Security Monitoring Centres* Current as at: 26th May 2016 COMPANY (SHORT FORM NAME)
STATE
CERT. NO. GRADE
EXPIRES
ADT Security
NSW
448
A1
2 Apr 2017
ADT Security (Data Centre)
NSW
449
A1
2 Apr 2017
Allcare Monitoring Services
WA
463
A2
4 Mar 2018
ARM Security
WA
446
A1
10 Mar 2017
ART Security
VIC
438
A1
30 Sep 2016
BENS Wholesale Monitoring
NSW
442
A1
14 Nov 2016
Calamity Monitoring
NSW
465
A1
20 Mar 2018
Chubb Monitoring Centre
NSW
464
A1
9 Mar 2018
Energize Australia
VIC
433
C2
13 Aug 2016
Executive Security Solutions
VIC
435
A1
21 Aug 2016
NSW
443
A2
25 Nov 2016
Golden Electronics
TAS
440A
A1
16 Oct 2016
Grid Security
NSW
439
A1
16 Oct 2016
Glad Security
Instant Security Alarms
QLD
457
A1
23 Sep 2017
Linfox Armaguard
VIC
467
A1
14 Aug 2018
Mekina Technologies
TAS
461
A1
15 Jan 2018
Onwatch
NSW
451
A1
20 Apr 2017
Paul-Tec (Australia)
NSW
454A
A1
1 Aug 2017
Protection Pacific Security
VIC
436
C2
1 Aug 2016
Proforce Security
VIC
466
A1
23 May 2018
RAA Security Services
SA
447
A1
14 Feb 2017
Secom Australia
NSW
458
A1
14 Dec 2017
Sectrol Security
VIC
452
B2
19 Aug 2017
Securemonitoring
VIC
459
A1
23 Nov 2017
Security 1
ACT
460
A2
09 Dec 2017
SA
426
A1
18 Jun 2016
Security Alarm Monitoring Service Security Control Room
VIC
455
A1
18 Aug 2017
SMC Australia
NSW
445
A1
10 Dec 2016
SMC Australia
QLD
462
A1
10 Feb 2018
Spectus
WA
450
A1
12 Apr 2017
State Government Protective Security Service
QLD
427
C1
18 Jun 2016
Telstra SNP Monitoring (Hamilton)
NSW
453
A1
29 July 2017
Telstra SNP Monitoring (West Ryde)
NSW
431
A1
13 Aug 2016
Ultimate Security & APS Monitoring Centre
NSW
456
A1
16 Sep 2017
*The above-listed ASIAL Graded monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to grading.
ASIAL Certification Class 5 Capability COMPANY Inner Range Pty Ltd
STATE
CERT. NO.
VIC
2
PRODUCT
EXPIRES
Infiniti Class 5 15 Mar 2018
The capability recommendation is based on an overview of AS/NZS 2201.1-2007 and its referenced standards. Full compliance is neither guaranteed nor implied. Whilst the product may be capable of meeting Class 5 standard, meeting this Class relies extensively on both the installer and the client. As part of the capability certification, the supplier has produced both a Compliance Statement and associated documents. These documents are dedicated to Class 5 compliance and form part of the Certification process. The supplier has agreed that: The required documentation will be maintained up-to-date for the period of the Certification, with ASIAL’s inspector being advised in writing of any such changes, and they will maintain compliance throughout the certification. Any changes that may have an impact upon this will notified to ASIAL within 14 days. ASIAL may withdraw and cancel a certificate should it become aware of any non-compliance during the certification period.
SECURITY INSIDER | JUNE 2016 | 37
HOT PRODUCTS
QXS SERVER ECRAFT PRO SERIES INTELLIGENT. AUTOMATED. OPTIMIZED. ■ Electrocraft Australia > 02 8811 5155 g
Australia > 1800 999 285 ■ Quantum Web > www.electrocraft.com.au
g
NEW!
Email > ANZsales@quantum.com
Enter the Digital Era with the Ecraft Pro Series range of equipment. Website > www.quantum.com This equipment allows you to digitally modulate any source in SD and Quantum has just released a new server designed specifically HD formatCorporation over a coax system. for VMS applications which is paired This video surveilSources include AV(CVBS), HDMIwith andQuantum SDI from storage. media players, cameras, lance specific server builds on Quantum’s 20+ year experience in managing receivers etc. video. new QXS server provides VMS optimised environment, and easy OurThe coax and IPTV/CCTV systema designers will assist you with design growth over time without doing rip-and-replace upgrades. The QXS server and support to ensure that the installation is efficient.The EPS series is is ideally suited for 50+ camera applications and can scale to 1000+ cameras ideal solution when the site is required to use the existing infrastructure when combined Quantum Multi-Tier Storage. keeping costs atwith minimum. EPS series is a typical solution for retirement Learn more: Quantum Australia 1800 999 285 orcorrectional ANZsales@quantum.com villages, pubs, clubs, sporting venues, hospitals, centres and Mention Security Insider and receive 10% off your quote to 30 September. high risers. g
Mention Security Insider and receive 10% off your quote until 30 June.
HIKVISION COVERTNVR IP RANGE INTERLOGIX EXTENDS WITH HIGH PERFORMANCE NVR70 CAMERA SERIES g g
NEW!
Security Merchants Australia > > 1300 ■ Central Security Distribution 1300663 319 904 499 Website ■ Web> >www.securitymerchants.com.au www.centralsd.com.au
When Hikvision reliability is mission critical, look to the IP new TruVision NVR70 by DS-2CD64 1.3MP WDR Covert Camera Series provide Interlogix with features including redundancy, redundant PSUs, both flexibility and ease ofnetwork installation, its size dual allows the camera to recorder failover even configuration export/import. easily blend intocamera very limited space, which makes it ideal for discreet Real-time Full HD recordings can be accessed via true the 120dB LicenseWDR, free surveillance applications.This product incorporates TruVision software, TVRmobile even full browser-based access as Navigator well as other powerful image app processing functionalities like 3D for live,DNR recording and Additionally, configuration. and BLC. the DS-2CD64 series supports on-board Thestorage NVR70 of supports up toand 400Mbps of incoming bandwidth, or up-to 64GB ROI codec to savecamera on overall bandwidth up to 128 cameraItchannels. and IP storage. also provides choice of lens and mounting types for Designed to find accommodate large amounts data, the NVR 70 is equipped users to an option to best fit their of surveillance needs. with up to 64TB of embedded storage in a RAID configuration, or up to 96TB in a non-RAID configuration.
NEW ‘RM’ VMS FROM CANON PARADOX PSC260/PCS265 ■ Canon Australia > 1800 021 167 3G COMMUNICATOR MODULES ■ Email > specialised.imaging@canon.com.au
g
Central Security Distribution > 1300 319 499 Website > www.centralsd.com.au
■ Web > www.canon.com.au/networkcameras
g
Besides offering an extensive range high quality IP modules cameras,now Canon The Paradox PCS260 / PCS265 3Gof communicator has just launched the latest version of its’ video management software, enable Paradox alarm panels to send messages to Control Rooms RM version Thisfor new software supports H.264 /compression for high without the 3. need a PSTN line. The PCS260 PCS265 delivers resolution megapixel video without driving up storage costs. Included communication via GSM to any Control Room that receives Contact is an or intuitive keyword tagging and filtering feature which makes very easy ID via GPRS to Paradox IP receivers. The PCS265 moduleit allows to analyse footage from multi-camera environments. It also comes remote installation up to 300m from the control panel via RS485 and standard in versions to support up to 9 cameras (RM-9), 25 cameras (RMhas an on board lithium backup battery. The PCS260 / PCS265 can 25) and 64 cameras (RM-64). Additional viewer licenses are also available also send SMS text messages to up to 8 mobile phone recipients for for projects larger than 64 cameras. alarms and system events. Both modules are simple to install via a fourwire serial connection.
38 | JUNE 2016 INSIDER | SECURITY INSIDER 38 //SECURITY APR 2014
HOT PRODUCTS
DTU3G/IP AU MOBOTIX ■ SCSI > 1300ENGINEERED 555 570 GERMAN Email > daleacott@securitycommunications.com Central Security Distribution > 1300 319 499 ■ Website Web > www.securitycommunications.com g > www.centralsd.com.au ■ g
SCSI’s DTU3G/IP wireless alarm communicator is Australian Central Security Distribution (CSD) has launched an initiativemade and designed. Dual-SIM technology provides 6 secure paths using to introduce MOBOTIX to new and existing CCTV Integrators in Telstra NextG, 3G, Telstra Optus & PSTN. With the formOptus of “MOBOTIX AU”.GPRS, It’s never beenGPRS, easier! Ethernet The MOBOTIX thousands already sold 4TB and Hard installed, DTU3G/IP has been AU Kit features a NAS, Drivethe and POE Switch, while released to the Australian Security outstanding success. The cameras come preloaded withIndustry a customwith configuration to create combination of multiple, proven communication paths ending the days of the 4-Step Plug n’ Play solution never seen before in a MOBOTIX nuisanceBacked “poll fails” and unwarranted System! by unrivalled German guard quality,attendances. all cameras feature The DTU3G/IP connects to theTime DirectWireless Network, a minimum of 80,000 hours Mean Before Failure (MTBF)Australia’s only dedicated and privatesoftware alarm transmission network. with exclusive MOBOTIX features such as MxPEG, To find out more about the counting DTU3G/IP contact 1300 555 570. MxActivitySensor and people -, it’s neverSCSI beenon a better time to introduce your customers to MOBOTIX!
NEW!
SUPERIOR DETECTION WITH THE A MOBILE APP FOR PARADOX NVX80 DETECTOR TECHNICIANS ON THE GO ■ Central Security > 1300 319 499 simPRO > 1300 139Distribution 467 ■ Web > > www.simprogroup.com www.centralsd.com.au g Website g
NEW!
The Paradox SeeTrue™ technology delivers superior simPRO ConnectNVX80 is the with field all-new extension of simPRO Software, designed for motion detection with advanced capabilities, beyond in its class. mobile devices. Compatible with both Android and iOS,others simPRO Connect offersBoasting a seamless Technicians in theactive field can update a office-to-field combination connection. of technologies including: infrared, times, materials,and job SeeTrue™, details andthis photos in real time. enables highly efficient microwave, unique aggregation With Connect’s runsheet, technicians can get a clearreliability view of and their detector sensitivity while field at the same time, enhances scheduled workfalse eachalarms. day without needing to drop by or call the office, reducing minimises travel time and increasing billable hours.are Technicians can raise purchase orders Programming and configuration simple with the NVX80's full-colour from OLED the field, and can issue invoices and collect payment on site as soon as a screen and four-button interface. Suitable for both indoor and outdoor job isapplications, complete –the helping to keep your cash flow positive. NVX80 is truly the detector to choose when protecting high ASIAL members receive 20% off the initial cost of simPRO Enterprise and one free simPRO Connect licence with
value, high security sites that demand high performance.
every Enterprise licence*. *Offer is only valid for new simPRO Enterprise customers who are ASIAL members.
THE NEW 8AMP OMV OUTDOOR INTEGRITI SMART POWER SUPPLY MOTIONVIEWER FROM INNER RANGE g Video Alarm Technologies > 1300 464 455 ■ Inner Range Melbourne > +61 3 9780 4300 g Web > www.videofied.com.au ■ Email > admin@innerrange.com
■ Web > www.innerrange.com The Outdoor MotionViewer®, a battery-powered PIR motion sensor with an integrated digital video camera and infrared In today’s demanding security environment, monitoring of the powersupply illuminators, is designed to detect an intrusion, instantaneously status is pivotal to the operation and performance of anysecurity system, and the record a 10 second video and send the video alarm signal to our Integriti 8Amp Smart Power supply deliversthis very effectively.The new Inner control panel via RF for cellular relay to the central station where Range Integriti 8Amp 13.75Vdc Smart power supply isa highly efficient purpose immediate review/verification can initiate a priority response and built power supply solution designed to meetthe modern high spec requirements dispatch. unique to Access Control and Intruder Security Systems.When used with Inner Product Features include: Ranges Integriti system, the 8Amp powersupply offers quick connect status • 100% wirefree • Colour Video • Operating temperature -30° / monitoring for critical powerrelated aspects, such as Battery Fault, Low Battery, +60°C • Tilt Tamper with an accelerometer • IP 65 Weatherproof Battery Not Present, Battery Failed Test, Mains Power failure, Power Supply Low • Angle detection 90° by default • 3 x lenses options in the box. Volts, Power Supply Failure and status monitoring of all Smart Fuses. OMV - taking outdoor video verification to another level!
SECURITY INSIDER | JUNE 39 SECURITY INSIDER APR2016 2014//| 41
HOT PRODUCTS
QXS HYBRID DISK – FLASH DTU3G/IP AT 30% OF THE COST ■ PERFORMANCE SCSI > 1300 555 570 ■g Email > daleacott@securitycommunications.com Quantum Australia > 1800 999 285 ■g Web > www.securitycommunications.com Email > ANZsales@quantum.com
Website > www.quantum.com SCSI’s DTU3G/IP wireless alarm communicator is Australian made and designed. Dual-SIM 6 secure paths using QXS combines flashtechnology drives, highprovides performance and standard hardTelstra drives in NextG, Optus 3G, Telstra GPRS, Optus GPRS, Ethernet & PSTN. Withthe a single storage array. Quantum’s patented Q-Tier software manages thousands already sold and installed, the DTU3G/IP hasatbeen drives optimising performance – delivering flash speeds 30%released of the cost to ofthe Australian Security with outstanding success. all flash arrays. This meansIndustry faster write times for more cameras andThe larger combination of multiple, proven communication paths ending the days of “live” VMS databases. QXS is ideal for virtualised VMS installations, analytics, nuisance “poll fails” anddeployments. unwarranted guard attendances. and enterprise grade The DTU3G/IP connects to and the NEBS DirectWireless Network, QXS is Mil-Spec hardened rated; certified with Australia’s leading VMS only dedicated andand private transmission network. solutions. Sizing cost alarm generally suits medium to large projects. To earn find out more about the DTU3G/IP , contact SCSI 1300 555 570. more: Quantum Australia 1800 999 285 or on ANZsales@quantum. g
com, mention Security Insider and receive 10% off your quote until 30 June.
NEW!
SUPERIOR WITH WITH THE KEEP YOURDETECTION CASH FLOWING SIMPRO PAYMENTS PARADOX NVX80 DETECTOR g ■simPRO Central
Security Distribution > 1300 319 499 > 1300 139 467
g ■Website Web > www.centralsd.com.au > www.simprogroup.com
With all-in-one payment simPRO Software, simPRO Payments, Thethe Paradox NVX80 withfeature all-newofSeeTrue™ technology delivers superior you can collect payment for your services quickly and securely by credit card, without motion detection with advanced capabilities, beyond others in its class. the need for merchant facilities. Boasting a combination of technologies including: active infrared, When usedand withSeeTrue™, the simPRO mobile app, simPRO enables microwave, thisConnect unique aggregation enables Payments highly efficient your technicians to collect payment in the field as soon as a job is complete. Your detector sensitivity while at the same time, enhances reliability and customers can also pay you online through the Customer Portal, by following a minimises false alarms. link in an emailed invoice, or over the phone. All payments are processed through Programming and configuration are simple with the NVX80's full-colour the simPRO system.
NEW!
OLED screen and four-button interface. Suitable for both indoor and outdoor ASIAL members receive 20% off the initial cost of simPRO Enterprise and one free applications, the NVX80 is truly the detector to choose when protecting high simPRO Connect licence with every Enterprise licence*. *Offer is only valid for new simPRO value, high security sites that demand high performance. Enterprise customers who are ASIAL members.
THE T4000’S HAS INTEGRITI 8AMPLITTLE SMARTBROTHER POWER SUPPLY ARRIVED PACKED WITH FEATURES FROM INNER RANGE g Inner Range Melbourne > 03 9780 4300 Email > IREnquiries@innerrange.com ■ Email > admin@innerrange.com g Web > www.innerrange.com ■ Inner Range Melbourne > +61 3 9780 4300 g
■ Web > www.innerrange.com Boasting a lightweight price and a little less monitoring hardware without In today’s demanding security environment, of the compromising powersupply on simplicity and performance. status is pivotal to the operation and performance of anysecurity system, and the The T4000 LitePower is fullysupply packed with the features of the original Integriti 8Amp Smart deliversthis very effectively.The new T4000 Inner Security Communicator, withSmart a smaller tagisait highly is the efficient ideal solution for Range Integriti 8Amp 13.75Vdc powerprice supply purpose builtinstallations power supply solution meetthe modernfrom highan spec requirements where the designed T4000 istobeing powered existing batteryunique to Access Control The and T4000 IntruderLite Security Systems.When used with panels Inner backed alarm system. is compatible with most alarm Ranges Integriti system,to the offers quick connectthe status and simply connects the8Amp panel powersupply via its telephone port, eliminating need monitoring for critical powerrelated aspects, such as Battery Low Battery, for a dedicated alarm panel phone line connection to theFault, street. The T4000 Battery Not Present, Battery Failed Test, Mains Power failure, Power Supply Low Lite handles all alarm communications via its Ultra-fast 3G dual SIM and Volts, Power Supply Failure and status monitoring of all Smart Fuses. 10/100 Mbps Ethernet polled communications paths.’
40 | JUNE 2016 | SECURITY INSIDER
SECURITY INSIDER APR 2014// 41
KP LA
SA
OR
FE
W CE MANAGEMENT
Making health and safety easier for members
Mee t yo in 1 ur WH 5m inut S oblig es p a er w tions eek
Ava ilab ACCESSIBLE anywhere, Special l e ANYTIME to $27 OFFER 5 (in ASIAL mem Contact us to cl G The S A T) p bediscuss our new syst SIAL S r s e em, afe f r or promotion indu W d ann member stry esigne orkpla u d : m to A ce Ma na S4
W
801 g Inclu and ement man des an Sy tailo o pow red stem i er/e ffice acc to th s a t lectr o Crea onic unt an e Au otal W tes a s sec d a m stra WHS urity obil lian HS plan staff e acc Stor secu for y e in th ount busi s forms rity our a e c fi c e ness b e , ld ssib usin , em inciden l e e ss an to ploy t d se ees reports nds and , ph auto o con mat trac tos, lice ed to n
2016 ASIAL NATIONAL CALENDAR OF EVENTS 20-22 JULY 2016 | SECURITY 2016 EXHIBITION & CONFERENCE Venue: Melbourne Convention & Exhibition Centre 4 AUGUST 2016 | SA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Sebel Playford Hotel, Adelaide Price: $47.50 (Member), $57.50 (Non- Member) 5 AUGUST 2016 | WA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hotel Northbridge, Perth Price: $47.50 (Member), $57.50 (Non- Member) 31 AUGUST 2016 | NSW INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Holiday Inn, Parramatta Price: $50 (Member), $60 (Non- Member) 7 SEPTEMBER 2016 | QLD INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hillstone St Lucia, Brisbane Price: $47.50 (Member), $57.50 (Non- Member) 12 OCTOBER 2016 | ACT INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Premier Belconnen Price: $47.50 (Member), $57.50 (Non- Member) 13 OCTOBER 2016 | TAS INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hobart Function Centre Price: $47.50 (Member), $57.50 (Non- Member) 20 OCTOBER 2016 | AUSTRALIAN SECURITY INDUSTRY AWARDS FOR EXCELLENCE / OUTSTANDING SECURITY PERFORMANCE AWARDS Time: 7.00-10.30pm | Location: Westin Hotel, Martin Place, Sydney. 27 OCTOBER 2016 | VIC INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Batman’s Hill on Collins, Melbourne Price: $50 (Member), $60 (Non- Member) 16 NOVEMBER 2016 | QLD INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hillstone St Lucia, Brisbane Price: $47.50 (Member), $57.50 (Non- Member) 17 NOVEMBER 2016 | SA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Sebel Playford Hotel, Adelaide Price: $47.50 (Member), $57.50 (Non- Member)
Interested in sponsoring an ASIAL event? Email advertising@asial.com.au
VIDEOFIED, WIREFREE AND IDEAL FOR OUTDOOR AND VACANT SITES
VIDEOFIED®, OUTDOOR SECURITY SYSTEM, 100% WIREFREE! Videofied systems have revolutionised the Security market over the last ten years with wirefree video verification. A new product generation now brings you outdoor colour video verification. Upon an intrusion, the MotionViewer cameras take a ten second video. The video is immediately transmitted to your preferred alarm monitoring centre. In the case of a genuine intrusion an urgent or appropriate response can be deployed.
OUR ADVANTAGES Video Verification
Complete System
Outdoor sites
Security professionals are able to initiate a priority response to real alarm events based on visual confirmation.
Videofied offers a complete security alarm system which integrates video verification.
The OMV and XTO are especially designed to secure outdoor environments including yards, construction sites and critical infrastructure.
Construction sites, vacant buildings, substations and most outdoor sites are uncontrolled environments, video verification is especially important to eliminate costly false alarms.
Videofied’s portability means it can be moved around as the project evolves before potentially being installed months later at a brand new site!
• The most advanced security system with video verification • Bi-directional, spread spectrum, AES encrypted radio using the 920MHz operating frequency • GSM/GPRS/IP alarm transmission • up to 4 years battery life (no mains power requirement)
1300 46 44 55 info@videofied.com.au
www.videofied.com.au
Untitled-1 1
26/11/2014 10:45 am