Security Insider June/ July 2016

Page 1

SECURITY

THE MAGAZINE FOR SECURITY PROFESSIONALS

MAGAZINE VOL.21 | ISSUE 2 | JUN/JULY 2016

EXCEPTIONAL SECURITY COMPANIES & INDIVIDUALS TO BE RECOGNISED AUSTRALIAN SECURITY INDUSTRY AWARDS

82 18

PP255003/02390

ASIAL LAUNCHES INDIVIDUAL PROFESSIONAL RECOGNITION PROGRAM


Trust SCSI for all your Security & Communication needs..

DirectConnect is a 4G Fixed IP Address SIM Service that allows secure connections via PC or Mobile devices to CCTV, Access Control, BMS, Medical Alerts and IP devices via SCSI Dedicated VPN Network. The power and flexibility of BOLD’S Central Station Monitoring Automation Software enables you to increase revenue, Improve efficiencies and offer new revenue streams to existing and new customers.

SCSI’S DirectWireless is the most cost effective, Australian made, reliable, wireless alarm communicator that connects you to Australia’s only dedicated Private alarm transmission network, DirectWireless.

SecureCall portal is an extremely powerful tool used to monitor rebates via reports and search tools over all alarm traffic.

OUR PRODUCTS:

POWERED BY: PROUD SPONSORS OF ASIAL’S SECURITY INDUSTRY AWARDS FOR EXCELLENCE

www.scsi.com.au . sales@scsi.com.au . 1300 555 570


DirectConnect NEW 9 Fixed IP Sim Service

9 Optus and Telstra flexible data plans

9 Secure VPN Connection

9 4G high bandwidth data rates

9 CCTV, Access Control, BMS, Medical and IP Device supported

9 All NVR’s supported

BOLD Technologies 9 Central monitoring automation software 9 Increase revenue and improve efficiencies 9 Offer GPS Tracking and Lone worker

9 Change Truly automated and autonomous to Virtual Operator & Bidirectional Text 9 Social Media monitoring 9 Failover to multiple locations

9 Alarm verification

DirectWireless 9 iPhone and Android support

9 True end to end polling

9 Self activation

9 10 year warranty

9 Over the Air Download to over 20 panels

9 NBN Ready

9 Australia’s only private security network

9 Plug ’n’ Play alarm panel connections 9 Dual Sim 3G Technology

SecureCall 9 Receive competitive rebates on your 1345 alarm traffic

9 Zero network access fees and no monthly fees

9 Paid directly by Optus

9 Maintain ownership of your 1345 number

9 No lock in contracts

www.scsi.com.au . sales@scsi.com.au . 1300 555 570


INSIDER_Mar/Apr 2014 Iss1_48pp

31/3/14

7:27 PM

Page 6

CONTENTS CONTENTS VOL.21 | ISSUE 2 | JUN/JULY 2016

VOL.19 | ISSUE.1 | APRIL 2014

20

22

RECOGNISING EXCELLENCE

SECURITY 2014 IN THE AUSTRALIAN BREAKS INTO SECURITY INDUSTRY MELBOURNE

18

09

22

FOR 24CYBERSECURITY SENIOR EXECUTIVES

ASIAL LAUNCHES SEE THE LATEST PROFESSIONAL INNOVATIONS AT THE PROMOTING THE USE INDIVIDUAL THE NBN - WHERE RECOGNITION PROGRAM SECURITY EXHIBITION OF ASIAL MEMBERS TO NOW? 06 | President’s message 08 | Tackle the issue of late 08 | President’s message payments 09 2014world Gala leaders dinner in 10 | | Security Learn from security and conference 12 | The security industry’s night of 10 | Privacy legislation changes nights 14 | ASQA inquiry 14 | | 2014 Cybersecurity 16 Australian projected Security to drive $7.6 trillion of digital value over Industry Awards for Excellence

ASIAL Strategic Partners:

4 | JUNE 2016 | SECURITY INSIDER 6 //SECURITY INSIDER APR 2014

15 20 | 16 | 32 17 | 34 28 | 36

the next decade | New industry service - Class 5 Changes to specialist cabling Capability Certification | competencies Raising awareness of members among Help your consumers employees catch | their IEDsuper Guidelines for Places of Massyear Gathering A busy ahead in | Workplace Employment Contracts - worth Relations the effort? ASIAL new member listing /

24

30

ARE YOU PREPARED?

32 34 37 34| 37| 38 | 42 38 42

| What the Federal Budget means for super Recognition | ASIAL newprogram member listing ASIAL Monitoring | ASIAL Member centre Recognition Program listing listing certification | ASIAL monitoring centre Hot products certification ASIAL Calendarlisting of events | Hot products | ASIAL calendar of events


The future of alarm reporting is already here!

0 Multipath-IP brings Alarm Monitoring into the internet and smart-phone age. Multipath-IP enables a host of alarm panels and alarm communicators from Inner Range to connect to its vast network of Partner Monitoring centre’s. 3G Communicator

Full Smart-phone control

The T4000 provides a Dual SIM and dialer-capture solution to enable a magnitude of legacy alarm systems in the field to take advantage of super-fast 3G and IP communications. The T4000’s upload/download feature enables installation techs to continue to remotely maintain older generation alarm systems long after physical phone lines have replaced with the NBN.

SkyCommand is a fully featured smartphone app providing full control over all Multipath-IP enabled hardware products. SkyCommand ties various hardware platforms into one easy-to-use end-customer app. SkyCommand allows the user to have many sites with different hardware devices all controlled by the one app.

Home Automation and Security

Direct-IP monitoring is now a viable option for security installers using the Multipath-IP network. Previously, configuring an alarm system to report to a monitoring centre’s IP alarm receiver meant programming static settings into the alarm panel. Multipath-IP now offers a true ‘plug and play’ connectivity option for alarm reporting. The Integriti and Inception systems are now fully supported by the Multipath-IP network allowing alarms to be delivered to the customers Monitoring Company via their own internet provider.

New to the Multipath-IP ecosystem is the SkyGuard security and home automation product. SkyGuard brings an IOT (Internet of things) solution to the Security installer and Monitoring Company alike. Utilizing its inbuilt Z-wave module end-customers can control their alarm system, door locks, lights and appliances all from the user friendly SkyGuard app.

NBN and IP alarm monitoring

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

T: 1300 319 499

W: csd.com.au


PRESIDENT’S PRESIDENT’S MESSAGE MESSAGE

Showcasing the significant PROMOTING contribution our industry makes PROFESSIONALISM to the Australian economy

A A

SIAL has long been an advocate for higher professional and fter more than a decade, the ethical standards within the Security 2014 Exhibition and security industry. Conference returns to Melbourne The February release of the Australian in early June. Judging by the strong Skills Quality Authority (ASQA) investigation response from exhibitors, the long awaited into training in the security industry return has been well received.This year’s highlighted a failure of the regulatory event will run from the 4-6th June at the system to control the quality of vocational Melbourne Exhibition & Convention training delivery. Centre. ASIAL’s response to the report has is now nearly 30 years beenIt provided to ASQA and state/territory since a small group of ASIAL regulators. In our position paper we called industry representatives for a uniform and consistent national organised first industry approach tothe security industry licensing. exhibition. It is pleasing This included a single set to of see 15 units of that the event continues to go competency to be introduced across all from strength toastrength jurisdictions; that durationand of 130 hours an training opportunity for the ofprovide auditable be introduced for entry industry to showcase the level training by all jurisdictions; that a more impressive array of assessment products and services rigorous testing and regime it offers.Through partnership be introduced and the thatongoing Registered Training between Diversified Communications Organisations are actively audited against Australia and ASIAL, the Association these requirements. continues play a key in helping The time to has come forrole regulators to to showcase the industry’s capabilities.a step up to the plate and demonstrate year’s approach expandedtoexhibition moreThis proactive enforcingfloor space and outstanding vocational training deliveryconference requirements. program excellent opportunity Over theprovides past twoandecades ASIAL to view the latest its security technologies, has demonstrated commitment to promoting professionalism hear fromindustry internationally renownedthrough aexperts, range ofas initiatives. For example, we have well as network and socialise organised the Australian Security Industry with industry colleagues from across the Awards for Excellence, which provides country. an opportunity to recognise excellence Another important industry event I within security industry. For more wouldthe like to bring your attention to than is the three we have been involved in 19thdecades Annual Australian Security Industry organising the annual showcase forin the Awards for Excellence to be held many products services the2014. security Sydney on theand 23rd October Our industry offers through the industry’s industry performs an increasingly annual exhibition important role inand theconference. Australian economy Further evidence of ASIAL’s and it is important that this is recognised commitment to raising the level of as this. through awards programs such professionalism is an exciting new initiative Nominations are now open for the awards, that I am pleased to announce the so I urge you to consider lodging an ASIAL Individual Professional Recognition application. Further details are available on Program; an initiative that provides peersite. page 28 and through the ASIAL web recognition of an individual’s qualifications, Later this year ASIAL’s board elections experience and achievements as a security will be conducted by the Australian professional. Electoral Commission. Members will be Participants receive post-nominal notified in duewill course by athe AEC about

610| //SECURITY JUNE 2016 | SECURITY INSIDER INSIDER JUNE 2014

credential that recognises their arrangements for the election.This security experience process allows for every Duly Authorised and capability, Representative of a financial corporate commitment member the opportunity to submit a to practice in postal vote. accordance with the In my previous President’s Message, I highest professional wrote about the importance good and ethical standards and yourofstrong governance practices. Failure to do the affiliation with the industry’s peak body – right thing more often not ASIAL. The professional recognitionthan levels will result in negative include: yourindustry • Memberconsequences – MASIAL: 3+for years organisation. experience – someone who is looking an Association ASIAL to grow andAs develop their career in the actively enforces its security industry. Professional Code of Conduct, • Associate Fellow – AFASIAL: 10+ a position matched our years industry experience – aby security actions.The ASIAL Board’s professional committed to developing recent decision to advancing expel their professional skills and Hootspah Pty Limited from its the industry as a whole. and to impose a $120,000 • membership 20+ years industry Fellow – FASIAL: financial sanction specific and experience – an and experienced compliance thehas Kings respected requirements industry leaderonwho Security Groupsignificantly highlights this.The contributed to the growth continuation of the Kings and development of the Security industry.Group’s was conditional on • ASIAL Life membership Fellow – FASIAL (Life): Awarded accepting and complying with payment of to individuals who have provided thedistinguished sanction andservice meeting specific to the industry over a longrequirements.The period of time. company compliance advised that it was unable to maintain its

For more information on this new membership as required byexciting the ASIAL Individual Member initiative, Board, and as a result theirplease ASIALturn to page 22. membership was relinquished. InWhilst the coming months,tomembers willthe it is important learn from receive information the Australian mistakes of others,from it is equally as Electoral Commission regarding the important to understand that compliance Association’s Board elections. is not a dirty upcoming word. For our industry to I grow urge all members to participate in the and flourish, it is vital that we process. develop a stronger culture of compliance. The Security Exhibition & many of Finally, I look2016 forward to seeing Conference runs from the 20-22 Julyor 2016 you at Security 2014 in Melbourne later atinthe Melbourne Convention & Exhibition the year at the 2014 Australian Security Centre - IAwards look forward to seeing you there. Industry for Excellence.

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Publisher

Editor Bryan de Caires | security@asial.com.au Editorial Enquiries communications@asial.com.au Advertising Tania Laird | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Digital Webfx2 Digital | design@webfx2.com.au Editorial Contributors Contributors AON, Chris Delaney and Greg Jennings Arno Brok, Georgina Williams, Chris Delaney

and +Kirsty Jagger Print Distribution Print +Advertising Distribution Nationwide Group Fineline bi-monthly Printing Published Published bi-monthly Estimated Readership of 10,000 Estimated readership 10,000do not Views expressed in SecurityofInsider necessarily reflect the opinion of ASIAL. Advertising

Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL.Advertising otherwise stated with permission. All contributions does not imply endorsement by ASIAL, unless are welcomed, the publisher reserves the otherwise statedthough with permission. All contributions are welcomed, though the publisher right to decline to publish or to reserves edit forthe style, right to decline publish to edit for style, grammar, lengthtoand legalorreasons. Press Releases grammar, length and legal reasons. Press Releases to: security@asial.com.au. can be emailed to: communications@asial.com.au. Internet references in articles, stories and Internet references in articles, stories and advertising werecorrect correct at the of printing. advertising were at the timetime of printing. ASIAL does not not accept accept responsibility responsibilityformisleading for misleading Copyright©2016 (ASIAL) views. Copyright©2014 (ASIAL) All Allrights rightsreserved. reserved. Reproduction of Reproduction of Security SecurityInsider Insidermagazine magazinewithout without permission is strictly prohibited. Security Insider is permission is strictly prohibited. Security Insider is a subscription based publication, rates and further a subscription based publication, rates and further details can be found at www.asial.com.au.

does not imply endorsement by ASIAL, unless

details can be found at www.asial.com.au.

[NEXT ISSUE] AUGUST 2016 [Next Issue] AUGUST 2014

ISSN 1442-1720

ISSN 1442-1720

Kevin KevinMcDonald McDonald President President


Simple & Easy Installation Integrated Security - Access Control

Inception is an integrated access control and security alarm system with a design edge that sets it apart from the pack. Featuring built in web based software, the Inception system is simple to access using a web browser on a Computer, Tablet or Smartphone. With a step by step commissioning guide and outstanding user interface, Inception is easy to install and very easy to operate.

Access Control

Automation

No Software Required

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

IN

Security Alarm

AU

Multiple Devices

Easy Setup with Checklist Prompting

T: 1300 319 499

IGNED

IA

S DE

For more information, visit www.innerrange.com/inception. There you will find installation guides and videos to help you get the most out of your Inception system.

STRA

L

Send IP Alarms via the Multipath-IP Network

W: csd.com.au


ADVERTORIAL

TACKLE THE ISSUE OF LATE PAYMENTS

H

aving a healthy cash flow is a vital part of any successful business: cash flow is what keeps your business ticking over and the bills paid. Many security businesses, however, find that while their profit and sales are good, their cash flow seems to be constantly low. But why? Often, unpaid invoices are the reason behind a strained cash flow. This causes many business owners stress as they find themselves spending too much time chasing late payments, searching for old invoices, and making manual adjustments. So, if you’re wondering why you’re not getting anywhere but are using all of your resources, it may be time to revisit the way you issue invoices and follow them up. For security businesses that want to get on top of spending and invoicing, there are systems available to help solve your cash flow issues.

Speedier invoicing and payment simPRO Payments, the all-inone payment feature in simPRO Software, makes invoicing and collecting payment simple. See the cash faster as you collect payment from your customers quickly and securely by credit card, with all payment processed through the simPRO system – eliminating the hassles associated with bank merchant facilities. Using simPRO Payments with the simPRO mobile app extension enables your security technicians to create invoices and process

payment on site as soon as a job is complete. Your customers can also pay you online through a customer portal, by following a link in an emailed invoice, or over the phone.

Improved customer service Offering your customers flexible payment options with simPRO Payments not only improves the likelihood that you’ll be paid promptly but also provides a high standard of service that your customers will appreciate. Improved invoicing provides greater transparency during and after the job, giving customers a clearer picture of what they’re paying for, therefore building stronger client interactions.

More time The time spent updating and adjusting quotes, filling in timesheets, and following up unpaid invoices can be costly to a security business. The extra administration often ends up

diverting resources from the job, costing you and your business money. Making it simpler for your technicians and customers through the use of technology ensures your business is putting its time and money where it’s most needed. Once you have a system in place to help boost your cash flow, it won’t be long until you see the associated advantages. Investing into your invoicing and cash flow systems can also offer greater insights into your business, making it clear where your money is going and where it needs to be.

simPRO offer for ASIAL members ASIAL members receive 20% off the initial cost and 10% off ongoing costs of simPRO Enterprise and one free simPRO Connect licence with every Enterprise licence*. Please get in touch with us today on 1300 139 467 to take advantage of this offer, or visit simprogroup.com to learn more.

*ASIAL members receive 20% off the initial cost of simPRO Enterprise and one free simPRO Connect licence with every Enterprise licence.

8 | JUNE 2016 | SECURITY INSIDER


Serious Job Management


INDUSTRY NEWS

LEARN FROM WORLD LEADERS IN SECURITY Bringing together leading local and international security experts, ASIAL’s Security 2016 Conference will discuss strategies to combat the changing security threats and challenges faced by business, government and the broader community.

ASIAL Conference program

The ASIAL Security 2016 Conference offers an intensive 1½ day program, plus practical ½ day Executive Briefings, that will address important issues and challenges faced by security professionals. Among the conference speakers are: • Duncan Lewis, DirectorGeneral, ASIO (or a nominated representative) • Roman Quaedvlieg, Commissioner, Australian Border Force • John Yates, Global Director of Security, Scentre Group at Westfield • Mark Duckworth, Chief Resilience Officer, Department of Prime Minister and Cabinet • Neil Gaughan, Assistant Commissioner, Counter Terrorism, Australian Federal Police • Dave Crossley, Head of Security, Emergency Planning

and Response, Sydney Opera House. You can view the full line up of speakers at www.asial.com.au.

Executive Briefings

To form the complete educational experience you may package your conference pass with one or two of the following sessions:

Thursday 21 July, 2.00-5.00pm Core crisis leadership competencies Caroline Sapriel, Managing Director, CS&A International (Belgium) CPTED: Past, Present & Future Dr Kelly Sundberg, Associate Professor, Mount Royal University (Canada) Friday 22 July, 9.30am-12.30pm Introduction to crowd safety and risk analysis Dr. G. Keith Still, Professor of Crowd Science at Manchester Metropolitan University (UK), Director of Crowd Risk Analysis Ltd Making social media sensing work for you Thomas Helmer, Senior Director, CS&A International Risk & Crisis Management (Hong Kong) CCTV for Critical Infrastructure and Local Government Arthur Barker, Principal Consultant, Electronic Security

10 | JUNE 2016 | SECURITY INSIDER

and Video Systems Specialist

Who should attend? • • • • • • • •

Security Managers Venue/Event Security Managers Facilities Managers Chief Security Officers Operations Managers Chief Information Officers Critical Infrastructure Managers Business Continuity Managers

How to register

Conference passes will be available to purchase onsite, subject to availability. Visit the registration desk outside Door 8 upon arrival at the Melbourne Convention & Exhibition Centre for more details. Avoid disappointment by booking online now at securityexpo.com.au. Advance bookings for the Conference available until 5pm on Tuesday 19 July.

RELATED ARTICLES The security industry’s night of nights, page 12 See the latest innovations at the Security Exhibition, page 18 Cybersecurity for the boardroom, page 24


SPEND LESS ON VIDEO SURVEILLANCE STORAGE

SO YOUR CLIENTS CAN SPEND MORE ON OTHER TOOLS

Quantum’s multi-tier storage solution provides total usable capacity for less of the overall budget, allowing your clients to invest more in cameras, retention times, and analytics.

See us at Security Expo Melbourne 20-22 July, Booth F36 Find out more from Quantum ANZ: ANZsales@quantum.com or 1 800 999 285 (Aus) or 0800 105 999 (NZ) www.quantum.com/video-surveillance © 2016 Quantum Corporation. All rights reserved.


INDUSTRY NEWS   

DON’T MISS THE SECURITY INDUSTRY’S NIGHT OF NIGHTS

H

osted by Dave Hughes the annual Security Gala Dinner is held to celebrate, reward and engage security professionals, suppliers and clients from across the country. Taking place on the first night of the exhibition and conference, the Security Gala Dinner is the industry’s night of nights incorporating a threecourse meal, fine wine and great entertainment from afore mentioned Hughesy. Since 1999, Hughesy has become one of the biggest and most loved names in Australian stand-up comedy as well as a renowned television and radio personality. Honest and imperfect is how Australians like their comedy and Dave Hughes will deliver exactly that in spades. After the overwhelming feedback last year, the dinner venue will again be the stunning Plaza Ballroom at the Regents Theatre in Melbourne’s CBD. This is the ideal event to catch up with peers, host your clients and congratulate your staff or colleagues so don’t miss the industry’s ultimate networking evening and put it in your diary now. DETAILS Venue: Plaza Ballroom, Regent Theatre Address: 191 Collins Street, Melbourne VIC 3000

12 | JUNE 2016 | SECURITY INSIDER

                       

Date: Wednesday 20 July Time: 6:30–11:00pm Find out more and book at www. securityexpo.com.au.

A word from our sponsors Gold dinner sponsor

   

Entertainment sponsor

MSS Security is one of Australia’s leading security and emergency response companies, with more than 5,400 employees. Whatever their size, our clients receive a tailored service, with measured results, delivered by carefully selected, fully trained security personnel, who are directly employed whenever possible. Our frontline staff are backed by specialist account management and support in every state and territory, 24 hours a day. MSS Security operates in all market segments – aviation, commercial property and retail, defence, education, government, health, resources, industrial and manufacturing, maritime, logistics, and arts, events and recreation. To learn more, visit msssecurity. com.au.

The Interlogix product range is extensive, catering for most security applications from small domestic installations to the largest airport, prison and educational facility. Our products have been designed to cater for the specific needs of these applications with flexible product design and application specific products. To learn more visit utcfs. com.au.

  

RELATED ARTICLES Learn from security industry leaders, page 10 See the latest innovations at the Security Exhibition, page 18 Cybersecurity for the boardroom, page 24




                          

   

 

                                                                                                                                          

   



 



  





  



   


INDUSTRY NEWS

CYBERSECURITY PROJECTED TO DRIVE $7.6 TRILLION OF DIGITAL VALUE OVER THE NEXT DECADE In a business environment, being transformed by digital disruption at an unparalleled rate, companies that make cybersecurity a vital foundation of their digital growth strategies are uniquely positioned to take advantage of new innovation and growth opportunities to help them realise financial benefits. “Cybersecurity as a Growth Advantage,” a research study conducted by Cisco (NASDAQ: CSCO), reveals that more than 30% of executives view cybersecurity primarily as an enabler of growth tied to digitisation. One-quarter of the survey’s respondents exhibited characteristics of security-led digital organisations due to their commitment to growth through digitisation, with cybersecurity as a critical foundation. Security-led digitisers feel more prepared than others to address cybersecurity challenges in three key digital technology areas: analytics, Internet of Things (IoT), and cloud computing. As a result, these organisations are far more confident about incorporating digital technologies into their business processes and offerings. In fact, 44% of executives surveyed

consider cybersecurity to be a competitive advantage for their organisations. Cisco estimates that cybersecurity will drive $7.6 trillion of digital value over the next decade. More than three-quarters of this amount – $5.8 trillion – will result from cybersecurity’s enablement of digital use cases that instigate innovation and growth. Conversely, a lack of cybersecurity strategy can cripple innovation and slow business, because it can hinder development of digital offerings and business models. Seventy-one percent of executives said that concerns

over cybersecurity are impeding innovation in their organisations. Thirty-nine percent of executives stated that they had halted mission-critical initiatives due to cybersecurity issues. The global survey includes input from more than 1,000 C-suite and line of business executives, with significant cybersecurity experience and responsibilities, from 10 countries. For additional findings, head to www.asial.com.au/news. To read ‘Cybersecurity for senior executives’, by Australian Information Security Association Ltd (AISA) CEO Arno Brok, turn to page 24.

REVISED MIGRATION OF LEGACY SERVICES INDUSTRY GUIDANCE NOTE The deployment of Australia’s upgraded broadband network being deployed by nbn will create significant change within the Australian telecommunications environment. Under the new arrangements the majority of telecommunications services will be progressively transitioned from circuit-switched copper-based network technology to the new fibre-based and other Multi-Technology Mix (MTM) access networks where voice services will be delivered using Internet Protocol (IP) standards. One of the consequences

14 | JUNE 2016 | SECURITY INSIDER

of these changes is the effect on non-telecommunications ‘Over the Top’ (OTT) devices that make use of copper-based telephony services for their operation. These OTT devices include (but are not limited to) the following: • Personal medical and back to base security alarms (referred in this paper as alarm services); • EFTPOS / payment systems; • Monitored fire alarms; and • Lift emergency phones (emergency phones in lifts of multi storey buildings).

The Communication Alliance has now published the updated Industry Guidance Note (IGN 004). ASIAL has contributed to the revised IGN as an NBN OTT Services Transition (NOST) Working Group Member. View the full document at www.asial.com.au/news. The information covered in this paper focusses on the migration of legacy services off the copper networks as determined by the Migration Plan. The principles contained apply generally to legacy services, although there may be certain specific considerations required for certain legacy services, such as monitored medical alarms, security alarm panels, monitored fire alarms and lift emergency phones which are connected to back-to-base monitoring centres (which are called out in the document where appropriate).


INDUSTRY NEWS

NEW INDUSTRY SERVICE - CLASS 5 CAPABILITY CERTIFICATION Recognised as the leading body for grading security monitoring centres in accordance with AS2201.2, ASIAL has announced a new service for the electronic security market; Class 5 Capability Certification. This capability recommendation is based on AS/NZS 2201.1 2007 and its referenced standards. The control equipment may be capable of meeting Class 5 Capability Certification subject to full ongoing compliance with the referenced documentation. As part of the certification process, the equipment supplier completes a detailed Compliance Statement, together with associated test procedures. The actual Class 5 Capability Certification will list the name of the

control equipment, plus the revision number and date of the: • Installer Manual • Routine Maintenance Manual • Installer Compliance Statement • Client Compliance Statement The last two documents may also be used as a basis for system compliance audits following installation. Certification is for a period of two years and all documentation must be maintained for that period. The supplier must agree that: • the required documentation will be maintained up-to-date for the period of the Certification, with ASIAL being advised in writing of any such changes, and • they will maintain compliance throughout the certification.

Any changes that may have an impact upon this will notified to ASIAL within 14 days. ASIAL may withdraw and cancel a certificate should it become aware of any non-compliance during the certification period. The new service offered by ASIAL will provide you with options to better align your long term product strategy and provide greater predictability for development success. To apply for certification please visit www.asial.com.au/resources for more information.

‫ ؟ ؟‬PUZZLED ? ? ABOUT WHERE TO BUY SECURITY PRODUCTS

ONE-STOP SECURITY SOLUTIONS PROVIDER info@n2ndistribution.com www.n2n-group.com

AMAZING PRICES WITH EXCELLENT CUSTOMER SERVICE SECURITY INSIDER | JUNE 2016 | 15


INDUSTRY NEWS

RAISING AWARENESS OF ASIAL MEMBERS AMONG CONSUMERS In early 2016, ASIAL launched a new high visibility Consumer Awareness Campaign to promote the use of licensed security professionals who are ASIAL Members to decision makers in SME, Corporate and Government organisations around Australia. The offline campaign comprised primarily of digital screen advertising in CBD office towers and domestic airports around Australia. The CBD tower screens had a reach of 1, 126, 007 viewers across 268 sites. The domestic airport advertising comprised 44 digital panels at six domestic airports, which had a reach of 2, 173, 077 viewers. Offline advertising continues in selected trade publications, while the campaign continues online, with website and social media marketing. All advertisements have sent consumers to the SecureBiz Quiz at

www.securebiz.com.au, where they complete a 10 question survey that generates a diagnostic based on the information submitted. These results encourage consumers to seek out a licensed security professional who is an ASIAL Member for expert advice. Meanwhile, we’ve been able to collect some interesting insights into how secure Australian businesses are. Some interesting insights so far include: • Around 70% of participants consider security to be an important or increasingly important part of their business. o However 43% of participants say they don’t have a security plan o And only 42% review their security needs on an annual basis • That’s despite 58% rating the level of risk they face as moderate to high and 53% saying they have experienced

security threats or incident/s • 57% of participants say they use a licensed security professional to meet their security needs, but concerning the other 43% say they o Don’t have any security systems o Do it themselves o Hire a local tradesman or handyman Data will continue to be collected until December 2016, with a full report on findings made available to members in early 2017. Meanwhile members providing security services to Australian businesses are encouraged to use the SecureBiz Quiz as a marketing tool.

Professional Courses Delivered By Internationally Experienced Canine Law Enforcement Experts. • •

Certificate III in Security Operations Guard Dog Handlers Course (1D)

• Security Dog Operations Course • Detection Dog Operations Course

W: dogforceaustralia.com.au

E: info@dogforceaustralia.com.au P: 0447 809 444

16 | JUNE 2016 | SECURITY INSIDER

Training available in NSW, Queensland and Tasmania RTO No. 41371 | NSW Police SLED Approved Training Organisation


INDUSTRY NEWS

IED GUIDELINES FOR PLACES OF MASS GATHERING The Improvised Explosive Device Guidelines for Places of Mass Gathering (IED Guidelines) have been released and were developed by the Australia-New Zealand Counter-Terrorism Committee (ANZCTC) to guard against the threat of IEDs. This information is designed to help governments and businesses protect Australians from the potential use of IEDs in places of mass gathering and to prevent, prepare for and respond to an attack. This information is not in response to any specific threat. While Australia’s threat level remains at probable – which means credible intelligence, assessed by our security agencies indicates that individuals or groups have developed both the intent and capability to conduct a terrorist attack in Australia – the incidents overseas highlight the need to be prepared.

The ANZCTC developed these IED guidelines over the last two years, based on international and domestic research and important lessons learned from international attacks. These guidelines supplement other publicly available national guidance developed by the ANZCTC, including the National Guidelines for the Protection of

Places of Mass Gathering from Terrorism and the second edition of the Active Shooter Guidelines for Places of Mass Gathering. These guidelines and other information on what business and the public can do to prevent, prepare for and respond to an attack are available on the National Security website at www. nationalsecurity.gov.au.

Close more sales Remove the upfront cost barrier

You can now offer clients:

$0 upfront – system & installation costs financed Instant approval and signing at point of sale Payments treated as operating expense* Fully tax deductible* * All applications to Security Lease are subject to normal approval criteria, and terms and conditions apply. No part of this document is to be construed as an offer capable of acceptance or as a solicitation to obtain a financial product. The information is not an expression of opinion or recommendation and does not constitute financial, accounting, taxation, general or personal advice and should not be relied upon as such. The recipient should make their own assessment of any product or service referred to in this document and seek appropriate advice.

For a free demonstration call us  1300 795 695

www.securitylease.com.au

SECURITY INSIDER | JUNE 2016 | 17


ADVERTORIAL

DON’T GET LEFT OUT IN THE COLD…

SEE THE LATEST INNOVATIONS AT THE SECURITY EXHIBITION

W

ith so many existing products and services in the market today, Executives are often left wondering which type of platform is the best fit and what to look for when considering a security solution. Organisations considering their security alternatives should be certain that the solution they choose: • easily integrates into existing systems; • allows mobile access for better responsiveness and control; • correlates data in real-time; and • incorporates helpful tools to create a smart, comprehensive strategy to ensure an organisation’s efficiency through managing and mitigating risk. As an organisation’s security needs change and evolve, so too should their solutions. Preparing for the future today will help ensure your security function is ready to meet the challenges of tomorrow. When it comes to security, proactive is always more efficient than reactive. So time spent finding the best solution is time saved fixing breaches and problems down

18 | JUNE 2016 | SECURITY INSIDER

the line. The Security Exhibition & Conference, which is returning to the Melbourne Convention and Exhibition Centre from July 20 - 22, connects a community of leaders and showcases the most innovative solutions to hit the Australian market, supporting the future direction of the security industry. With more than 170 brand leaders and 4,500 industry professionals from 20 countries in attendance it’s safe to say that your time spent at this year’s premier security industry event will help you get the job done. Due to popular demand live demonstrations will offer attendees the possibility for an interactive and tangible product experience. The live demonstrations will feature an exciting and diverse range of cutting edge technologies and equipment, from a vast host of exhibitors, which will address the growing demand for more sophisticated solutions. As the only event that annually that brings together the upper echelon of the security industry under one roof, the Security Exhibition also features the

renowned ASIAL Conference. Aimed at security end-users, offering a tailored education experience across three days, the conference program features a world class line up of expert speakers who will discuss strategies, present case studies and provide workshops to combat the changing security threats and challenges faced by business, government and the broader community. Find out more on page 10. Ultimately, the Security Exhibition & Conference presents an unmissable yearly opportunity to reunite you with your peers whilst discovering and experiencing the latest cutting-edge products and innovations to hit the marketplace. Visit www.securityexpo.com.au to find out more and register now. Use promo code INSIDE when registering.

RELATED ARTICLES Learn from security industry leaders, page 10 The security industry’s night of nights, page 12 Cybersecurity for the boardroom, page 24


THE ANNUAL REUNION FOR AUSTRALIA’S SECURITY INDUSTRY SOURCE

LEARN

NETWORK

1000’s OF PRODUCTS & SOLUTIONS

THE LATEST TRENDS & TECHNIQUES

WITH YOUR INDUSTRY PEERS

PRINCIPAL EXHIBITION SPONSOR

LEAD INDUSTRY PARTNER

ORGANISED BY

REGISTER ONLINE NOW SECURITYEXPO.COM.AU USE PROMO CODE INSIDE WHEN REGISTERING


2016 RECOGNISING EXCELLEN AWARDS FOR EXCELLENCE

AUSTRALIAN SECURITY

Organised by the Australian Security Industry Association Limited (ASIAL) and World Excellence Awards, the event is designed to be both independent and inclusive, providing an opportunity for outstanding performers, whether buyers or suppliers, to be recognised and their successes to be celebrated. Over the course of two decades the Australian Security Industry Awards for Excellence has provided recognition for hundreds of Australian security companies and individuals. The event also provides a chance to showcase the outstanding pool of professionals working within the security industry. For a second successive year, ASIAL will host its awards in collaboration with the Outstanding Security Performance Awards which form part of a global initiative with events in Germany, Norway, Poland, Romania, United Kingdom and United States of America. Once a core number of national OSPAs programmes are established it is World Excellence Awards intention to enter OSPA winners into a worldwide OSPA. In all countries the aim is to 20 | JUNE 2016 | SECURITY INSIDER

encourage security associations to come together to celebrate excellence and the outstanding performers in their country. In Australia this is no different. ASIAL is once again the lead partner and organiser. The other industry partners include ASIS, AISA and Security Professionals Australasia. Nominations will be assessed by an independent panel of judges chaired by an ASIAL representative, who does not vote in selecting a winner. The 2016 judging panel includes: • Damian McMeekin, Head of Group Security, ANZ Bank Damian joined ANZ in 2005 after working previously in the Australian Department of Foreign Affairs & Trade. He is on the Boards of the International Banking Security Association, International Security Management Association, the not-for-profits iDcare and Australian Security Medals Foundation. • Mark Edmonds, Manager, Security Capability, Sydney Trains Mark Edmonds has been with Sydney Trains for almost ten years, having previously been the Security

Risk Manager for Qantas Airways. He is currently responsible for improving security outcomes in Sydney’s rail network though the use of technology and business processes. • Chris Beatson, Director, NSW Police Force - PoliceLink Command Chris’s Command employs approximately 400 personnel, operates 24/7, 356 days of the year, and receives over 32,000 contacts per week. In 2014 Chris was awarded the prestigious International Crime Stoppers ‘2014 Civilian of the Year Award’ in Cape Town South Africa. • Vlado Damjanovski, CCTV Specialist, ViDi Labs Pty Ltd Vlado Damjanovski is an author, inventor, lecturer and closed circuit television (CCTV) expert based in Sydney, who is well known within the Australian and international CCTV industry. Through his company ViDi Labs he provides consultancy, design


AWARDS FOR EXCELLENCE

ENCE IN THE TY INDUSTRY The 21st annual Australian Security Industry Awards for Excellence and 2nd annual Outstanding Security Performance Awards provide a platform for exceptional security companies and individuals to be recognised. & project management, systemcommission, product testing, desk-top publishing and training. • John Adams, Editor, Security Electronics Magazine SEN’s editor John Adams has been covering the security industry since 1991, first as editor of Security Australia Magazine, then as editor of Security Electronics & Networks Magazine, first published in 1998. John provides a holistic and historical sense of electronic security technology, as well as considerable exposure in Australia and overseas. • Sean Giddings, Director of Security Operations, Australian Parliament House. Australian Security Industry Awards for Excellence categories • Individual Achievement – General Security • Individual Achievement – Technical Security • Individual Achievement – Security Student • Gender Diversity • Indigenous Employment • Special Security Event or Project (under $200, 000)

• Special Security Event or Project (over $200, 000) • Integrated Security Solution (under $200, 000) • Integrated Security Solution (over $200, 000) • Product of the Year (Alarms, Access Control, CCTV, Communication/ Transmission System) Outstanding Security Performance Awards categories • Outstanding In House Security Team • Outstanding In House Security Manager • Outstanding Contract Security Company (Guarding) • Outstanding Security Consultant • Outstanding Security Training Initiative • Outstanding Security Partnership • Outstanding Investigator • Outstanding Police / Law Enforcement Initiative • Outstanding Risk Management Solution • Outstanding Cyber Security Initiative • Outstanding Female Security Professional

Award nominations are now being accepted via www.asial.com.au. Any company or individual working in the Australian security industry is entitled to enter.You may nominate more than once in multiple categories. Detailed information on the criteria for each of the award categories along with the conditions of entry can be found at www.asial.com.au. Awards Ceremony and Dinner The awards will be presented at The Westin, in Sydney’s iconic Martin Place, from 7pm on Thursday 20th October 2016. Media personality James O’Loghlin will emcee the event.You may recognise James O’Loghlin from Good News Week, Rove Live, Sunrise, Lateline, The Evening Show and more than 300 episodes of The New Investors. For further information on the event visit www.asial.com.au. Thank you to our Lead Dinner Sponsor:

SECURITY INSIDER | JUNE 2016 | 21


19335_ASIAL A4 PROGRAM.ai

1

24/05/2016

5:31 pm

ASIAL Individual Professional Recognition Program An individual recognition program for security professionals committed to the highest standards.

Setting the benchmark for security professionals.

The ASIAL Individual Professional Recognition program sets the benchmark for security professionals looking to progress their careers and to be recognised by employers, peers and clients. Individuals who meet the entry criteria are eligible to receive the post-nominal credential of either MASIAL, AFASIAL, FASIAL or FASIAL (Life). Post-nominals provide a clear picture of an individual’s security experience and capability, a commitment to practice in accordance with the highest professional and ethical standards and a strong affiliation with the Association. Four levels of post-nominal recognition are available: • Member – MASIAL – 3+ years industry experience – someone who is looking to grow and develop their career in the security industry. • Associate Fellow – AFASIAL – 10+ years industry experience – a security professional committed to developing their professional skills and advancing the industry as a whole. • Fellow – FASIAL – 20+ years industry experience – an experienced and respected industry leader who has contributed significantly to the growth and development of the industry. • Life Fellow – FASIAL (Life) – awarded to individuals who have provided distinguished service to the industry.

ASIAL Post Nominals can be used on your email signature block, on business cards, in resumes or in other formal correspondence, and all eligible members are encouraged to display them proudly. How does the program work? Successful applicants need to meet the eligibility criteria to participate in the program. These include educational qualifications, security industry experience, professional achievements, individual membership of ASIAL and adherence to the ASIAL Code of Professional Conduct. Who can participate? Anyone committed to pursuing a career in the security industry. What’s in it for me? In a word – Recognition. Employers and clients will see you for what you are – qualified, experienced and professional. Participation in the program will differentiate you from others in the industry and demonstrate your commitment to ongoing professional development to maintain your competitive edge. Participation in the ASIAL Individual Professional Recognition Program shows you are a security professional recognised by your peers for the experience and qualifications you have attained. It is a benchmark of your expertise and a measure of your career progress.

What’s in it for employers? As an employer, when you hire an individual participating on the ASIAL Individual Professional Recognition Program, you are selecting a candidate whose skills and experience have been assessed against professional standards set by the security industry’s peak national body – ASIAL. The program provides a valuable measure of an individual’s expertise and capability. How do I apply? Read through the criteria to see whether you meet the eligibility criteria. If you do, then complete the application form and provide evidence of your achievements that includes, a resume or CV, copies of certificates/evidence of your education qualifications, written recommendations, along with evidence of your experience working in the security industry. If you do not meet the eligibility criteria, for example you are a recent entrant to the industry with less than 3 years demonstrated security industry experience, you can apply to become an individual member of ASIAL. Once you are able to meet the eligibility criteria you can then apply to enrol on the ASIAL Individual Professional Recognition Program.

To enrol in the program go to www.asial.com.au/professional


19335_ASIAL A4 PROGRAM.ai

2

24/05/2016

5:31 pm

ASIAL Individual Professional Recognition Program Recognition Level/Post Nominal

Cost

Eligibility Criteria

(incl. GST)

(applicants must satisfy the criteria specified below)

Benefits

MEMBER MASIAL

$195.00 per year

• Evidence of a minimum of three years demonstrated security industry experience in an operational, consultancy, technical or management capacity; • Two current letters of recommendation from an employer/client; • Qualification of a Certificate III or higher; • Where an individual is not the holder of a current security licence, a current National Police Check is required; • Fulfilment of the ASIAL Individual Professional Recognition Program Continuing Professional Development requirement of 12 points per year; • Adherence to the ASIAL Code of Professional Conduct.

• Use of the post-nominal credential – MASIAL – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development activities; • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Visual identifiable recognition through a lapel pin displaying your recognition level; • Access to an online community of MASIAL members.

ASSOCIATE FELLOW AFASIAL

$215.00 per year

• Evidence of a minimum of ten (10) years demonstrated security industry experience in a senior operational, consulting, technical or management capacity; • Two current letters of recommendation from an employer or client; • Qualification of a Certificate IV/Diploma or higher level; • Where an individual is not the holder of a current security licence, a current National Police Check is required; • Fulfilment of the ASIAL Individual Professional Recognition Program Continuing Professional Development requirement of 12 points per year; • Adherence to the ASIAL Code of Professional Conduct. • Evidence of contribution to advancing the security industry which can include, but is not limited to, activities such as presenting/lecturing, writing and contributing to academic papers, participation on standards development/industry committees or advisory groups.

• Use of the post-nominal credential – AFASIAL – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development. • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Visual Identifiable Recognition through a lapel pin displaying your recognition level; • Access to an online community of AFASIAL members.

$235.00 per year

• Evidence of a minimum of 20 years demonstrated security industry experience in a senior operational, consulting, technical or management capacity; • Three written references / testimonials from senior executives, specifically supporting the application for fellow and addressing the criteria of the nominee’s security expertise, demonstrated service and commitment to the security community; • Qualification of a degree or higher qualification*; • Where an individual is not the holder of a current security licence, a current National Police Check is required; • Fulfilment of the ASIAL Individual Professional Recognition Program Continuing Professional Development requirement of 12 points per year; • Adherence to the ASIAL Code of Professional Conduct. • Evidence of contribution to advancing the security industry which can include, but is not limited to, non-work related activities such as presenting/lecturing, writing and contributing to academic papers, participation in standards development, mentoring, participation on industry committees or advisory groups.

• Use of the post-nominal credential – FASIAL – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development activities; • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Visual Identifiable Recognition through a lapel pin displaying your recognition level; • Access to an online community of FASIAL members.

(includes Individual annual Membership fee) plus one off application fee of $65.00.

(includes Individual annual Membership fee) plus one off application fee of $65.00.

FELLOW FASIAL

(includes annual Individual Membership fee) plus one off application fee of $65.00.

LIFE FELLOW FASIAL (LIFE)

No annual fee is payable.

The Board of ASIAL may, at any time by resolution, invite a person to become a Life Fellow on the grounds of their distinguished service to the industry and the Association. In order to be eligible the individual must have been a Fellow of the Association for at least 5 years. Life Fellows are not required to undertake the ASIAL Professional Recognition Program professional development requirement.

*individuals who do not possess a degree or higher qualification but who can provide demonstrated evidence of 30 years + security industry experience in a senior operational, consulting, technical or management capacity are eligible to apply as a Fellow.

• Use of the post-nominal credential FASIAL (Life) – on business cards, email sign-off, CV and other materials; • Discounted rates on ASIAL professional development activities; • Subscription to Security Insider magazine; • Subscription to First Alert eNewsletter; • Access to an online community of FASIAL members.

Raising the level of professionalism and expertise in the security industry. To enrol visit www.asial.com.au/professional


CYBERSECURITY

CYBERSECURITY FOR SENIOR EXECUTIVES g

By Arno Brok, CEO, Australian Information Security Association Limited (AISA)

Technology has revolutionised how many of us live and work. The internet, with its three billion users, is powering economic growth, increasing collaboration and innovation, and at the same time creating jobs. Reliance on technology is rapidly increasing as Australian businesses adopt more digital services to provide simpler and faster services. Now, users expect high quality services that also assure security of their information.

C

ybersecurity is becoming a key topic for many organisations and executives. The threat landscape has evolved significantly over the past 20 years due to the increased use of technology as well as the shift from physical to virtual computing. A recent study found that 80% of the total value of Fortune 500 companies consists of intellectual property (IP) and other intangible assets. Organisational risks associated with cybersecurity challenges have evolved to include traditional threats by ‘old school’ hackers taking systems down, to a more modern view with a bigger impact. Many organisations have conducted a threat assessment and have an educated focus on how the loss of Intellectual Property (IP) and Personally Identifiable Information (PII) can impact their business, through the destruction or alteration of corporate data; negative impact in public confidence; harm to reputation and branding; disruption to critical infrastructure; and organisations are

24 | JUNE 2016 | SECURITY INSIDER

now thinking about how the new legal/ regulatory sanctions could affect them both legally and financially. Each of these risks can adversely affect competitive positioning and shareholder value as well as public confidence and trust in the market. Protecting key information assets is critically important to the sustainability and competitiveness of businesses today. Organisations and agencies need to be at the forefront of cyber preparedness and resilience. Cybersecurity is all too often thought of as an IT issue, rather than a strategic or operational risk-management issue. Some organisations and departments feel that because they are relatively small or don’t hold substantial amounts of sensitive consumer data, such as credit card numbers, PII or medical information, that they are unlikely to be the victims of a cyberattack. In fact, cybercriminals target organisations of all sizes and across a range of industry verticals (e.g. health, education, defence, manufacturing, services and finance) seeking anything that might

be valuable, that can be monetised or to simply gain access to another organisation along the supply chain. Historically, many organisations and agencies have categorised information security as a technical issue to be managed by the IT department. This misunderstanding is fed by siloed organisational structures, leading to the view that the responsibility for data resides within IT rather than the business as a whole. As a consequence, the typically resourcestrapped IT department is left to address the security challenges from both a people and/or funding perspective. Furthermore, deferring responsibility to IT inhibits critical analysis and communication about cybersecurity issues and hampers the implementation of effective security strategies. Cyber risks should be evaluated in the same way an organisation assesses all other risks such as physical security of its users and physical assets and the risks associated with their potential compromise. In other words,


CYBERSECURITY

cybersecurity is an enterprise-wide risk-management issue that needs to be addressed from a strategic, cross-departmental and economic perspective. Businesses benefit from managing risks across their organisations, drawing effectively on senior management support, risk management policies and processes, a risk-aware culture and the assessment of risks against objectives. There are many benefits to adopting a risk-management approach to cybersecurity, including: • Strategic benefits: organisational decision-making is improved through the high visibility of risk exposure, both for individual activities and major projects, across the whole of the organisation; • Maintaining community and customer loyalty and trust; • Financial benefits: providing financial benefit to the organisation through the reduction of losses and improved ‘value for money’ potential; and • Operational benefits: organisations are prepared for most eventualities, being assured of adequate contingency plans. The impact of cybersecurity incidents can be far-reaching. Recent high profile incidents show that cyberattacks can strike an organisation’s financial

performance and also inflict unquantifiable reputational damage. The reputational damage to public services will often result in the loss of trust in organisation and their capability to offer secure services to their users. No one is immune. Large and small companies as well as individuals are at risk. As a result, boards and management are being called upon to address cyber risk alongside other risks that face businesses. This means Australian businesses should start to take steps to increase their awareness and understanding of cybersecurity with a view of the potential impact on overall business performance.

So what should CEOs, senior executives, board members and directors do? A primary responsibility of every board of directors is to secure the future of its organisation. The very survival of the organisation depends on the ability of the board and management not only to cope with future events, but to anticipate the impact those events will have on both the company and the industry as a whole. Forty-one per cent of respondents to a recent survey of Australian security professionals believed that the CEO should hold ultimate responsibility for

breaches, with only 6% believing it should be the responsibility of the Chief Security Officer (CSO). Therefore, cybersecurity is one such topic for which businesses must demand information and insight. The overwhelming number of cybercrime incidents has forced organisations to become more educated about the topic and ask strategic and thoughtful questions directed toward management and internal auditors. Some of the highest profile data breaches to date have had little to do with traditional hacking. For example, spear phishing, a common e-mail attack strategy that targets specific individuals, is a leading cause of system penetration. Product launches or production strategies that use long, international supply chains can magnify cyber risk. Similarly, mergers and acquisitions (M&A) requiring the integration of complicated systems, often on accelerated timelines and without sufficient due diligence, can increase cyber risk. Another obstacle organisations face in creating a secure business environment is interconnection with its partners, suppliers and affiliates to deliver services or products to customers. This can be seen in many of the recent breaches highlighted in the SECURITY INSIDER | JUNE 2016 | 25


CYBERSECURITY

media, where too often, the breach did not actually start within the target company’s IT systems, but through vulnerabilities in one of their vendors or suppliers. Organisations are often interconnected with elements of the national critical infrastructure, raising the prospect of corporate insecurity becoming a matter of public security or even affecting national security. As a result, boards should ensure that management is assessing cybersecurity not only as it relates to the organisation’s own networks but also with regard to the larger ecosystem in which the organisation operates. Progressive boards and councils will engage management in a discussion of the varying levels of risk that exists in the organisation’s ecosphere and take them into consideration as they calculate the appropriate cyber risk posture and tolerance for their own organisation or department. Organisations should also understand what ‘crown jewels’ the organisation should protect and ensure that management has a protection strategy that builds outward from those high-value targets. The board should guide management to consider not only the high-probability attacks and defences, but also low-probability, high-impact attacks that would be catastrophic.

Cyber risk oversight responsibility at the board level Organising the board to manage the oversight of cyber risk and more broadly, enterprise-level risk oversight is a matter of considerable debate. We see a large percentage of boards continue to assign the majority of tasks related to risk oversight to audit committees. We strongly believe that risk oversight should be allocated to the full board and not the audit committee. Therefore, chairs of boards, board executives and directors need to understand and approach cybersecurity not just an IT issue but also as an enterprise-wide operational riskmanagement issue.

Identifying the company’s ‘crown jewels’ 26 | JUNE 2016 | SECURITY INSIDER

Executives should engage management in a discussion of the following questions on a regular basis: • What are the organisation’s most critical data assets (what are our ‘crown jewels’)? • Where does it reside (one or multiple systems, internally or externally)? • How is it accessed and by whom? • How is it protected (what controls and how often are those controls assessed)? • What dependencies are there on suppliers or vendors (3rd parties)? • What is the organisational plan if the data assets are compromised (destroyed or stolen)? IT departments will implement security controls based on their best knowledge of the systems they manage on behalf of the business or agency. These departments are often too far removed from the business or agency to have a comprehensive understanding of what are the most critical data assets. Many IT departments apply their limited resources to keeping the lights on, rather than focusing on cybersecurity. It is therefore imperative not to relegate the cybersecurity topic to the IT department. Councillors and Directors need to take an active role in the organisation’s cybersecurity, or face the possibility of potential lawsuits and even the possibility of being removed from their position. Only by working collaborating with the IT Department will Executives and Risk Managers gain an understanding of: • data assets within the organisation; • appropriate security controls required to protect the data asset; • resources (people and funding) required to adequately implement, manage and monitor security controls.

Cyber mastery in the boardroom Despite the significant escalation of risks posed by the use of technology, many boards have found it challenging to develop a comprehensive response. Generally, IT expertise is lacking at the board level. Recent studies revealed that more than three quarters of public

company respondents admitted that they personally could use more IT knowledge, and almost 90% felt their board’s IT knowledge could be improved. Notably however, a demand for IT experience generally has not surfaced in director recruitment. Apart from the IT industry, which has an above-average need for directors with IT expertise, this area of expertise was viewed as ‘most important’ for just 7.8% of directors of companies recruiting in 2013. How much knowledge is enough? Lack of boardroom expertise makes it challenging for directors to effectively oversee management’s cybersecurity activities. Without sound knowledge of, or adequate sensitivity to the topic, our most senior leaders cannot easily draw the line between oversight and management. The board may overly rely on C-suite experts, such as the chief information officer (CIO), chief technology officer (CTO), or chief security officer (CSO), who can lead the dialogue into technical areas beyond the realm of oversight. Once ‘in the weeds’, directors can find it difficult to assess the appropriate level of involvement in risk management. A lack of technical comprehension, or even inadequate planning by management for board meetings to discuss cybersecurity, can easily result in poor communication and information sharing from the C-suite. Are directors adequately equipped to understand the information they receive from management? Are organisations confident that their boards possess a director with the necessary expertise to provide effective oversight in regard to cybersecurity? Generally, directors are significantly less likely to challenge what is presented at board meetings when they lack knowledge of the topic. In the face of this real and urgent threat to oversight, should directors be experts in cybersecurity? AISA’s view is that directors should have the basic cybersecurity knowledge to ask management suitable questions when it comes to determining the organisations risk exposure. In many boardrooms the rapid rise of cybersecurity has often left directors struggling to find the balance


CYBERSECURITY

between the necessary comprehension and expertise.

The ‘people’ component Leading practices and policies surrounding cybersecurity are rendered ineffective if employees are not trained in their use. Cybersecurity at its core is a human issue. Too often the biggest problems are caused by an unintended employee clicking on a link or opening an infected attachment or leaving highly confidential information in a public area. In effect ‘people are the constant weakness’. Their actions are frequently the result of careless behaviour rather than malicious actions. In my discussion with directors of various organisations, they repeatedly emphasised the need for ongoing training and consistent implementation of appropriate procedures in order to embed cybersecurity awareness into the organisation’s culture at all levels. Data privacy and cybersecurity should be part of the organisation’s brand. Having cyber-aware staff is an important line of defence and could be more effective than a technology security perimeter. Although many technologies will prevent the delivery of a large number of threats from reaching individual employees, there is always a risk that an unidentified threat could reach employees and there is no technology that can prevent users from opening these unidentified links or files. As a consequence adversaries use flaws in human behaviour to easily trick the average user time and time again. Once clear standards and practices are established, companies must focus on employee education and awareness. A strong communications program that heightens the overall awareness of cyber risk greatly complements strong technical security controls (e.g. firewalls, antivirus, antispyware, and web-filtering

technology). To reduce the negative impact of cyber threats on the business, all employees should understand how the organisation’s commitment to security translates into specific policies and required procedures, avoid risky behaviour and respond quickly once an incident has been detected. Employees across the organisation should have at least some foundational training that covers the purpose and importance of cybersecurity. In addition employees should also have an understanding or appreciation of how they can be tricked by unauthorised users or cybercriminals. This will help them to understand the benefits of implementing cybersecurity controls that are not technical in nature.

Cyber resilience Once organisations accept that cyberattacks will be made against their organisations and will be successful, they can move to the next step: becoming more cyber resilient. As stated by APRA: “Cyber resilience is the ability to prepare for, respond to and recover from a cyberattack. Resilience is more than just preventing or responding to an attack, it also takes into account the ability to operate during, and to adapt and recover, from such an event” Although this is targeted at APRA’s

regulated population, to support investor and financial consumer trust and confidence, AISA feels that similar basic cyber hygiene should be applied by all organisations and the right place to start is in the boardroom.

In conclusion Managing cybersecurity risk requires informed decision making throughout the organisation or agency, based on reliable insights and intelligence. The tone of cybersecurity has to be set by the board and executive management. Unfortunately, as in a majority of cases, speed of change has taken place in technology and cybersecurity risks are commonly least understood by the board and executive management. Cybersecurity will continue to pose a serious risk that executives (chairs of boards and board directors) need to actively measure and continuously monitor as part of the organisation’s overall strategy. The questions outlined in this article should be used to initiate discussions with management as the onus is on the executives to take its strategic role seriously in: providing oversight, implementing a robust cybersecurity resilience plan and ensuring that plan becomes a necessary line of defence in cybersecurity governance.

Arno Brok will deliver a presentation titled ‘Cyber Security for the Boardroom’ as part of the ASIAL Security Conference, being held from 20-22 July at Melbourne Convention and Exhibition Centre. This session will provide tools to ask those pertinent questions and start the dialogue to identify the balance between security and ease of usability within an organisation’s IT structures. More information on speakers, sessions and how to register your attendance at the ASIAL Security Conference can be found on page 10.

About the author Arno Brok is the first CEO to be appointed by the AISA Board of Directors. Having proven himself as a leader within AISA, Arno shares the Board’s vision to continue delivering value to members, the community, and the industry. Arno has been an executive with AISA since 2008 and in the role as National Director since December 2013. Arno’s experience within AISA is supported by considerable commercial experience, most recently as Director of Information Security, Audit and Advisory firm Protiviti, and in similar positions at BAE Systems, Deloitte and Accenture. SECURITY INSIDER | JUNE 2016 | 27


WORKPLACE RELATIONS

EMPLOYMENT

CONTRACTS WORTH THE EFFORT? g

By Chris Delaney, ASIAL Industrial Relations Advisor

At ASIAL we get many enquiries about employment contracts. Unfortunately these are often after something has gone wrong in the employment relationship and there is a dispute about the terms of employment. Disputes are much more easily resolved if a well-crafted employment contract was agreed at the recruitment stage. Here Chris Delaney discusses employment contracts, Confidentiality and Restraint Clauses for your businesses. Properly constructed and written employment contracts are essential in setting the ground rules of the relationship between the employer and the employee. Combined with the Fair Work Act 2009 (Cth) (the Act), the National Employment Standards (NES) and the Modern Award provisions, well crafted agreements also limit risk for employers and provide probative assistance when resolving workplace disputes. Like with any contract, the law requires certain conditions to be met before it will recognise an employment contract. These include: • An offer of employment which has been accepted by the prospective employee; • Each party must provide 28 | JUNE 2016 | SECURITY INSIDER

consideration in return for the obligations undertaken by the other party (wages, labour); • There must have been intention by the parties to enter into a legal relationship; • The parties must be capable of entering into a contract; and • The agreement must be clear and comprehensive. In developing employment contracts there are many areas an employer must consider to include, such as: • Name of employer (full name and ABN or ACN) and employee • Position Title • Commencement date • Type of employment (full-time, part-time or casual) • Classification (if under a modern award) • Hours of work • Confidential Information • Restrictions on working for other employers • Flexibility Agreements • Wages and Salary details, including any entitlement

to bonuses or commission payments • Allowances, Equipment provided and work related expenses • Leave entitlements • Probation period • References to Position Descriptions, Policies and Procedures, NES, Award or Enterprise Agreement • Termination and/or Redundancy provisions • Notice periods • Restraints This list is not comprehensive, as many terms will depend on the role and nature of the employment relationship, and may need to be supported by the legislation that affects employment arrangements.

Factors To Consider When Paying Aggregated Wages or Annualised Salaries • Is there a “set-off” clause in the employment agreement that will allow some award conditions, allowances, or leave loading to be covered by the over award


WORKPLACE RELATIONS

component if the salary? • Does the Flexibility Agreement (FA) clause in the Award or Enterprise Agreement allow FAs to be made about the payment of overtime, penalty rates and allowances? • Is the employee covered by an award, which provides for annualised salaries? • If the arrangement is pursuant to an employment contract or award provision, is the annual salary sufficient to compensate the employee for all of their entitlements – does it pass the BOOT? (Is the employee “better off overall” than if the Award and or NES were applied?)

Making variations to the contract of employment • In the case of employees covered by a modern award consultation will be necessary. • Does the employment contract provide for variations in work or type of work? • Do you have a term in your employment contract that states the terms of the contract continue to apply regardless of changes to an employee’s position, wage/salary and location?

Termination Provisions in the Contract Minimum notice periods are set by the NES. In the absence of a defined notice period, particularly with more senior employees a court may decide on “reasonable” notice upon termination. This may vary from case to case, however, for senior or executive employees, this could be something far greater than the minimum periods set out in the Act and NES; in some cases Courts have determined that 12 months notice or salary in lieu of notice will be considered reasonable.

When determining the appropriate notice period consider: • What type of employment agreement is it (fixed term, maximum term, permanent or casual)? • How much notice do you want the employee to give you if he/ she resigns? • Does the employer have to give the same notice? • Is less notice required in the probationary period?

Include bonus and commission • These may be a clause in the contract or a separate letter. • Conditions, KPI’s, Sales targets should all be clear and unambiguous. • Calculation should be simple. • Eligibility should be only while in employment with the company. • There should be an opportunity to review and change at the discretion of the employer. • Is superannuation included in the amount or do you have to pay superannuation on top of the bonus/commission?

Drafting a restraint clause • The clause should clearly identify the employer and should be varied if there is a name change, transfer of business or takeover. • Ensure all clauses make sense. The periods of restraint and geographical areas for various acts should be relevant and reasonable. • Include an acknowledgement that the restraint(s) and the reasons for them are necessary and reasonable. • Competitors should be clearly defined and/or specifically identified. • Consider what kind of postemployment restraint would provide a reasonable protection

for the business.

Defining what is “Confidential Information” What is confidential information? The legal definition of “confidential information” is in most instances too vague. You need to determine what is confidential for your business and what you want/need to protect. Answering the following questions will assist in developing an enforceable confidentiality clause: • How widely is the information is known in the public domain? • How much the information was known by employees and others within the organisation? How much time and resources have gone into developing the information? • Is the information something that others may already have or is it unique to your organisation? • Is access to the information protected and if so how strongly? • Is the information of to the organisation and its competitors?

What should be in a Confidentiality Clause? Ideally you should have a contractual term that sets out what information is confidential and prohibits employees from misusing the information. If there is specific information or there certain documents that you want to protect, then describe them in the contract. This might not always be possible, things change, so it will still be necessary to have a properly constructed universal clause that will prevent the use and disclosure of confidential information. Any and all of your trade secrets (if developed by your organisation), will be confidential. Your client lists, pricing or costing data, contact lists (stored electronically on a SECURITY INSIDER | JUNE 2016 | 29


WORKPLACE RELATIONS

company device are arguably yours, so it is best to ensure this is specifically stated in the contract of employment. Courts have, depending on their content, excluded diaries from the confidentiality restrictions.

Avoiding Confidentiality and Restraint Breaches Remedies for breaches of restraint and/or confidentiality clauses can be difficult and time consuming. Worse than that, the information you sought to protect has already been taken and used. An injunction and compensation might be accessible but often the damage to the business has already been done. When key employees are leaving

your business you should move quickly to protect your intellectual property. The following should enable you to introduce simple strategies that should overcome the need for you to resort to legal action: • Contact your customers as quickly as possible during the employees notice period, let them know the changes that are occurring and secure their commitment to your business. If you neglect the customer at this time you could lose them. • In some instances (where there is a long notice period) it may be appropriate to consider sending the employee on “gardening leave”. • Meet with the exiting employee

and reinforce their post employment obligations in a positive way. • Document the meeting and follow up by formal letter identifying the clauses relevant to confidentiality and restraint in the employment contract. • Send another letter on termination and include a reminder about the restraint, and • Write to the new employer advising them of the employees’ restrictions and postemployment obligations. ASIAL can assist members in drafting employment contracts, confidentiality agreements and all policies necessary for the professional running of your business.

*Chris Delaney is ASIAL’s Industrial Relations Advisor. He can be contacted at ir@asial.com.au Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations specialist.

Teach your trade

30 | JUNE 2016 | SECURITY INSIDER

Flexible employment

Collaborative environment


the peak body for security professionals.

emPOWERing security professionals since 1969 Chat to us while recharging your smart device at Stand B6, Near Express Entrance Bay 16, Door 8.

#ASIALpower


ADVERTORIAL

What the Federal Budget means for Super g

By Georgina Williams, Group Executive Engagement, Advocacy and Brand, AustralianSuper

There were quite a few changes to super proposed in this year’s Federal Budget. AustralianSuper is one of the largest super funds in Australia, managing more than $95 billion on behalf of 2.1 million members. AustralianSuper Group Executive Engagement, Advocacy and Brand, Georgina Williams explains some of the key changes.

WHAT ARE THE CHANGES FOR LOW INCOME EARNERS? Under the current rules, people who earn less than $37,000 a year, receive a Low Income Super Contribution (LISC) of up to $500. This helps to offset the 15% tax low income earners pay on their before-tax super contributions. The LISC was due to be removed next year, but has now been reinstated and will become known as the Low Income Super Tax Offset from 1 July 2017. The Government has also extended the offset for spouse contributions. From 1 July 2017, you could be eligible for a low income spouse offset if you make contributions to your spouse’s super and they earn up to $40,000 a year (previously $10,800) and are under 75 years old. The offset is capped at $540 a year.

WHAT SUPPORT IS THERE FOR PEOPLE WHO TAKE BREAKS FROM THE WORK FORCE? People who have less than $500,000 in super, can make catch-up payments to their super if they haven’t reached their $25,000 a year limit over a rolling five year period (the cap for pre-tax super payments has been reduced). This means they can make higher payments from their pre-tax pay when they’re working to help them grow their super. This is great for women, 32 | JUNE 2016 | SECURITY INSIDER

part-time workers and carers whose super balances often fall behind when they take a career break.

SO, HOW MUCH CAN YOU CONTRIBUTE TO SUPER? From 1 July 2017, the most people can pay into super from their beforetax pay at the concessional 15% tax rate will be $25,000 a year. This includes employer and salary sacrifice contributions and is the same for everyone regardless of age. From 1 July 2017, anyone under 75 can claim a tax deduction for personal payments they make to super up to $25,000. This limit also includes employer contributions. A 15% contributions tax apply. There will also be a lifetime limit of $500,000 on how much people can add to super from after-tax sources. This change is effective from 3 May 2016, and applies to any after-tax payments made since 1 July 2007.

CAN PEOPLE STILL USE A TRANSITION TO RETIREMENT STRATEGY? Yes, you can still use transition to retirement if you’re 56 or over to work less or save more. At the moment, people don’t pay any tax on their investment earnings on money in their income accounts. From 1 July 2017, investment earnings in TTR income accounts will be taxed at 15% until you permanently retire. The new pre-tax contributions caps can also impact TTR members if they’re using this strategy to add more to their super. From 1 July 2017, the most you can add to your super from your pre-tax pay is $25,000 regardless of age. It’s important to note that these changes will need to be passed to become law. We’ll be keeping members updated on any changes, particularly with the federal election coming up. You can find out more about these changes at australiansuper.com.


Run only to benefit members

“AustralianSuper’s size and stability are important to me.” Michael, AustralianSuper Member

AustralianSuper looks after $95 billion* for 2.1 million members. How much better off could you be? Go to australiansuper.com/compare To join, call 1300 300 273

* As at 31 December 2015. Prepared in March 2016 by AustralianSuper Pty Ltd ABN 94 006 457 987 AFSL 233788 the Trustee of AustralianSuper ABN 65 714 394 898. Consider whether AustralianSuper is appropriate for you. Read our Product Disclosure Statement, available at www.australiansuper.com/FormsPublications or by calling 1300300 273, before making a decision about AustralianSuper. Statements made by AustralianSuper members have been reproduced with the members’ consent.


ASIAL NEW MEMBERS

WELCOME TO OUR NEW MEMBERS ASIAL is pleased to welcome the following members who have recently joined the Association. PROVISIONAL CORPORATE MEMBERS

Redfish Technologies Pty Ltd

Israil Zahida Begum t/a Holler Security

Safeguard Protection Group Pty Ltd

Services

Aim Communications Pty Ltd

SDC Solutions Pty Ltd

Lispas Enterprises Pty Ltd t/a Lispas

Aus Watch Protective Services Pty Ltd

Security Data Communications Pty

Security Services

Austral Marshals & Protection

Ltd

MCM Electronics Pty Ltd

Management Pty Ltd

Security International Solutions Pty

NPS Security Pty Ltd

Beauchamp Security Pty Ltd

Ltd

OPEC Systems Pty Ltd

Ben Shapardon t/a Peninsula Security

Sequoro Security Services Pty Ltd

OPI Holdings Pty Ltd t/a Ozland

Services

Starcare Security Services Pty Ltd

Security Services

Black Scorpion Security Services P/L

Steadfast ICT Security Pty Ltd

PKR Security Pty Ltd

Brendon Purdom t/a On Point Security

Thinkbox Solutions Pty Ltd

Quantum Vision Pty Ltd

& Investigation

Trinity Corporate Services Pty Ltd

Red Scorpion Security Pty Ltd

Curtis Jelle Pty Ltd t/a Sentry

Wilson Aviation Services Pty Ltd

Secure Watch Security Solutions Pty

Solutions

Ltd t/a Secure Watch Security

Damien Kaufline t/a Automate Smart

CORPORATE MEMBERS

South Coast Security

Home Solutions

Linkbox Technology Pty Ltd

Communications & Electrical Pty Ltd

Fastsec Pty Ltd

Luke Daniel Casey t/a V-TEC

Sub Protection Services Pty Ltd

Fire & Security Services TSV Pty Ltd

Electronics

Yao Wang t/a Auspalmy Consulting

t/a Fire, Security & Marine

Marke Joel Isacowitz

Fire and Safety Australia Pty Ltd

Ozwide Skills Training Centre Pty Ltd

JAM Squared Pty Ltd t/a Mengels

Star Training Academy Pty Ltd

Mongrels

ASIAL MEMBER RECOGNITION PROGRAM The ASIAL member recognition

Leigh Fusion t/a Sophisticated

CORPORATE UPGRADES

program acknowledges longstanding

Electrical Services

AApex Protection Group Pty Ltd

association members. Recognition

Marshal Security Services Pty Ltd

Attila Nagy t/a P & G Security

categories include Platinum (25

Millennium Hi-Tech Holdings Pty Ltd

Ausguard Pty Ltd

years+), Gold (16-24 years), Silver (11-

Milligan Security Pty Ltd t/a Southern

Baseline Security Pty Ltd

15 years) and Bronze (6-10 years).

Cross Protection Darling Downs

Brett Reginald Kemp t/a Electrolite

N7 AUS Pty Ltd

Crete Security Pty Ltd

GOLD

Ossietech Pty Ltd

DHG Security Sales and Services P/L

Access Electronics Australia Pty Ltd

P Dhir & Sons Pty. Ltd. t/a A to Z

Elite Protective Security Services Pty

ARA Security Services Pty Limited

Corporate Security Services

Ltd

Australian Cash in Transit Security Pty

Phocus Services Group Pty Ltd

Emizon Pty Ltd

Ltd t/a Davlin Security Group

Proex Security Pty Ltd

Golden Security Group Pty Ltd

Australian Public Address

34 | JUNE 2016 | SECURITY INSIDER


ASIAL NEW MEMBERS

Welcome to the following members Brighton Security Services Pty Limited

Safe Alarms

Access Group Solutions Pty Ltd

David Warren Hathway t/a Citicom

Adrian Leslie Samways

Solness Electric Pty Ltd t/a Soltronic

Communication Services

AD-Tech Security Pty Ltd

Systems

Energize Australia Pty Ltd

Joe Tuck-Milekovic t/a Metro Security

Ramstop Pty Ltd

Hide Away Safe Securities Pty Ltd

Agency

Huxley Hill & Associates

Quality 1 Security Services Pty Ltd

SILVER

Jagged Futures Pty Ltd t/a JAG

ADACS Systems Pty Ltd

Abeltek Pty Ltd

Security & Communications

Alan Goltz

Accord Security Pty Ltd

Joe Tuck-Milekovic t/a Metro Security

Metropolitan Watching Pty Ltd

Bankso Pty Ltd t/a System Security

Agency

G & G Sutherland Pty Limited t/a

Bargoon Pty Ltd t/a Pantac Protective

John Derek Security Pty Limited t/a

Centron Communications & Security

Services

JD Security

Defender Alarms Pty Ltd t/a National

Commercial Surveillance Systems Pty

Joseph Tony Tadros

Electronic Security

Ltd

LAPS Security Pty Ltd

Burnside Security Pty Ltd

David Allan Strauss t/a Blanket

Pallal Holdings Pty Ltd t/a Melcris

Boston Security Services Pty Ltd

Security

Security

Home Security Group Pty Ltd

Garry Raymond Gillard t/a Gotcha

Pedro Benitez t/a Alma Aus Securities

Cottrell Timothy J & Vicki A t/a Tri Star

Security Services

Securacore Pty Ltd

Security

Hillstone Holdings Pty Ltd

Specta Security Service

Brizan Pty Limited

NCA Consulting Pty Ltd

Stephen Piniotis t/a Inter City Security

Pacer Electronics Pty Ltd

Neil Andrew Kelly t/a Digital Video

Services

Lazer Security

Management Services

Sycon Security Consultants Pty Ltd

Perisher Security Pty Limited

Sam Saba t/a Saba Security Services

Techquality Enterprises Pty Ltd

E.L.K. Security Pty Ltd

Shiatsu Pty Ltd t/a Griffins Leading

Triple R Corporation Pty Ltd

Don Hodge Security Services Pty Ltd

Edge HI FI & Communications

Oxley Electronics Pty Ltd

Herbert & Violet Payne t/a H W & V A

Southern Cross Group Services Pty

Onyx Security Pty Ltd

Payne

Ltd

Peter Warren Automotive Pty Ltd

CIT Solutions Pty Limited

Zaytex Security Monitoring and

Byron Clapham t/a Farrer Security

Surfdish Pty Ltd

Services Pty Ltd

Service

BJ Security & Investigations Pty Ltd

Australian Security Brokers Pty Ltd

AMC Consulting Services Pty Ltd t/a

Techquality Enterprises Pty Ltd

Robinette Pty Limited t/a Regal

MCC Security

Peter Siman t/a ACAM CCTV

Security Systems

Secureme Group Pty Ltd

Special Squad Pty Ltd

S L Security Pty Ltd

P M Securities Pty Ltd

KES Pty Ltd

Nobile Protective Services Pty Ltd

Comvision Pty Ltd

Brink’s Australia Pty Ltd

Total Security Management

Secta Pty Ltd

PM Security and Data Pty Ltd

Platinum Security Systems Pty Ltd

Electron Appliances Pty Ltd

Statesman Security Services (NSW)

Stephen Piniotis t/a Inter City Security

Mibyte Technology (Aust) Pty Ltd

Pty Ltd

Services

Selec Developments Pty Limited

Pakman Security Pty Ltd

Coffs Coast Security Pty Ltd

Shellharbour Security Systems Pty Ltd

Security Communication Solutions

Rojac Electrics & Security Pty Ltd

Capevista Pty Ltd t/a Security 2000

International Pty Ltd

DA Fryer & MA Fryer t/a Code Seven

Security Specialists Australia Pty

Olivetti Electronic Security Pty Ltd

Security Service

Limited

David Wadwell t/a ESS Elite

Cite Security Unit Trust t/a Cite

A C L Installations Pty Ltd

Surveillance Services

Security

Darren and Debbie Rayner t/a Feel

Ironsea Pty Limited t/a K Contracting

L Moore & P Moore t/a MobileGUARD

SECURITY INSIDER | JUNE 2016 | 35


ASIAL NEW MEMBERS

Welcome to the following members Kemcoss Pty Ltd t/a South Burnett

Jonnex Pty Ltd

Zelimir Milovic

Security & Traffic Control

The Pride Group (QLD) Pty Ltd

SPS Security Services Pty Ltd t/a

Pius X Aboriginal Corporation

Nathan Lee Do Rozario t/a Dr Lock

Excell Security & Surveillance

Andrew Ian Payne trading as MK

24h

Bulksave Pty Ltd t/a Nation Security

Electronics

Dome Management Pty Ltd

Safeguard Security Group Pty Ltd t/a

Best Purchasing Power Pty Ltd

GD Security Concepts Pty Ltd t/a

Safeguard Security

Controlled Access Solution Pty Ltd

Scope Installations

Secusafe Pty Ltd

Stephen Peter Ribone t/a A & S

Quest Security Solutions Pty Ltd

B-Sealed Pty Ltd

Locksmiths

Zitak Pty Ltd

Dirrevin Pty Ltd

Associated Security Services Pty Ltd

Christian Rudolf Halbmeier t/a Chriann

ITD Security Pty Ltd

t/a Natale Security & Consultancy

Electrical

Hawks Eyes Security Services Pty Ltd

Services

Kabaris Proprietary Limited t/a

Bankso Pty Ltd

Jacob Edward Nalbandian t/a Austral

Pinkerton Security North East

Eagle Eyes Group Pty Ltd

Surveillance

Skilled Maritime Services Pty Ltd

A.C.N. 70 125 727 022 Pty Ltd t/a

Able Security Group Pty Ltd

Chase Security Solutions

Conn Industries Pty Ltd

BRONZE

Abroadmit Pty Limited

Falaan Holdings Pty Ltd

Australasian Protective Services Pty

Aksem Pty Ltd

Network Vision Group Pty Ltd

Ltd

Brent Paull Installations Pty Ltd

Comsec Surveillance Pty Limited

Australian Security Private Protection

Jason Mark Caruso t/a JJC Security

Optic Security Pty Ltd

Pty Ltd

John Lania t/a Guardwatch Security

Paul Anthony Vanstone t/a Mountain

Clearvision Security and Automation

Services

High Communications & Cabling

Pty Ltd

Inovo Technologies Pty Ltd

All Access Locksmiths and Security

Crete Security Pty Ltd

Lanwill Pty Limited

Pty Ltd

Dennis Michael Maloney t/a Brant

Natural Power Solutions Pty Ltd

Cablevision Antenna and Cabling Pty

Corporation

All Suburbs Security Services Pty Ltd

Ltd

Emizon Pty Ltd

Workforce Services Pty Ltd

AC & RS Stroud Pty Ltd

George Ibrahim t/a G.M. Electrical &

Metro Security Pty Ltd

ACG Fire & Security Pty Ltd

Security

Hi-Tech Security Solutions Pty Ltd

Austronic Security Pty Ltd

Independent Security Services

Woodmac Pty Ltd t/a QLD Covert

Johnson Controls Australia Pty Ltd

Australia Pty Ltd

Investigations

Rod Carroll Security Installations Pty

LMNT Group Pty Ltd t/a Element

Australian Security Rentals Pty Ltd t/a

Ltd

Security

ASRIT

Lancaster Investigations Pty Ltd

Oberix Group Pty Ltd

ESP Holdings (Aust) Pty Ltd

VuFast Pty Limited

Omega Power Equipment Pty Ltd

Citywide Patrol and Security Services

Grace Electronics Pty Ltd

Peacock Drive Pty Limited t/a Shadow

Pty Ltd t/a CPS Security Services

Lynx Security Services (SA) Pty Ltd

Protective Services

Hillside Security Service Pty Ltd

B&C Security Services Pty Ltd

Poseidon Technologies Australia Pty

Community Security Group (VIC)

Secmon Pty Ltd

Ltd

Limited

Security 1 Partnership

Quad Services Pty Ltd

Safe Security Systems Pty Ltd

Service Risk Australia Pty Ltd

Secure M Pty Ltd t/a Private Guard

Harbourside Communication &

Adept Security Pty Ltd

Security

Security Services Pty Ltd

Schmidt & Muller

Security Response Alarms Pty Ltd

Stephen Kisur t/a ASP-Absolute

(Telecommunications) Pty Ltd

Sentrex Corporation Pty Ltd

Security Protection

J & U Sorrentino Family Trust t/a

SPL Security Services Australia Pty Ltd

36 | JUNE 2016 | SECURITY INSIDER


ASIAL Graded Security Monitoring Centres* Current as at: 26th May 2016 COMPANY (SHORT FORM NAME)

STATE

CERT. NO. GRADE

EXPIRES

ADT Security

NSW

448

A1

2 Apr 2017

ADT Security (Data Centre)

NSW

449

A1

2 Apr 2017

Allcare Monitoring Services

WA

463

A2

4 Mar 2018

ARM Security

WA

446

A1

10 Mar 2017

ART Security

VIC

438

A1

30 Sep 2016

BENS Wholesale Monitoring

NSW

442

A1

14 Nov 2016

Calamity Monitoring

NSW

465

A1

20 Mar 2018

Chubb Monitoring Centre

NSW

464

A1

9 Mar 2018

Energize Australia

VIC

433

C2

13 Aug 2016

Executive Security Solutions

VIC

435

A1

21 Aug 2016

NSW

443

A2

25 Nov 2016

Golden Electronics

TAS

440A

A1

16 Oct 2016

Grid Security

NSW

439

A1

16 Oct 2016

Glad Security

Instant Security Alarms

QLD

457

A1

23 Sep 2017

Linfox Armaguard

VIC

467

A1

14 Aug 2018

Mekina Technologies

TAS

461

A1

15 Jan 2018

Onwatch

NSW

451

A1

20 Apr 2017

Paul-Tec (Australia)

NSW

454A

A1

1 Aug 2017

Protection Pacific Security

VIC

436

C2

1 Aug 2016

Proforce Security

VIC

466

A1

23 May 2018

RAA Security Services

SA

447

A1

14 Feb 2017

Secom Australia

NSW

458

A1

14 Dec 2017

Sectrol Security

VIC

452

B2

19 Aug 2017

Securemonitoring

VIC

459

A1

23 Nov 2017

Security 1

ACT

460

A2

09 Dec 2017

SA

426

A1

18 Jun 2016

Security Alarm Monitoring Service Security Control Room

VIC

455

A1

18 Aug 2017

SMC Australia

NSW

445

A1

10 Dec 2016

SMC Australia

QLD

462

A1

10 Feb 2018

Spectus

WA

450

A1

12 Apr 2017

State Government Protective Security Service

QLD

427

C1

18 Jun 2016

Telstra SNP Monitoring (Hamilton)

NSW

453

A1

29 July 2017

Telstra SNP Monitoring (West Ryde)

NSW

431

A1

13 Aug 2016

Ultimate Security & APS Monitoring Centre

NSW

456

A1

16 Sep 2017

*The above-listed ASIAL Graded monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to grading.

ASIAL Certification Class 5 Capability COMPANY Inner Range Pty Ltd

STATE

CERT. NO.

VIC

2

PRODUCT

EXPIRES

Infiniti Class 5 15 Mar 2018

The capability recommendation is based on an overview of AS/NZS 2201.1-2007 and its referenced standards. Full compliance is neither guaranteed nor implied. Whilst the product may be capable of meeting Class 5 standard, meeting this Class relies extensively on both the installer and the client. As part of the capability certification, the supplier has produced both a Compliance Statement and associated documents. These documents are dedicated to Class 5 compliance and form part of the Certification process. The supplier has agreed that: The required documentation will be maintained up-to-date for the period of the Certification, with ASIAL’s inspector being advised in writing of any such changes, and they will maintain compliance throughout the certification. Any changes that may have an impact upon this will notified to ASIAL within 14 days. ASIAL may withdraw and cancel a certificate should it become aware of any non-compliance during the certification period.

SECURITY INSIDER | JUNE 2016 | 37


HOT PRODUCTS

QXS SERVER ECRAFT PRO SERIES INTELLIGENT. AUTOMATED. OPTIMIZED. ■ Electrocraft Australia > 02 8811 5155 g

Australia > 1800 999 285 ■ Quantum Web > www.electrocraft.com.au

g

NEW!

Email > ANZsales@quantum.com

Enter the Digital Era with the Ecraft Pro Series range of equipment. Website > www.quantum.com This equipment allows you to digitally modulate any source in SD and Quantum has just released a new server designed specifically HD formatCorporation over a coax system. for VMS applications which is paired This video surveilSources include AV(CVBS), HDMIwith andQuantum SDI from storage. media players, cameras, lance specific server builds on Quantum’s 20+ year experience in managing receivers etc. video. new QXS server provides VMS optimised environment, and easy OurThe coax and IPTV/CCTV systema designers will assist you with design growth over time without doing rip-and-replace upgrades. The QXS server and support to ensure that the installation is efficient.The EPS series is is ideally suited for 50+ camera applications and can scale to 1000+ cameras ideal solution when the site is required to use the existing infrastructure when combined Quantum Multi-Tier Storage. keeping costs atwith minimum. EPS series is a typical solution for retirement Learn more: Quantum Australia 1800 999 285 orcorrectional ANZsales@quantum.com villages, pubs, clubs, sporting venues, hospitals, centres and Mention Security Insider and receive 10% off your quote to 30 September. high risers. g

Mention Security Insider and receive 10% off your quote until 30 June.

HIKVISION COVERTNVR IP RANGE INTERLOGIX EXTENDS WITH HIGH PERFORMANCE NVR70 CAMERA SERIES g g

NEW!

Security Merchants Australia > > 1300 ■ Central Security Distribution 1300663 319 904 499 Website ■ Web> >www.securitymerchants.com.au www.centralsd.com.au

When Hikvision reliability is mission critical, look to the IP new TruVision NVR70 by DS-2CD64 1.3MP WDR Covert Camera Series provide Interlogix with features including redundancy, redundant PSUs, both flexibility and ease ofnetwork installation, its size dual allows the camera to recorder failover even configuration export/import. easily blend intocamera very limited space, which makes it ideal for discreet Real-time Full HD recordings can be accessed via true the 120dB LicenseWDR, free surveillance applications.This product incorporates TruVision software, TVRmobile even full browser-based access as Navigator well as other powerful image app processing functionalities like 3D for live,DNR recording and Additionally, configuration. and BLC. the DS-2CD64 series supports on-board Thestorage NVR70 of supports up toand 400Mbps of incoming bandwidth, or up-to 64GB ROI codec to savecamera on overall bandwidth up to 128 cameraItchannels. and IP storage. also provides choice of lens and mounting types for Designed to find accommodate large amounts data, the NVR 70 is equipped users to an option to best fit their of surveillance needs. with up to 64TB of embedded storage in a RAID configuration, or up to 96TB in a non-RAID configuration.

NEW ‘RM’ VMS FROM CANON PARADOX PSC260/PCS265 ■ Canon Australia > 1800 021 167 3G COMMUNICATOR MODULES ■ Email > specialised.imaging@canon.com.au

g

Central Security Distribution > 1300 319 499 Website > www.centralsd.com.au

■ Web > www.canon.com.au/networkcameras

g

Besides offering an extensive range high quality IP modules cameras,now Canon The Paradox PCS260 / PCS265 3Gof communicator has just launched the latest version of its’ video management software, enable Paradox alarm panels to send messages to Control Rooms RM version Thisfor new software supports H.264 /compression for high without the 3. need a PSTN line. The PCS260 PCS265 delivers resolution megapixel video without driving up storage costs. Included communication via GSM to any Control Room that receives Contact is an or intuitive keyword tagging and filtering feature which makes very easy ID via GPRS to Paradox IP receivers. The PCS265 moduleit allows to analyse footage from multi-camera environments. It also comes remote installation up to 300m from the control panel via RS485 and standard in versions to support up to 9 cameras (RM-9), 25 cameras (RMhas an on board lithium backup battery. The PCS260 / PCS265 can 25) and 64 cameras (RM-64). Additional viewer licenses are also available also send SMS text messages to up to 8 mobile phone recipients for for projects larger than 64 cameras. alarms and system events. Both modules are simple to install via a fourwire serial connection.

38 | JUNE 2016 INSIDER | SECURITY INSIDER 38 //SECURITY APR 2014


HOT PRODUCTS

DTU3G/IP AU MOBOTIX ■ SCSI > 1300ENGINEERED 555 570 GERMAN Email > daleacott@securitycommunications.com Central Security Distribution > 1300 319 499 ■ Website Web > www.securitycommunications.com g > www.centralsd.com.au ■ g

SCSI’s DTU3G/IP wireless alarm communicator is Australian Central Security Distribution (CSD) has launched an initiativemade and designed. Dual-SIM technology provides 6 secure paths using to introduce MOBOTIX to new and existing CCTV Integrators in Telstra NextG, 3G, Telstra Optus & PSTN. With the formOptus of “MOBOTIX AU”.GPRS, It’s never beenGPRS, easier! Ethernet The MOBOTIX thousands already sold 4TB and Hard installed, DTU3G/IP has been AU Kit features a NAS, Drivethe and POE Switch, while released to the Australian Security outstanding success. The cameras come preloaded withIndustry a customwith configuration to create combination of multiple, proven communication paths ending the days of the 4-Step Plug n’ Play solution never seen before in a MOBOTIX nuisanceBacked “poll fails” and unwarranted System! by unrivalled German guard quality,attendances. all cameras feature The DTU3G/IP connects to theTime DirectWireless Network, a minimum of 80,000 hours Mean Before Failure (MTBF)Australia’s only dedicated and privatesoftware alarm transmission network. with exclusive MOBOTIX features such as MxPEG, To find out more about the counting DTU3G/IP contact 1300 555 570. MxActivitySensor and people -, it’s neverSCSI beenon a better time to introduce your customers to MOBOTIX!

NEW!

SUPERIOR DETECTION WITH THE A MOBILE APP FOR PARADOX NVX80 DETECTOR TECHNICIANS ON THE GO ■ Central Security > 1300 319 499 simPRO > 1300 139Distribution 467 ■ Web > > www.simprogroup.com www.centralsd.com.au g Website g

NEW!

The Paradox SeeTrue™ technology delivers superior simPRO ConnectNVX80 is the with field all-new extension of simPRO Software, designed for motion detection with advanced capabilities, beyond in its class. mobile devices. Compatible with both Android and iOS,others simPRO Connect offersBoasting a seamless Technicians in theactive field can update a office-to-field combination connection. of technologies including: infrared, times, materials,and job SeeTrue™, details andthis photos in real time. enables highly efficient microwave, unique aggregation With Connect’s runsheet, technicians can get a clearreliability view of and their detector sensitivity while field at the same time, enhances scheduled workfalse eachalarms. day without needing to drop by or call the office, reducing minimises travel time and increasing billable hours.are Technicians can raise purchase orders Programming and configuration simple with the NVX80's full-colour from OLED the field, and can issue invoices and collect payment on site as soon as a screen and four-button interface. Suitable for both indoor and outdoor job isapplications, complete –the helping to keep your cash flow positive. NVX80 is truly the detector to choose when protecting high ASIAL members receive 20% off the initial cost of simPRO Enterprise and one free simPRO Connect licence with

value, high security sites that demand high performance.

every Enterprise licence*. *Offer is only valid for new simPRO Enterprise customers who are ASIAL members.

THE NEW 8AMP OMV OUTDOOR INTEGRITI SMART POWER SUPPLY MOTIONVIEWER FROM INNER RANGE g Video Alarm Technologies > 1300 464 455 ■ Inner Range Melbourne > +61 3 9780 4300 g Web > www.videofied.com.au ■ Email > admin@innerrange.com

■ Web > www.innerrange.com The Outdoor MotionViewer®, a battery-powered PIR motion sensor with an integrated digital video camera and infrared In today’s demanding security environment, monitoring of the powersupply illuminators, is designed to detect an intrusion, instantaneously status is pivotal to the operation and performance of anysecurity system, and the record a 10 second video and send the video alarm signal to our Integriti 8Amp Smart Power supply deliversthis very effectively.The new Inner control panel via RF for cellular relay to the central station where Range Integriti 8Amp 13.75Vdc Smart power supply isa highly efficient purpose immediate review/verification can initiate a priority response and built power supply solution designed to meetthe modern high spec requirements dispatch. unique to Access Control and Intruder Security Systems.When used with Inner Product Features include: Ranges Integriti system, the 8Amp powersupply offers quick connect status • 100% wirefree • Colour Video • Operating temperature -30° / monitoring for critical powerrelated aspects, such as Battery Fault, Low Battery, +60°C • Tilt Tamper with an accelerometer • IP 65 Weatherproof Battery Not Present, Battery Failed Test, Mains Power failure, Power Supply Low • Angle detection 90° by default • 3 x lenses options in the box. Volts, Power Supply Failure and status monitoring of all Smart Fuses. OMV - taking outdoor video verification to another level!

SECURITY INSIDER | JUNE 39 SECURITY INSIDER APR2016 2014//| 41


HOT PRODUCTS

QXS HYBRID DISK – FLASH DTU3G/IP AT 30% OF THE COST ■ PERFORMANCE SCSI > 1300 555 570 ■g Email > daleacott@securitycommunications.com Quantum Australia > 1800 999 285 ■g Web > www.securitycommunications.com Email > ANZsales@quantum.com

Website > www.quantum.com SCSI’s DTU3G/IP wireless alarm communicator is Australian made and designed. Dual-SIM 6 secure paths using QXS combines flashtechnology drives, highprovides performance and standard hardTelstra drives in NextG, Optus 3G, Telstra GPRS, Optus GPRS, Ethernet & PSTN. Withthe a single storage array. Quantum’s patented Q-Tier software manages thousands already sold and installed, the DTU3G/IP hasatbeen drives optimising performance – delivering flash speeds 30%released of the cost to ofthe Australian Security with outstanding success. all flash arrays. This meansIndustry faster write times for more cameras andThe larger combination of multiple, proven communication paths ending the days of “live” VMS databases. QXS is ideal for virtualised VMS installations, analytics, nuisance “poll fails” anddeployments. unwarranted guard attendances. and enterprise grade The DTU3G/IP connects to and the NEBS DirectWireless Network, QXS is Mil-Spec hardened rated; certified with Australia’s leading VMS only dedicated andand private transmission network. solutions. Sizing cost alarm generally suits medium to large projects. To earn find out more about the DTU3G/IP , contact SCSI 1300 555 570. more: Quantum Australia 1800 999 285 or on ANZsales@quantum. g

com, mention Security Insider and receive 10% off your quote until 30 June.

NEW!

SUPERIOR WITH WITH THE KEEP YOURDETECTION CASH FLOWING SIMPRO PAYMENTS PARADOX NVX80 DETECTOR g ■simPRO Central

Security Distribution > 1300 319 499 > 1300 139 467

g ■Website Web > www.centralsd.com.au > www.simprogroup.com

With all-in-one payment simPRO Software, simPRO Payments, Thethe Paradox NVX80 withfeature all-newofSeeTrue™ technology delivers superior you can collect payment for your services quickly and securely by credit card, without motion detection with advanced capabilities, beyond others in its class. the need for merchant facilities. Boasting a combination of technologies including: active infrared, When usedand withSeeTrue™, the simPRO mobile app, simPRO enables microwave, thisConnect unique aggregation enables Payments highly efficient your technicians to collect payment in the field as soon as a job is complete. Your detector sensitivity while at the same time, enhances reliability and customers can also pay you online through the Customer Portal, by following a minimises false alarms. link in an emailed invoice, or over the phone. All payments are processed through Programming and configuration are simple with the NVX80's full-colour the simPRO system.

NEW!

OLED screen and four-button interface. Suitable for both indoor and outdoor ASIAL members receive 20% off the initial cost of simPRO Enterprise and one free applications, the NVX80 is truly the detector to choose when protecting high simPRO Connect licence with every Enterprise licence*. *Offer is only valid for new simPRO value, high security sites that demand high performance. Enterprise customers who are ASIAL members.

THE T4000’S HAS INTEGRITI 8AMPLITTLE SMARTBROTHER POWER SUPPLY ARRIVED PACKED WITH FEATURES FROM INNER RANGE g Inner Range Melbourne > 03 9780 4300 Email > IREnquiries@innerrange.com ■ Email > admin@innerrange.com g Web > www.innerrange.com ■ Inner Range Melbourne > +61 3 9780 4300 g

■ Web > www.innerrange.com Boasting a lightweight price and a little less monitoring hardware without In today’s demanding security environment, of the compromising powersupply on simplicity and performance. status is pivotal to the operation and performance of anysecurity system, and the The T4000 LitePower is fullysupply packed with the features of the original Integriti 8Amp Smart deliversthis very effectively.The new T4000 Inner Security Communicator, withSmart a smaller tagisait highly is the efficient ideal solution for Range Integriti 8Amp 13.75Vdc powerprice supply purpose builtinstallations power supply solution meetthe modernfrom highan spec requirements where the designed T4000 istobeing powered existing batteryunique to Access Control The and T4000 IntruderLite Security Systems.When used with panels Inner backed alarm system. is compatible with most alarm Ranges Integriti system,to the offers quick connectthe status and simply connects the8Amp panel powersupply via its telephone port, eliminating need monitoring for critical powerrelated aspects, such as Battery Low Battery, for a dedicated alarm panel phone line connection to theFault, street. The T4000 Battery Not Present, Battery Failed Test, Mains Power failure, Power Supply Low Lite handles all alarm communications via its Ultra-fast 3G dual SIM and Volts, Power Supply Failure and status monitoring of all Smart Fuses. 10/100 Mbps Ethernet polled communications paths.’

40 | JUNE 2016 | SECURITY INSIDER

SECURITY INSIDER APR 2014// 41


KP LA

SA

OR

FE

W CE MANAGEMENT

Making health and safety easier for members

Mee t yo in 1 ur WH 5m inut S oblig es p a er w tions eek

Ava ilab ACCESSIBLE anywhere, Special l e ANYTIME to $27 OFFER 5 (in ASIAL mem Contact us to cl G The S A T) p bediscuss our new syst SIAL S r s e em, afe f r or promotion indu W d ann member stry esigne orkpla u d : m to A ce Ma na S4

W

801 g Inclu and ement man des an Sy tailo o pow red stem i er/e ffice acc to th s a t lectr o Crea onic unt an e Au otal W tes a s sec d a m stra WHS urity obil lian HS plan staff e acc Stor secu for y e in th ount busi s forms rity our a e c fi c e ness b e , ld ssib usin , em inciden l e e ss an to ploy t d se ees reports nds and , ph auto o con mat trac tos, lice ed to n


2016 ASIAL NATIONAL CALENDAR OF EVENTS 20-22 JULY 2016 | SECURITY 2016 EXHIBITION & CONFERENCE Venue: Melbourne Convention & Exhibition Centre 4 AUGUST 2016 | SA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Sebel Playford Hotel, Adelaide Price: $47.50 (Member), $57.50 (Non- Member) 5 AUGUST 2016 | WA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hotel Northbridge, Perth Price: $47.50 (Member), $57.50 (Non- Member) 31 AUGUST 2016 | NSW INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Holiday Inn, Parramatta Price: $50 (Member), $60 (Non- Member) 7 SEPTEMBER 2016 | QLD INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hillstone St Lucia, Brisbane Price: $47.50 (Member), $57.50 (Non- Member) 12 OCTOBER 2016 | ACT INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Premier Belconnen Price: $47.50 (Member), $57.50 (Non- Member) 13 OCTOBER 2016 | TAS INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hobart Function Centre Price: $47.50 (Member), $57.50 (Non- Member) 20 OCTOBER 2016 | AUSTRALIAN SECURITY INDUSTRY AWARDS FOR EXCELLENCE / OUTSTANDING SECURITY PERFORMANCE AWARDS Time: 7.00-10.30pm | Location: Westin Hotel, Martin Place, Sydney. 27 OCTOBER 2016 | VIC INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Batman’s Hill on Collins, Melbourne Price: $50 (Member), $60 (Non- Member) 16 NOVEMBER 2016 | QLD INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hillstone St Lucia, Brisbane Price: $47.50 (Member), $57.50 (Non- Member) 17 NOVEMBER 2016 | SA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Sebel Playford Hotel, Adelaide Price: $47.50 (Member), $57.50 (Non- Member)

Interested in sponsoring an ASIAL event? Email advertising@asial.com.au


VIDEOFIED, WIREFREE AND IDEAL FOR OUTDOOR AND VACANT SITES

VIDEOFIED®, OUTDOOR SECURITY SYSTEM, 100% WIREFREE! Videofied systems have revolutionised the Security market over the last ten years with wirefree video verification. A new product generation now brings you outdoor colour video verification. Upon an intrusion, the MotionViewer cameras take a ten second video. The video is immediately transmitted to your preferred alarm monitoring centre. In the case of a genuine intrusion an urgent or appropriate response can be deployed.

OUR ADVANTAGES Video Verification

Complete System

Outdoor sites

Security professionals are able to initiate a priority response to real alarm events based on visual confirmation.

Videofied offers a complete security alarm system which integrates video verification.

The OMV and XTO are especially designed to secure outdoor environments including yards, construction sites and critical infrastructure.

Construction sites, vacant buildings, substations and most outdoor sites are uncontrolled environments, video verification is especially important to eliminate costly false alarms.

Videofied’s portability means it can be moved around as the project evolves before potentially being installed months later at a brand new site!

• The most advanced security system with video verification • Bi-directional, spread spectrum, AES encrypted radio using the 920MHz operating frequency • GSM/GPRS/IP alarm transmission • up to 4 years battery life (no mains power requirement)

1300 46 44 55 info@videofied.com.au

www.videofied.com.au


Untitled-1 1

26/11/2014 10:45 am


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.