www.securityfocusafrica.com | Vol 36 No 4 April 2018 The official industry journal for professional risk practitioners: security, safety, health, environment and quality assurance
“The whole is greater than the sum of its parts� Aristotle
TPA
RDC Collaboration
Security Focus Africa: Serving the South African security industry for 36 years
CONTENTS
VOL 36 NO 4 APRIL 2018
www.securityfocusafrica.com | Vol 36 No 4 April 2018 The official industry journal for professional risk practitioners: security, safety, health, environment and quality assurance
“The whole is greater than the sum of its parts” Aristotle
TPA
RDC Collaboration
10 COVER STORY
FEATURES
THE FUTURE IS HERE: RDC, TPA AND SENTIAN COLLABORATION
10 Managing risk in today’s increasingly dangerous business environment
6
Attended by guests from all over the country, the 12 April launch of a partnership between RDC (Radio Data Communications), TPA Security Distributors, and a collaboration with Sentian Lifestyle Automation at the Randpark Golf Club also showcased a host of new, highly advanced security industry products.
Disruptive innovation, regulatory scrutiny, economic fears and cyber threats are the biggest risks to business in 2018, according to a 2018 Executive Perspectives on Top Risks Surveys from North Carolina State University’s ERM Initiative and global management consultancy firm Protiviti. In this issue, Security Focus Africa takes a look at the changing landscape of business risks going forward.
14 Technical surveillance countermeasures training Technical Surveillance Countermeasures (TSCM) is an important function as it helps organisations to bullet proof their information security and risk management programmes. Organisations are now under pressure to ensure that they take appropriate measures not only in creating value, but also to adequately safeguard and defend the interests of their shareholders and stakeholders.
16
2
SECURITY FOCUS AFRICA MARCH 2018
18
securityfocusafrica.com
Official Journal of the Security Association of South Africa
Published by Contact Publications (Pty) Ltd (Reg No. 1981/011920/07)
REGULARS COMMENT 4 The good, the bad, and the ugly
NEWS 8 Securex 2018 launches new Cyber Lab feature
PERSONALITY PROFILE 9 In conversation with Tigue Little TECHNOLOGY UPDATE 16 Decoding the DNA of a digital future
COMPANY NEWS 18 Moving with the times at high quality speed
26 EXHIBITION NEWS 27 Hikvision holds “shaping intelligence” AI Cloud World Summit
I NTERNATIONAL NEWS 28 Hikvision assists state-of-theart vehicle production
LAW & SECURITY 29 Public Protector and State Security Agency
30 INDEX OF ADVERTISERS
20 Hikvision honoured with Red Dot
31 CALENDAR
Award 22 Sensor Security recognised with Hikvision award FLIR Systems completes strategic investment in DroneSense 23 How safe is your cash?
32 DIRECTORY
ON THE MARKET 24 Suprema fingerprint algorithm
Vol 36 No 4
TEL: (031) 764 6977 | FAX: 086 762 1867 PUBLISHER: Godfrey King | gk@contactpub.co.za
MANAGING DIRECTOR: Malcolm King | malcolm@contactpub.co.za
EDITOR: Ingrid Olivier | ingrid@securityfocusafrica.com
PRODUCTION & DESIGN EDITOR: Hayley Mendelow | hayley@contactpub.co.za
DISTRIBUTION MANAGER: Jackie Goosen | jackie@contactpub.co.za
HEAD OFFICE PHYSICAL ADDRESS: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610
POSTAL ADDRESS: PO Box 414, Kloof 3640, South Africa
PUBLICATION DETAILS: Security Focus Africa has 12 issues a year and is published monthly, with the annual Buyers’ Guide in December. Printed by
, a division of Novus Holdings
Paarl Media KZN, 52 Mahogany Road, Westmead www.paarlmedia.co.za
SUBSCRIPTION RATES: Annual subscription for magazine posted in Republic of South Africa is R650 including VAT and postage. Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640.
26
and 3D facial recognition solution 26 Discreet 360° all-round vision with Dallmeier 26 Paxton introduces the Net2 Entry premium monitor
EDITORIAL CONTRIBUTIONS: Editorial contributions are welcome. For details please email hayley@contactpub.co.za.
ADVERTISING ENQUIRIES:
24
Bernadette Fenton Cell: 082 443 8931 Email: bernadette@ securityfocusafrica.com
Security Focus Africa is a member of
@SecurityFocusza securityfocusafrica.com
Security Focus
www.securityfocusafrica.com
EDITORS COMMENT
The good, the bad, and the ugly… The good… Things are looking up for the South African economy on the back of President Cyril Ramaphosa’s commitment to generating R1.2 trillion in investment over the next five years. Moneyweb believes that his promised investment summit, due to take place during the third quarter of 2018, is a sign that “he intends following through on his pledges to create jobs and address years of economic mismanagement.” According to Moneyweb, Mr Ramaphosa has appointed former Finance Minister Trevor Manuel, former Deputy Finance Minister Mcebisi Jonas, former Standard Bank chief executive officer Jacko Maree and Astrapak chairwoman Phumzile Langeni as “investment envoys”, and has appointed Makhaya Advisory chief executive officer Trudi Makhaya as his economic adviser. By then, the Hawks will hopefully have a new, competent and incorruptible head in place. According to police minister Bheki Cele, as quoted in City Press, the position will be occupied by June. Also heartening is the International Monetary Fund’s (IMF) decision to raise South Africa’s gross domestic product (GDP) forecast for 2018 to 1.5 per cent, up from its January prediction of 0.9 per cent.
The bad… Ongoing security breaches in Parliament and other state institutions including the offices of the Hawks and the National Prosecuting Authority (NPA) have highlighted a worrying lack of security around some of the country’s key points. City Press sources allege that ammunition
EDITORIAL POLICY
was among the items stolen in the August 2017 robbery at the National Council of Province’s offices, an allegation denied by Parliament. Considering the importance and confidentiality of the information contained on these premises, surely it’s time for the powers that be to undertake a new risk assessment as part of the promised ongoing upgrading of their security systems. While on the subject of the critical importance of managing risk, the mistaken and potentially crippling transfer of €28 bn from Deutsche Bank in Germany to the Deutsche Boerse’s Eurex is a warning to financial institutions the world over to tighten IT controls. Another warning, this time to Android phone users, who need to be extremely vigilant around the use of the new “Chat’ feature, a new messaging format intended to replace SMS. One of Chat’s ardent critics is Amnesty International’s Technology and Human Rights researcher Joe Westby, who went on record to say that Google’s “baffling” decision to launch a messaging service without end-to-end encryption shows its contempt for the privacy of Android users while handing a “precious gift” to cybercriminals pursuant of easily accessible user data. Slamming the service for its lack of endto-end encryption, and following on the heels of Facebook’s recent data scandal, he has called on Google to “immediately scrap” it and replace it with a product that protects people’s privacy.
And the ugly… The violent pitch invasion at Durban’s Moses Mabhida stadium which overflowed
Statements made or opinions expressed in articles in Security Focus Africa do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus Africa. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services. It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus Africa, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.
4
SECURITY FOCUS AFRICA APRIL 2018
Ingrid Olivier
Editor ingrid@securityfocusafrica.com into the surrounding streets, resulted in injury, destruction and a barrage of public criticism for the way the stadium’s security handled the chaos. Soccer hooliganism is nothing new, and should accordingly be factored into a stadium’s risk plan as well as any other environment where large crowds gather. Recent, violent anti-corruption and service delivery protests in Mahikeng, though quelled by President Ramaphosa, need to be addressed as a matter of urgency if peace is to reign. And how he diffuses this ticking time bomb, hopefully through consultation and fair action, will set the tone for future, similar conflict resolution. A spate of prison breaks in recent times has seen convicted and awaiting trial prisoners alike spilling into the streets of South Africa. Riots, murder of warrant officers, hostage taking and the threat to innocent citizens are the inevitable and tragic result of a porous, inadequate prison system that desperately needs upgrading and reinforcing.
CORRECTION:
In the February issue of Security Focus Africa, we placed a picture of David Slotow as the author of “Managing risk through the cloud” instead of Dragan Petkovic. Our sincerest apologies to both Mr Slotow and Mr Petkovic. It has since been corrected in the digital magazine.
securityfocusafrica.com
COVER STORY
The future is here
RDC, TPA and Sentian collaboration Attended by guests from all over the country, the 12 April launch of a partnership between RDC (Radio Data Communications), TPA Security Distributors, and a collaboration with Sentian Lifestyle Automation at the Randpark Golf Club also showcased a host of new, highly advanced security industry products.
I
n his welcome, RDC managing director Brent Andreka said the alliance represented the best design, manufacturing and marketing skills in the country. “The industry has grown significantly over the years,” said Mr Andreka. “The partnership between the three companies is an exciting move because it will enhance our ability to distribute cuttingedge, value-added products and services to existing and new clients.”
About RDC With more than 1.5 million VHF transmitter unit sales under its belt since its inception in 1978, and 400 radio networks located in South Africa and around the world, RDC has built its formidable reputation on the back of quality products and personal service. These include its own in-house development team, a stable of blue chip suppliers and 24/7/365 technical support. “Joint partnerships like this help bring the future to customers and put them in
the driving seat of their own lives” said Mr Andreka. “Demand for security and improved communication is being driven by the fact that people want more and more control over their environments; they want to be able to verify each event or activation on their premises and guide their armed response companies to reduce false alarm call-outs.” Underpinning Mr Andreka’s assertion that “the future is here”, RDC’s chief
Seen at the launch... World-class technology and innovation in the challenging security industry were showcased at the event, which also introduced guests to the collaboration between DRC, TPA and Sentian.
Terry van Zyl, RDC; Robert Blackburn, 7 Arrows Security; Zita Helberg, RDC; Burt Potgieter, 7 Arrows Security; and Brent Andreka, RDC.
6
SECURITY FOCUS AFRICA APRIL 2018
Jan Harm Van Der Merwe, Mayday Alarms; Eamon Nel, TPA; Terry Van Zyl, RDC; John Rogers, TPA; Henck Du Toit, Mapogo A Mathamaga; and Gerald King, Mapogo A Mathamaga.
Etienne Kleb, Securezza; David Sandow, Securezza; and Gert Venter, RDC.
Jaco van der Merwe, Kerneels Gerber, Hendry du Toit and Jaundre Ellis, National Security and Fire.
Waldo de Beer, Bull Patrols; Gert Venter, RDC; Tigue Little, Sentian; and Wilhelm Lubbe, National Security and Fire.
securityfocusafrica.com
COVER STORY
technical officer Terry Van Zyl said the availability of meaningful, real-time information and connectivity via high-end products such as the Texecom Premier range connected via RDC and those offered by Sentian Lifestyle Automation were giving power to the people. “As Aristotle said, the whole is greater than the sum of its parts, hence our decision to collaborate with TPA and Sentian.”
About TPA One of the largest privately owned security distributors in South Africa, TPA Security Distributors was established in 2001. The company has gone on from strength to strength, with an ever-expanding footprint throughout the country. It has built its reputation on supplying premium brands to customers, from domestic to highend commercial applications. A single supply point for intruder detection alarms
and CCTV, it also sources and stocks a range of complementing peripherals such as motion detectors, heat and smoke detectors, external sounders, power supplies, wireless and cable, remotes, radios and batteries.
About Sentian Connect, protect and detect are the watchwords on which Sentian Lifestyle Automation was founded. The brainchild of Tigue Little and Trevor Lewis, the company offers seamless integrated security technology to home and business owners throughout South Africa. Designed to significantly reduce false alarm call outs, its technology works with existing systems to give them more intelligence. People can, via a 12 second real-time video clip on their phones, see exactly what triggered their alarms, enabling them to respond accurately and with
confidence. These video verifications cover all CCTV cameras, so it’s possible to pinpoint the position of the event, whether the culprit is a neighbour’s cat jumping the wall, a pot plant blowing in the wind, or an uninvited intruder. Owners can then decide on what action to take: options include bypassing the zone affected by the windy weather or the cat, or in the case of trouble, opening the front gate or garage door for the armed response unit. Sentian’s technology also makes it possible to automatically or remotely control lights and appliances, watch guards walk around your property and then when they’ve left, re-arm the alarm and turn off your lights. In short, a world-class combination of integrated technology between the Sentian 3i, the alarm, analogue or IP CCTV cameras and automation modules.
New products The second half of the event consisted of product overviews and new product demonstrations.
R
DC introduced its new weatherproof automated monitoring and control system to the attendees, as well as the latest in control panels, fully wireless keypads and smoke detectors. Super-proud of their new Weatherproof SMX Panic Pack & SMX DIN Rail Expander, Mr Andreka says it’s the answer to increasing demand for weatherproof panic packs for rural security and the agricultural industry. Not only is RDC’s new offering weatherproof but it also offers a unique weatherproof DIN rail relay expander pack, specifically earmarked for these specialised markets. Easy to program and install, with step-by-step instructions and YouTube video training, the panic pack is ideal for situations where equipment needs to be self-installed. The DIN rail is designed to expand functionality for outdoor and high voltage applications such as geysers, borehole pumps and farm irrigation systems. Aside from giving clients the flexibility to choose up to 8 heavy duty relays for AC devices, its receiver can be used to send a panic message to ten recipients such as neighbouring farmers or even to trip one
securityfocusafrica.com
of the relays to start an outdoor device such lights or pumps. Both the outdoor solutions have an IP65 rated enclosure and metal back plate mounts. TPA’s new product range included the Premier Elite 64W with I-connect, a hybrid control panel with up to 64 ricochet wireless zones or any combination of hardwire and wireless zones to a maximum of 76 zones. The new Texecom Intrusion app, also on show, was designed for use on all premier control panels where the Texecom IP module or correct Texecom GPRS module has been installed, thereby offering full control from any smart phone or tablet, Android or Apple device. Sentian demonstrated the Sentian 3i, an Internet-enabled smart security hub that connects existing alarm, CCTV and automation systems. An automaticallytriggered 12 second video clip shows users exactly what triggered the alarm, allowing them to respond as they see fit: push the panic button, open the gate for
armed response and watch a live video stream while they enter. They can also turn on the outside security lights, disarm the alarm and bypass a sensor, all from a single app on their phone, from anywhere in the world. Ideal for installers as an upsell option, Sentian’s technology is designed to integrate with familiar and trusted products such as Paradox, DSC, Texecom, Hikvision, Dahua, TVT, Samsung, ONVIF IP, ET, Sherlotronics and more. Very easy to install, their products require minimal training, add very little extra time on site and significantly reduce false alarm callouts.
SECURITY FOCUS AFRICA APRIL 2018
7
NEWS
Securex 2018 launches new Cyber Lab feature Securex South Africa 2018, the biggest security and fire trade show of its kind on the African continent, has announced that it is launching a brand-new Cyber Lab feature this year, the first one of its kind to be introduced at the expo.
P
owered by XGRC Software, a range of integrated management system solutions designed to meet a company’s governance, risk management and compliance (GRC) strategy available locally through Strategix Application Solutions, the goal of the new Cyber Lab is to create an area where awareness of information security can be raised, through an interactive approach. Jacob O’Brien, Strategix managing director, explains: “Information security is an extremely hot topic both within Africa and the rest of the world - and for good reason. In this information age, information assets are incredibly valuable to any business. “Unfortunately, at the same time, such assets are also highly vulnerable to external threats. To put this statement into practical terms, the loss of information could result in a company losing its competitive advantages, dwindling customer confidence, a nosedive in brand image, and could even result in a lawsuit. And uninformed organisations are at a very high risk of exploitation.”
Annette Van Rensburg
Security Dog & Dog Handler Training Centre • Security dog handler training centre DH 1 2 3 and 4 courses. • PSIRA-accredited security dog supplier, and dog handler training college. • Suppliers of trained security dogs DH1DH4 Standard. • Sasseta-accredited training college (you can now apply for rebates on training fees from Sasseta). • Accredited for sniffer dog handler training.
79 3rd Street Marlboro Sandton, Gauteng Tel: 011 804 1976 Fax: 011 804 4959 secdogs@mweb.co.za www.secdogs.com
8
SECURITY FOCUS AFRICA APRIL 2018
The Cyber Lab will showcase a stereotypical ‘hacker’s bedroom’ setup, taking visitors through a number of practical scenarios that could affect both work and home life. There will also be an interactive demo area, where attendees can review and get to grips with a real-life example of an information security management system (ISMS). Furthermore, aside from the more than 20 highly topical seminar sessions to be covered at the Securex 2018 free-to-attend seminar theatre, the Cyber Lab will feature a number of specialist speakers, covering topics including ‘Social Engineering’ (which will incorporate an interactive real life scenario), ‘Cloud Safety’, and ‘What is an ISMS?’. “In addition, we will dive into the intricacies of the ISO 27001:2013 standard, the only auditable international standard for ISMSes. Here, we will address the legal implications of the standard and look at why organisations need to assess risks associated with their information assets, and how these risks can be mitigated,” Mr O’Brien continues. Speakers will include Francois Labuschagne, managing director of DQS South Africa, who states: “ISO 27001:2013 is applicable to all types of businesses regardless of size, complexity and geographic location. This is especially important for the businesses dealing with confidential information including banking and financial firms, healthcare organisations and IT services companies.” “The Cyber Lab is just one of our value-added Securex features for visitors to the show,” says Sven Smit, portfolio director at Specialised Exhibitions Montgomery. “We’ve also launched a new app, which provides delegates with all of the show’s info at their fingertips. It’s easy-to-use and conveniently includes all the details you need to navigate your way through Securex this year, from exhibitor and partner details, the free-to-attend seminar programme, practical information on venue, travel, show times and so on, daily activity details on competitions, giveaways, demos and new product launches, and more.”
securityfocusafrica.com
PERSONALITY COVERPROFILE STORY
In conversation with…
Tigue Little By Ingrid Olivier
Tigue Little isn’t the kind of person to back down from a challenge. And eight years ago, he faced one of the biggest challenges of his life: how to protect his family and his property the next time they were under threat.
“N
ot long after I’d bought my first stand-alone home, we had a breakin,” says the co-founder of Sentian. That set the course for an increasingly strained relationship between him and his installer as one false alarm followed the next. “I kept calling him back to fix my apparently faulty alarm system until it got to the point where my armed response company started sending me negative messages regarding my high monthly call-out rate. That’s when I decided to do something about the problems. I wanted a security solution that would allow me to tell the difference between false alarms, which account for 99 percent of alarms in the security industry, and the one percent of actual events.” With a BSc. Eng in Electro-mechanical Engineering, the security industry was not originally on Tigue’s career path. But convinced that if real-world, impactful security solutions meant this much to him, they had to mean as much to others, he and his co-founder Trevor Lewis pooled ideas and so Sentian was born. As with any new business owner, he says, he’s involved in every aspect of Sentian. “In a single day, I might be working on a proposal for a new project, on site problemsolving and mounting cameras, at the office coordinating product manufacturing, responding to client support calls, invoicing and even designing marketing material. Whatever needs doing, really!” Although he and Trevor manage all aspects of the business together, Tigue says Trevor tends towards the software development side while he’s more focused on the business management aspect. Passionate about the security industry, Tigue says it’s allowed him to combine his love of technology with practical problem solving and the opportunity to make a meaningful and measureable impact
securityfocusafrica.com
on people’s day-to-day lives. “Security is a fundamental driver of quality of life, and can have a phenomenally positive impact when done right,” he says with his characteristic enthusiasm.
Challenges… “The security industry in South Africa is very traditional in the sense that it likes to stick with the technology it’s familiar with. And then there’s a resistance to change by some of the old guard,” he says candidly. “They need convincing that technology, when used correctly, can completely revolutionise current business models, making it very hard to continue competing on a purely price, or rapid response, strategy.” This, he adds, combined with the deep level of faith that end users place in their installers to select and install tens of thousands of Rands-worth of equipment, often without them even knowing the brand of the solution, means that it is a significant barrier for new products entering the market. The entrepreneurial pair has devised an effective strategy to counter this challenge, too. “We’re choosing to partner with forward-looking armed response providers who can see that Sentian is not only an outstanding security tool and additional income stream, but also a platform to significantly reduce their operating costs, improve customer engagement and cement customer retention.”
Opportunities… More and more, clients are used to the convenience that technology brings them, whether it’s through their phone, their car or smart home gadgets. It would be shortsighted to believe that customers will be satisfied with the current status quo for very long. Already, many are craving the simplicity and sophistication they have on their phone
the second after they look at the brand new alarm keypad they’ve just had installed. Trevor and I want to completely revolutionise homeowners’ and business owners’ relationships with their security providers. We want to have a real and tangible positive impact on security in South Africa, and we want every part of the security ecosystem to benefit from Sentian.
Mentors… E lon Musk for his pragmatic, engineeringbased boldness, and Warren Buffett for his value-driven worldview and focus, in both business and his personal life.
Personal goals… ide a motorbike from the Cape Horn R to Columbia. And one day, before I die, I also want to get a six pack (not just the beer variety).
Five words that describe him… Practical, persistent, optimistic, engaged, loyal.
The things he will least tolerate in others… Intolerance, lazy-thinking and unfairness.
Home life… Home is Constantia in Cape Town, where he lives with his wife and two daughters, who keep him busy. A keen runner, he also likes a good gym workout to clear the cobwebs. Alternatively, you’ll find him immersed in technology, reading, on his motorbike or in the bush.
Dream destination… The Amazon is at the top of his travel wish list.
Books he’s reading right now… “ Tools of Titans” by Tim Ferris and “Solve for Happy” by Mo Gawdat.
SECURITY FOCUS AFRICA APRIL 2018
9
SPECIAL FEATURE: RISK MANAGEMENT
Managing risk
in today’s increasingly dangerous business environment “Technological advancements. Disruptive innovations threatening core business models. Recurring natural disasters with catastrophic impact. Soaring equity markets. Turnover of leadership in key political positions. Potential changes in interest rates. Cyber breaches on a massive scale. Terrorism. Elections in Europe. Threats of nuclear engagement.”
S
o reads the introduction to the 2018 Executive Perspectives on Top Risks Surveys from North Carolina State University’s ERM Initiative and global management consultancy firm Protiviti. Containing input from 728 executives and board members from a range of business entities around the world, the survey reveals that, for the time since its inception, the fear of disruptive innovation took first place on the list, ahead of regulatory scrutiny and economic fears. Cyber threats also featured among the top five risks, with respondents greatly apprehensive about their organisations’ ability to manage cyber threats that could significantly disrupt operations and damage their brands.
How cybercrime has become business’s most feared risk The evolution of the Internet of things (IoT), described by Governance Risk and Compliance (GRC) expert Warren Green 10
SECURITY FOCUS AFRICA APRIL 2018
of CURA Software Solutions as a digital revolution that could see up to 50 billion ‘things’ connected to the Internet by 2020, has, inevitably, heightened the risk of cybercrime in all its forms. Aside from loss of privacy and system malfunction, the financial cost of cybercrime is high and rising, adds Martin Walshaw, Senior Systems Engineer at F5 Networks, who says hackers made $2.75 billion on the black market out of just 429 reported breaches between 2005 and 2017. And the prognosis is frightening, according to John Stewart, senior vice president and chief security and trust officer of Cisco, who in his key note address at the recent RSA Conference 2018 in San Francisco, predicted that cybercrime would become a $6 trillion business by 2021 – up from $3 trillion in 2016. The numbers are already staggering. Serianu Limited, an Africa-based IT services and business consulting firm, in its 2017 Cyber Security Survey, reported that
financial institutions in 10 of the African countries surveyed had lost a collective $248 million in 2017; during the same period, governments lost $204 million. And so is the risk to privacy. In May 2017, 200 000 users were hit by the Wannacry ransomware cryptoworm, described by uproxx.com as a selfreplicating virus designed to invade systems, encrypt their files and then demand ransoms, usually in the form of a difficultto-trace digital currency. In the same year, 57 million Uber customers and drivers were affected by a massive data breach. Just recently, 87 million American Facebook users had their personal data shared with research firm Cambridge Analytica without their consent. Another privacy risk in the offing and likely to affect millions is Google’s new messaging service “Chat”. Amnesty International’s technology and human rights researcher Joe Westby, has gone on record to say that Google’s “baffling” decision to
securityfocusafrica.com
SPECIAL FEATURE: RISK MANAGEMENT
launch a messaging service without end-toend encryption shows its contempt for the privacy of Android users while handing a “precious gift” to cybercriminals pursuant of user data.” “Following the revelations by CIA whistleblower Edward Snowden, end-toend encryption has become recognised as an essential safeguard for protecting people’s privacy when using messaging apps. With this new Chat service, Google shows a staggering failure to respect the human rights of its customers. In the wake of the recent Facebook data scandal, Google’s decision is not only dangerous but also out of step with current attitudes to data privacy,” he says.
Unprecedented levels of attacks “The digital world has opened the door to unprecedented levels of malicious attacks, putting applications, corporate data, operational infrastructure, and reputations at risk,” warns Mr Walshaw. “New cloud-based apps create a host of complex challenges and new risks. Hackers thrive in this fast-paced environment of uncertainty and development.” Describing today’s hacker as ‘deceptive’ and focused on maximum disruption and profit, he says their key offensives include malicious bots, credential stuffing, DDoS, ransomware, web fraud, phishing, and malware. These attacks are frequently associated with malicious bots: according to Verizon’s latest Data Breach Investigations Report, 77 per cent of web application breaches used botnets to carry out the attacks. On the web fraud front, Mr Walshaw says attacks often stem from ‘Man-in-theBrowser Injection’ techniques, delivering a Trickbot via phishing, drive-by-download, or SMB ports. “Java-script is then injected into users’ browsing e-commerce or banking sites, allowing attackers to access credentials and steal from bank accounts.” Phishing scams are also on the rise, he warns. Typically, attackers trick users into clicking on links created to infect their systems with malware or take
The digital world has opened the door to unprecedented levels of malicious attacks, putting applications, corporate data, operational infrastructure, and reputations at risk,” Martin Walshaw, senior engineer, F5 Networks them to fake websites designed to steal personal information. “In the first quarter of 2017 alone,” he says, “a new specimen of phishing and malware emerged every 4.2 seconds.” Credential stuffing is another growing concern. Here, says Mr Walshaw, cyber criminals buy stolen user names and passwords off the dark web, which they then use to “stuff ” the login fields of other websites. And then there’s DDoS, which he says is becoming increasingly tricky to defend against. “Attackers use readily available DDoS tools to disrupt service availability and businesses’ performance,” he says, noting four main types of attacks: volumetric (flood-based attacks), asymmetric (invoke timeouts), computational (consume CPU and memory), and vulnerability-based (exploit application software). “The most damaging DDoS attacks mix volumetric attacks with targeted, application-specific attacks.”
Lack of visibility In its global survey titled “The Dirty Secrets of Network Firewalls”, network and endpoint security specialist company Sophos highlights a lack of application visibility as one of the most serious security concerns of businesses today. The survey, which polled more than 2 700 IT decision-makers from mid-sized businesses in 10 countries including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India and South Africa, found that IT managers could not identify 45 per cent of their organisation’s network traffic. “This lack of visibility creates significant security challenges for today’s businesses and impacts effective network
management,” says Dan Schiappa, senior vice president and general manager of products at Sophos. “Considering the debilitating impact cyber-attacks can have on a business, it’s unsurprising that 84 percent of respondents agree that a lack of application visibility is a serious security concern. Without the ability to identify what’s running on their network, IT managers are blind to ransomware, unknown malware, data breaches and other advanced threats, as well as potentially malicious applications and rogue users.” From a downtime perspective, according to the Sophos survey, organisations spend on average seven working days remediating 16 infected machines per month. Smaller organisations (100-1 000 users) spend on average five working days remediating 13 machines, while larger organisations (1 0015 000 users) spend on average 10 working days remediating 20 machines per month.
What exactly is cybercrime? Cybercrime encapsulates many different forms, from ransomware, fake news, bank fraud, phishing and identity theft to terrorism, disruption of services and stalking. IT website Techopedia separates the categories of cybercrime into two broad ones: crimes which target computer networks or devices such as viruses and denial-of-service (DoS) attacks; and those that use computer networks to advance other criminal activities such as cyberstalking, phishing and fraud or identity theft.
Collective solutions All around the world, people, governments and entities are uniting to fight cybercrime. In the Netherlands, Europol’s European Crime Centre has just added Norway
WHO WOULD YOU TRUST TO 021 404 1240 www.sparks.co.za
securityfocusafrica.com
DO THE JOB?
SECURITY FOCUS AFRICA APRIL 2018
11
SPECIAL FEATURE: RISK MANAGEMENT
and Switzerland to its J-CAT ( Joint Cybercrime Action Taskforce) membership list. Also in Europe, The Guardian reports a 25 May 2018 deadline for the implementation of the General Data Protection Regulation. Intended to provide better privacy protection and force companies including Facebook to dramatically change the way they collect information and permission from users, offenders will face huge fines going forward. To this end, SocialMediaToday reports that Facebook has updated its privacy tools and settings in line with the EU’s General Data Protection Regulation (GDPR). On 17 April 2018, the Cybersecurity Tech Accord was signed by 34 global technology and security companies. A commitment to defending customers from malicious attacks by cybercriminal enterprises and nation-states, it’s the largest-ever agreement of its kind and includes industry heavyweights such as ABB, Arm, Cisco, Facebook, HP, HPE, Microsoft, Nokia, Oracle and Trend Micro. In Africa, the Kenya Defense Force has joined forces with a number of cybercrimefighting entities in response to growing cybercrime threats and losses. Arguably the tip of the iceberg but certainly cause for celebration and repeat performances, the recent arrest of a Spanish cybercrime gang leader comes on the back of an intensive, joint investigation
involving Europol, the FBI (US Federal Bureau of Investigation), authorities in Romania, Moldovia, Belarus and Taiwan as well as a number of private cyber security companies. According to Europol, the gang was behind the Carbanak and Cobalt malware attacks that targeted more than a hundred financial institutions throughout the world from 2013. Using malware, the gang hit more than 40 countries, with losses to date in the region of more than EUR 1 billion, or an average of EUR 10 million per heist.
Individual solutions Simeon Tassev, Managing Director of Galix, says companies have to start educating technology users, not just protect the business. Since all-for-one security policies no longer exist, organisations need to create their own by first defining the levels of risk, and then ensuring that the security policy and rules are practical and enforceable. “The security at any organisation will depend on the systems in use,” he explains. “Enterprises need to identify entry points to their networks and (then) put endpoint protection in place, control access to and monitor traffic on these networks, sweeping networks clean regularly. The enterprise must also ensure the security circle is closed, putting alerts in place and acting on those alerts, staying ahead of new and emerging threats and enforcing basic safeguards, such as ensuring users implement anti-malware on their phones.” He continues: “As the extent of our digital exposure and vulnerability continues to unfold, it’s clear that businesses need to take more responsibility for educating users. The rights and privileges we give digital platforms and applications, like Facebook and others, are being exploited in unexpected and surprising ways. It’s time we wised up – there are very few benevolent providers of free apps and functionality. The digital world is in its infancy and there are untold and as yet unknown ways in which our data and our online behaviour can be manipulated and cashed in on.
Companies have a lot to lose – it’s time to ensure everyone takes responsibility for putting the basics in place.
Defensive moves To combat the risk of cybercrime, Mr Walshaw recommends a number of defensive moves. These include the implementation of a robust web application firewall (WAF), which he calls the “first piece of armour against credential stuffing attacks”. A full-featured, modern WAF with advanced bot detection and prevention will allow businesses to tackle offensive moves head-on, he says, essential since the majority of attacks are launched using automated programmes. “By analysing behaviours such as IP location, time of day and connection attempts per second, a WAF can help your security team identify non-browser login attempts.” He also urges users to encrypt all mobile and browser data in order to protect information transferred from users and render intercepted data worthless. Then, he says, it’s vital to set up policies that encourage and make it easy for employees to change passwords regularly, and to encourage the immediate reporting of incidents in the event of accidentally clicking on a rogue link. It’s also time to stop flying blind. “If you can’t see everything on your network, you can’t ever be confident that your organisation is protected from threats,” warns Mr Schiappa of Sophos. “A single network breach often leads to the compromise of multiple computers, so the faster you can stop the infection from spreading, the more you limit the damage and time needed to clean it up. “Organisations need firewalls to protect their investments in business-critical and custom applications by allowing employees to have prioritised access to the applications they need. Increasing network visibility requires a radically different approach. By enabling the firewall to receive information directly from the endpoint security, it can now positively identify all applications – even obscure or custom applications.”
A GUARD MONITORING SOLUTION FOR ANY APPLICATION * DB Projects and Agencies
sales@guardreports.co.za 011 888 4982 356 Pretoria Ave, Ferndale, Randburg
* All backed by on-site service
12
SECURITY FOCUS AFRICA APRIL 2018
securityfocusafrica.com
NATIONAL NATIONAL CERTIFICATE CERTIFICATE IN IN
XXX
GENERAL SECURITY PRACTICES NQFLEVEL 3 SAQA ID 5857 7 GENERAL SECURITY PRACTICES NQF LEVEL 3 SAQA ID 58577 SPECIALIST SECURITY PRACTICES NQF LEVEL 4 SAQA ID 57713 SPECIALIST SECURITY PRACTICES NQF LEVEL 4 SAQA ID 57713 Training Courses Training Courses
Armed Robbery Survival Skills Armed Robbery Survival Skills Hijack Survival Skills Hijack Survival Skills OHSAct - Assigned Persons OHSAct - Assigned Persons OHSAct - Health and Safety OHSAct - Health and Safety Representative Representative Fire Technology Fire Technology Emergency Planning and Evacuation Emergency Planning and Evacuation Enhancement Programme Enhancement Programme CCTV Management CCTV Management Supervision of Personnel Supervision of Personnel Basic Management Basic Management Advanced Management Advanced Management Internal Customer Service Internal Customer Service Performance Management Performance Management Business Fundamentals Business Fundamentals Administration of Training and Development Administration of Training and Development Master-In-Mind Human Investigation Management
BTC Training (Africa) (Pty) Ltd 1999/018931/07 BTC Training (Africa) (Pty) Ltd 1999/018931/07
Credit Card Fraud Credit Card Fraud Fraud Investigation Fraud Investigation Basic Investigation Basic Investigation Risk Management Risk Management Security - A Basic Need Security - A Basic Need Security - A Total Concept Security - A Total Concept Public Relations Public Relations Understanding and Dealing with People Understanding and Dealing with People Advanced Motoring Advanced Motoring Loss Control/Security Managers/Loss Control/Guards Loss Control/Security Managers/Loss Control/Guards Retail Loss Prevention Retail Loss Prevention Drug Abuse and Dependency Drug Abuse and Dependency Campus/School Security Campus/School Security Shopping Centre Security Shopping Centre Security Practical Skills in Self Defence Practical Skills in Self Defence Home Personal Safety Programme Home Personal Safety Programme
Skills Programmes Skills Programmes Patrol Patrol Access Control Access Control Asset Protection Asset Protection First Line Security Supervisor First Line Security Supervisor Security Supervisor Security Supervisor
Office 3, Promenade Centre, 40 Road, AlbertonNORTH 9A Voortrekker Tenth Avenue, ALBERTON ALBERTON NORTH, 1456 PO BOX 136843, Alberton North, 1456 Tel: 011 869 1946 • Fax: 086 606 7489
errol@btctraining.co.za
securityfocusafrica.com
SECURITY FOCUS AFRICA APRIL 2018
13
081965442557 081965442557
TRAINING
Technical surveillance countermeasures training Technical Surveillance Countermeasures (TSCM) is an important function as it helps organisations to bullet proof their information security and risk management programmes.
14
SECURITY FOCUS AFRICA APRIL 2018
O
rganisations are now under pressure to ensure that they take appropriate measures not only in creating value, but also to adequately safeguard and defend the interest of their shareholders and stakeholders. This includes conducting regular TSCM surveys to demonstrate that the organisation has taken all reasonable steps to help ensure that there is an appropriate risk management programme in place to help achieve this objective. If organisations, municipalities, NPO’s, pension funds and SME’s do not conduct regular TSCM surveys of their sensitive areas, it could be argued that they do not take “prudent” and “reasonable” steps to safeguard their information against possible technical attacks. The same could be true if a company selects a service provider who does not comply with the minimum requirements regarding training, experience and equipment. There are, however, distinct differences between genuine TSCM professionals and those performing services without any or outdated training. Eavesdropping Detection Solutions (EDS) has been offering TSCM training since 2000 and has its own dedicated TSCM training facility in Centurion. The EDS TSCM Training Academy is the only formal TSCM training facility on the African continent and one of a few in the world. Advancing a career in TSCM demands that a practitioner’s fundamental knowledge of the profession’s universal principles is grounded and solid. TSCM professionals occupy the “front lines” of information security and have to be aware of the latest threats and what is happening in the World. The EDS training courses help practitioners to plug the gaps and to stay ahead. The EDS courses are not just for South Africans. Over the years many from other parts of the world, the US, Europe, the far and middle East, Australia and Africa have attended the EDS training courses. EDS has also presented courses in Australia, Singapore, England, Sweden, Egypt and several African countries. The training programmes are constantly updated to address the latest known technical attack threats. The training facility is one of only two private training facilities in the World with a dedicated telephone training room. The telephone
securityfocusafrica.com
+27 12 335 0595 info@kitdirect.co.za
The EDS TSCM Training Academy is the only formal TSCM training facility on the African continent and one of a few in the world.” training room has six fixed and two portable testing stations. Each station has a number of analogue, digital and VoIP telephone instruments, lines and data cables. The room has two PBX’s and a server. All known attacks against telephone lines and data cables, including VoIP intercepts are done in the training room. Attendees work with Talan 3 Telephone and Line Analysers to study and identify the threats. Upon the completion of their training attendees can easily identify any technical attacks against any telephone instruments and lines. Another training room has the latest and most modern devices in terms of audio, video, GSM, Bluetooth and Wi-Fi attacks. Here attendees work with Oscor Blue and Oscor Green Spectrum Analysers to identify and study the signatures of the radio frequency (RF) attacks and how to counter these attacks. The EDS TSCM Training Academy has a few full-time instructors with more than 50 years practical and real-life experience in the TSCM, technical work, surveillance operations and counterintelligence in both the government and corporate environments. EDS offers eleven different courses from very basic TSCM concepts to advanced solutions. Guest instructors from other parts of the world regularly present at the EDS training facility. Cyber attacks, cyber espionage and data theft have taken technical threats to a completely new level. From this has emerged Cyber TSCM*. A Cyber TSCM team focuses on much more than the traditional “sweeping and debugging” services. Just focusing on the basic technical services could leave an organisation vulnerable. The EDS TSCM Training Academy is the first private TSCM training facility in the World that offers training that focuses on Cyber TSCM. Cyber TSCM™ training also focuses on other ways to identify how sensitive, classified and secret information as well as data could be intercepted, lost or stolen. *EDS has been granted the exclusive use of the words Cyber TSCM in South Africa. EDS has an active trade mark application in South Africa for the use of the term Cyber TSCM. EDS training personnel
700 Steve Biko Road Gezina Pretoria 0084
TECHNOLOGY UPDATE
Decoding the DNA of a
digital future
Removing the human element from error-prone environments was a key element of an April event hosted by award winning, global technology services firm In2IT Technologies, and IT and networking specialists Cisco Systems South Africa.
T
itled “Decoding the DNA of a Digital Future”, the event featured a panel of industry experts including Vishal Barapatre, chief technical officer of In2IT Technologies, Saurabh Kumar, chief executive officer of In2IT Technologies and Edward Agostinho, consulting systems engineer at Cisco Systems South Africa. Their topics included an introduction to “Digital Twin”, “Building a Smart Future using the IoT”, and “Blockchain’ s value as a functional proof point of “Know Your Customer (KYC).” In his introduction, Mr Barapatre said it was vital for businesses to upgrade their traditional processes so that they were in line with emerging technologies. “Traditional methods of business have changed because the digital structure has changed. For example, blockchain and the Internet of things (IoT) are now a focus within large organisations and security will change along with that, both from enterprise and end user point of view,” he said. 16
SECURITY FOCUS AFRICA APRIL 2018
Predicting that 6 billion people would have about 30 billion devices connected to the IoT in the next couple of years, Mr Barapatre said it was critical to safeguard this massive amount of data by making proactive IT maintenance a number one priority. “There’s a lot of associated risk around the IoT and blockchain because there are no boundaries,” he said, “but there’s also huge value in it, not least of all because of its ability to improve customer service, device functionality and fleet control through readable user performance.” Consumers are increasingly demanding smarter, more efficient, real-time data at their fingertips, Mr Barapatre said. He added that the solution lay in the “technology evolution” with its multitude of applications. From fridge inventories to call centre management, the new cutting-edge technology had the potential to improve customer service and significantly reduce human error. To this end, In2IT’s ‘Mapula’ chatbot, launched earlier this year, has been designed
to streamline mobile messaging using the power of artificial intelligence (AI). “As the South African government looks towards new technologies to improve and enhance services to its citizens, so chatbots will become a highly beneficial tool owing to their ability to automate operations, whether these are with the clients themselves or outsourced to service providers,” he explained. Key benefits of the chatbot, which can manage hundreds of units, include improved operational efficiency and 24/7 availability. This makes them ideal for retail operations, supply chains, banks and call centres. “So the first point of a client’s contact would be a chatbot, which would ask standard questions. It would also perform sentiment analyses, identifying emotions such as anger. In these circumstances, it would then transfer the client to a right skilled human operator. And it can red-flag aspects for human follow up, all of which makes for increased efficiency.” He added: “AI, with its ability to use
securityfocusafrica.com
TECHNOLOGY UPDATE
historical data and identify patterns, is going to be key to predicting future behaviours and improve business leaders’ decision-making capabilities. By automating
processes and removing the human element where errors are considered harmfully high, they will be able to reduce costs, improve customer satisfaction, enhance productivity and increase profitability. “So, while the sheer scale of our connected, digital world means that the scope for cybercrime has broadened, the future is about utilising these technologies and developments.” Mr Kumar said In2IT Technologies looks at five key considerations for potential chatbot users. These include identifying the required public services, and ensuring that the chatbot is fully-integrated into back-end, legacy and core systems for optimum information retrieval, writing or reduplicating new data into databases, and adding activities into workflow systems. Third on his list is thoroughly addressing the cyber-security requirements from all possible angles. “As more and more sensitive data bouncing between bots and users is stored
LEFT: The In2IT
digitally, it’s team; RIGHT: Vishal essential to have Barapatre, CTO of In2IT Technologies an impenetrable security posture,” he emphasised. It’s also critical to implement a comprehensive, engaging change management approach, he added. “As with any new technology, it takes a lot to overcome initial resistance so one needs to have a sustained focus on the benefits to the staff member, the (government) department, and the enduser, brought to bear by compelling change management strategies.” Concluding, Mr Kumar said that while chatbots are “still a somewhat nascent technology”, making it tempting to sit on the side-lines and watch the field developing, the best approach is just to get started with a very basic chatbot. Initially this could be used in a restricted beta trial, and then it could be extended to include ever-more complex self-learning algorithms.
POINTS OF REFERENCE: Internet of things (IoT): the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data. (Source: Wikipedia)
Blockchain: A continuously growing list of records (blocks) which are linked and secured using cryptography. (Source: Wikipedia) Digital twin: A digital replica of physical assets, processes and systems that can be used for various purposes. (Source: Wikipedia)
The rugged, reliable device that optimises your security services
securityfocusafrica.com
Artificial intelligence (AI): Intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. (Source: Wikipedia)
Softbot: “Software robot”, a computer program that performs various actions continuously and autonomously on behalf of an individual or an organisation. (Source Wiktionary) Chatbot: Software that can have a conversation with a human. (Source: botpress)
• GPS and GSM functionality to track and communicate with your guard in real-time. • No additional maintenance costs. • User-friendly. • RFID reader. • Panic button. • Man-down function. • Access to Active View, a live web interface.
Tel: 011 551 1687 Fax: 086 218 2928 info@activetrack.co.za Facebook: @activetrackSA www.activetrack.co.za
SECURITY FOCUS AFRICA APRIL 2018
17
COMPANY NEWS
SENSOR SECURITY EXPANDING INTO WIRELESS BROADBAND
Moving with the times at
high quality speed Already leading from the front as the leading independent importers and distributers of access control, fibre optics, fire, PA and surveillance equipment, Sensor Security is expanding into an entirely new product class altogether: wireless, or more specifically, ultra-fast wireless broadband.
T
his move means that Sensor’s clients will be able to transfer video, sound, and data over long distances via a wireless product solution without relying on third party data networks. Marco Della Peruta, head of technical services at Sensor Security, explains: “Video surveillance cameras typically transfer information using third party networks, which can be limiting. This is where we see data transfer technology, which can deliver fast, stable and reliable connectivity in high interference applications, playing a vital role.” With this thinking in mind, Sensor set about finding the right partner brand to help them achieve their goal. “LigoWave is a US-based company that, just like our other premium brand partners, matches our commitment to quality. They also produce a carrier-class products, which means that there is a strong emphasis on durability and cost efficiency. In short, we feel that LigoWave is the ideal choice for the African market”.
New generation point to multipoint systems Mr Della Peruta explains: “The way these products work is that data is sent via a
18
SECURITY FOCUS AFRICA APRIL 2018
sender and receiver. This in itself is not new, but what is exciting is that there is zero reliance on civil hardware – and zero red tape. What is also exciting is the carrier’s ability to handle high throughput (up to 700 Mbps over a proprietary protocol) of triple-stream services, which is of key importance when it comes to heavy duty, real-time video surveillance.”
Overcoming physical challenges “Another advantage,” Mr Della Peruta continues, “is that this new technology provides a solution to the challenge of covering rugged terrain. In South Africa, for example, remote locations or testing physical environments means that there is often no, or very little, existing cable infrastructure to make use of. What’s more, the LigoWave point to multipoint network can cover great distances.”
Industrial-rated design “The intelligence behind the LigoWave product range is highly appealing too. The units are specifically designed to be easy to deploy and easy to configure. The hardware carries an IP67 weather rating and
has integrated surge protection. And given the increase of noise in the unlicensed band, a reliable and stable connection is increasingly difficult to achieve, which is why metal enclosures work as a deflector eliminating interference caused by backlobes and rejecting noise when multiple base-stations are co-located on a single tower. Apart from radio frequency (RF) shielding, the metal housing works as a heatsink, allowing better RF performance by dissipating the heat generated by the radio. What’s more, units like the Integrated RapidFire have a 45 degree rotation option of the mounting bracket, which enables installers to change the polarity of the radio frequency put out by the units, which reduces interference even more.”
Game on Mr Della Peruta concludes: “We are confident that breaking ground in a new product class is going to strengthen our position even more. We are also pleased to be able to bring a range of products to the local market that offer a very strong performance to cost ratio.”
securityfocusafrica.com
COMPANY NEWS
Ultra fast wireless broadband Sensor is moving with the times at high quality speed By introducing LigoWave to South Africa our clients can now enjoy access to data transfer technology at its finest.
New team member,
Incredible performance
new growth
Extremely high throughput rate (700+ Mbps) Choice of entry through to carrier class Stable connection in high interference applications
Sensor Security recognises that a company’s
Professional design
true worth lies in its people. As such, we are
High IP-rated enclosures Integrated surge protection Adjustable mounting bracket for easy installation
pleased to welcome John Loudon to our forward-thinking team.
Powerful performance to cost ratio
J
ohn is well known in the security industry and has worked with numerous key players over the course of his career. In his new position as business unit manager of access control and biometrics, John will be responsible for growing this fast moving division which will see him representing the likes of Virdi, Morpho and Impro, a locally-designed range of access control products that Sensor recently gained the rights to distribute. In addition to the wealth of experience that John brings to the table, he previously worked at Impro Technologies at the turn of the millennium so he is highly familiar with the vision behind this innovative company and its products. We look forward to sharing an exciting future together.
SECURITY FOCUS AFRICA APRIL 2018
Midrand +27 (0)11 314 9419 Cape Town +27 (0)21 914 7557 Port Elizabeth +27 (0)41 581 0316 Durban +27 (0)31 263 0305 Email info sensorsecurity.co.za www.sensorsecurity.co.za
19
COMPANY NEWS
Hi-tech Live Monitoring made easy!
Hikvision honoured with Red Dot Award According to the announcement of the Red Dot Award 2018, Hikvision’s MR-Q3-LR series of intelligent warehouse robots stood out from the submissions from 59 countries and won the Red Dot Award: Product Design 2018.
T
he robots boast concise and versatile design. By adopting the concept of “handling complexity by simplicity”, Hikvision’s MR-Q3LR series of intelligent warehouse robots provides excellent technical performance and human-machine interaction capabilities. In addition, the exquisite workmanship and flexible customisation feature also helped the series win the hearts of the jurors. Thanks to the frame made of aluminium alloy, the robot is robust yet light. The twowheel differential drive features flexible motion control, which ensures smooth movement of robots, and the visual and inertial navigation (which will be upgraded to laser navigation) enables precise localisation by robots. The IP54 protection level allows the robots to function well even in harsh environments. Hikvision’s intelligent warehouse robots are a prime example of mobile robots being used on a large scale. Together with machine vision products, mobile robots have been widely used in numerous sectors including electronic equipment manufacturing, automotive manufacturing, e-commerce logistics, retail, third-party
www.magtouch.co.za
20
SECURITY FOCUS AFRICA APRIL 2018
logistics, food and beverage, photovoltaic, and medical. Nearly 800 Hikvision intelligent warehouse robots have been employed in the Hikvision Tonglu security industry base for its phase I and II projects to provide strong warehouse and logistics support for the base, which has a daily output value of more than RMB 100 million. This solution drastically reduces labour intensity and increases production efficiency and quality. In addition, the big data optimisation technology is applied to optimise the warehouse layout, saving approximately 58 per cent in manpower and boosting efficiency by 84 per cent. Founded in Germany in 1955, the Red Dot Design Award is one of the top three internationally recognised awards in industrial design, along with the iF Design Award of Germany and the IDEA Awards of the USA. The Red Dot Award is renowned for its stringent evaluation criteria. It comprises three awards in the disciplines of product design, communication design, and design concept. The selected product must have innovative features that set it apart from other similar products and make it the leader in its industry.
securityfocusafrica.com
XDL12TT-AM
Reliable external protection Detection performance with easy installation The new Tri-technology low mount XD combines Tri-Signal Detection Logic with Dual-Vision Technology to heighten detection capability and provide reliable pet immunity. Using Anti-masking (Grade 3) and Anti-blocking (Grade 4) technologies to provide a robust and secure external detector. Offering 90-degree detection when mounted at a height of 1.2m, the brand-new XD can provide a maximum range of 12m detection.
www.pyronix.com
COMPANY NEWS
Sensor Security recognised with Hikvision award Founded in 2001, Hangzhou Hikvision is a leading supplier of video surveillance equipment with a presence in 18 locations around the world. To encourage superior levels of service, this manufacturing giant acknowledges its top achieving service partners with an annual award.
S
ensor Security has just been named the winner of the Hikvision Global Excellent Service Partner Reward for outstanding technical repairs (RMA’s) and technical support for 2017. Bill Xu, Hikvision channel sales manager, African business department, details the selection process, “The award is based on a distributor’s annual maintenance record and overall evaluation. After having reviewed the results of our 2 400-plus partners, the Hikvision channel development department narrowed its final selection to 8 Global Excellent Service Partners, of which Sensor Security is one. “What makes this even more remarkable is that only three company’s were named for the Europe, the Middle East, and Africa (EMEA) area and more notable still, is that Sensor is the only awardee in Africa.” “To say that we are happy is an understatement,” says Marco Della Peruta, the head of technical services at Sensor Security, “Achievements like these don’t happen overnight. They are the result of many years’ of commitment and teamwork and we look forward to continually finding ways to optimise our technical service quality and raise the overall brand image of Hikvision in the local market.” Jan Venter, executive chairman at Sensor Security, says, “Service is one of those things that many company’s talk about but don’t always deliver. This award reinforces what we’ve always known about Sensor, and reflects our motto of setting the standard.”
Manda Cornelissen, repairs controller; Evan Liu, country leader Hikvision South Africa; Marco Della Peruta, head of technical, Sensor; and Henry Brown, executive director, Sensor.
Jan continues, “While our RMA and technical departments are our heroes, the Hikvision accolade further demonstrates that our team members are our greatest asset. The news of this global achievement will further drive each and every one of us to keep reaching for new heights.” Sensor is one of only 8 companies worldwide who received this highly sought-after award for quality technical support.
FLIR Systems completes strategic investment in DroneSense Investment creates partnership to develop powerful UAS solutions for FLIR’s first responder customers and funds DroneSense for growth.
F
LIR Systems announced today that FLIR has completed a strategic investment in DroneSense, makers of a unique software platform that serves the growing needs of public safety organisations in utilising unmanned aircraft systems (UAS) to better perform their missions. The minority investment by FLIR in DroneSense will create opportunities for the companies to collaborate and share their respective expertise and customer relationships to develop and bring to market advanced UAS operating, management, and
22
SECURITY FOCUS AFRICA APRIL 2018
reporting systems. FLIR’s advanced thermal imaging payloads for UAS platforms provide first responders a new sense of awareness by imaging heat, seeing through smoke, and seeing at night. DroneSense’s comprehensive solution will enable first responders of all types to build and scale their UAS programs with full accountability and transparency. Together, the FLIR and DroneSense offerings will enhance situational awareness, act as a force multiplier, and ultimately save more lives as organisations continue to integrate UAS into daily missions.
“This alliance with DroneSense will help bring to market a truly mission-critical solution needed by first responders to effectively deploy a complete UAS program across their organisations,” said James Cannon, president and chief executive officer of FLIR. “We believe this platform is scalable geographically, across multiple markets, and across multiple FLIR Business Units. While focused today on UAS, we see longer term opportunity for the solution to be extendable to other forms of sensing devices.”
securityfocusafrica.com
How safe is your cash? Cash related crimes are like a plague to South African society. Millions of Rands are lost to the economy each year, not to mention the loss of many lives in the process.
W
orking from the premise that prevention is better than cure, Cash Connect, SA’s leader in automated cash management solutions, has invested considerable resources into the design, testing and manufacture of the safest in-store cash Richard Phillips, joint CEO of Cash Connect vaults possible. And the latest research results confirm that the strategy is paying dividends. Richard Phillips, joint chief executive officer of Cash Connect, says his company’s technology has been vigorously tested and proven to be the most effective deterrent to cash crime in the market. “Stores using our cash vaults were attacked far less than any other, despite an increase of more than 30 per cent in attacks against the industry in the past year. These results clearly demonstrate the success of our strategy of deter, deflect and defend.” A further telling statistic is the 19 per cent decrease in attacks on Cash Connect’s vaults in 2017 over 2016, despite the company’s almost 40 per cent year-on-year growth. This indicates that Cash Connect customers (retail stores) remain significantly safer than those serviced by competitor solutions. Cash Connect processes over R60 billion a year on behalf of bluechip customers such as Spar, Shell, Engen, Pick ‘n Pay and OK, to name but a few. The company’s range of robust cash vaults, all built to minimum SABS Category 4 standards, are rapidly growing their presence in retail stores across the country. “In the 2017 calendar year, 51 per cent of attacks on our vaults were bombings; we defended 92 per cent of them,” says Mr Phillips. “In the other 49 per cent of attacks, an assortment of tools were used to try and gain access to the cash. We defended 81 per cent of these attacks.” With such an exemplary risk record, it is easy to deduce that the reputation of Cash Connect vaults is a powerful deterrent. Given research showing that 90 per cent of all attacks occur with insider participation, Mr Phillips encourages retailers to use the reputation of Cash Connect vaults to their advantage. “When staff know that a Cash Connect vault offers a high level of resistance to attack, the criminals will soon get the message and move on. Safety, however, is not the only benefit Cash Connect brings to the retail table. As South Africa’s most successful independent provider of automated cash management and payment solutions, it empowers retail businesses with services that create greater efficiency and improved cash flow and offer quick access to capital with which to grow their businesses. “Our goal is to enable businesses to move from a place of safety, to a place of growth,” says Mr Phillips. “We do this by offering improved efficiencies, reduced risk, multiple payment functionality and access to working capital. With us, business owners have a partner in retail success.”
SECURITY FOCUS AFRICA APRIL 2018
23
ON THE MARKET
Suprema fingerprint algorithm and 3D facial recognition solution
Featured in Samsung Galaxy J5 2017 smartphones, Suprema BioSign is now far enhanced, leveraging Suprema’s proprietary AI technology. Coupled now with LookSign, the company’s latest 3D facial recognition solution, Suprema plans to penetrate the next generation premium smartphone market.
I
n the case of in-display fingerprint recognition, algorithm complexity is known to be very high due to its sensor structure and imaging characteristics. Consequently, the algorithm now plays a more critical role in recognition performance compared to conventional sensors. The in-display oriented BioSign 3.0 provides a higher level of recognition performance and speed by combining Suprema’s two decades of expertise in optical fingerprint imaging and AI technologies. The company has teamed up with major sensor producers around the world for next-generation premium smartphones. Last year the company launched FaceStation 2, a facial recognition access control terminal, featuring Suprema’s own near-infra-red imaging technology. Award
24
SECURITY FOCUS AFRICA APRIL 2018
winner of Sweden’s Detektor International Award 2017 in Best Access Control Products, FaceStation 2 far outperforms most of today’s facial recognition devices and features the world’s fastest matching speed of 3 000 match/sec, highest operating illuminance up to 25 000 lx, and lowest error rate of FAR at 0.00002 per cent. LookSign, Suprema’s 3D facial recognition technology for smartphones, blends FaceStation 2’s facial recognition technology with 3D image processing techniques to produce an optimised algorithm for smartphones. LookSign uses surface light source and patterned light to gain 2D and 3D information to provide more accurate recognition performance and a higher security level.
Suprema has plans in place to discuss cooperation with sensor producers to develop integrated solutions. “Suprema’s core competitiveness is ongoing technological innovation. BioSign 3.0 and LookSign will showcase a new leap in biometric technology in the smartphone market and attract more smartphone manufacturers,” said Brian Song, chief executive officer at Suprema. “As a fingerprint recognition algorithm technology, BioSign provides superior authentication performance and matching speed even in a small sized fingerprint sensor of 4 x 3.2 mm, and it is an essential solution for applying fingerprint recognition functionality to mid-to-low range smartphones as well as high-end smartphones,” Mr Song added.
securityfocusafrica.com
XXX
securityfocusafrica.com
SECURITY FOCUS AFRICA APRIL 2018
25
ON THE MARKET
Discreet 360° all-round vision with Dallmeier Discreet installation and best image quality with the Dallmeier MDF5400HD-DN Fisheye camera. The new network camera with fisheye lens enables 360° allround vision in real time with no blind spots. 360°panoramic view and 8 megapixel resolution The Dallmeier MDF5400HD-DN Fisheye is a network camera with a fisheye lens especially designed to work with the image sensor. The high resolution of the sensor in conjunction with the very latest encoder technology and sophisticated image processing together deliver image recording of exceptional quality with 8 megapixel resolution and a frame rate of up to 25/30 fps. This camera is therefore the ideal choice when an entire room has to be captured in detail with no blind spots and in real time. The rectified display of the live image and recordings from a MDF5400HD-DN is supported with
a digital PTZ function by any workstation in the SeMSy® Video Management System. In smaller video security systems, convenient analysis with the SMAVIA Viewing Client video management software is the ideal option. Besides a PTZ function, the SMAVIA Viewing Client also supports the display of one rectified 360° panoramic view or two 180° views of half the room each.
Discreet installation The Fisheye camera consists of one ultracompact sensor housing designed for unobtrusive fitting in suspended ceilings. It can be installed in extremely small spaces together with the separate encoder
housing and operated with an external power supply or with PoE Class 0.
Automatic switching between day and night modes The camera is equipped with an ambient light sensor and a removable IR cut filter and can switch between day and night modes automatically. Different day and night presets can also be defined and adapted for the exposure settings.
Video content analysis The integrated video content analysis (VCA) detects movement and objects in the uncompressed image and analyses them in real time (depending on the analysis resolution) with highly advanced analysis functions such as intrusion detection or line crossing.
Paxton introduce the Net2 Entry premium monitor Paxton, the global brand of electronic IP access control and door entry solutions, has announced the launch of the Net2 Entry Premium Monitor, the latest addition to its award-winning door entry system.
T
he new interior monitor provides a greater personalised experience together with an elegant aesthetic design. The smart, slim monitor, with simple user interface, includes a quality glass touch screen and 25 background themes making it ideal for a range of applications. This includes highend residential, commercial buildings and healthcare sites. The monitor has a host of new features including a concierge function, offering simple visitor and site management. This enables users who are busy or away to divert the monitor to reception, and if the caller is missed, enhanced call administration provides a video snapshot and event log of visitors.
26
SECURITY FOCUS AFRICA APRIL 2018
Additional features include a high quality digital camera enabling two-way communication between users or the concierge, and a line-out for use with a T-Loop antenna for users with hearing aids. The monitor is available in two variations, with or without a handset. A desktop stand is also available, making the monitor adaptable for various environments. Gareth O’Hara, Paxton’s chief sales officer says: “Following the successful release of the Net2 Entry Touch Panel last year we wanted to further increase the premium product options for our installers. By combining the latest available technology and listening closely to our customers’ feedback we continue to make improvements to what is one of our fastest growing product lines. The
elegant design and personalised experience provided by the Premium Monitor perfectly compliments our Net2 Entry range. “As with all Paxton products this userfriendly solution is supported by our industry leading technical support, 5-year guarantee and a hassle free returns service.” Pitched as the simplest door entry system available, Net2 Entry consists of just three components that auto-detect on set up; external panel, interior monitor and door controller, for a true plug and play solution.
securityfocusafrica.com
EXHIBITION NEWS
Hikvision holds
“shaping intelligence” AI Cloud World Summit
Organised by Hikvision, the 2018 AI Cloud World Summit was successfully held at Hangzhou International Expo Centre from March 30–31. The summit discussed building an artificial intelligence (AI) ecosystem through open collaboration
O
ver 2 000 participants attended the summit, including industry experts and scholars, as well as Hikvision partners including Microsoft, Intel, Milestone Systems and Axxonsoft. Attendees and presenters explored trends in AI development, its real-world applications, and opportunities for AI-related partner cooperation in global markets. Hikvision introduced AI Cloud in October 2017 at the China Public Security Expo in Shenzhen. AI Cloud is a development concept born out of the Internet-of-Things (IoT) era. It is a three-layered architecture that incorporates cloud and edge computing to provide multi-dimensional perception and front-end processing at edge nodes. It then processes data in real-time and converged to edge domains for intelligent applications to create new data. It then further converges on-demand data to the cloud centre for big data analysis.
Building AI Cloud ecosystems through open collaboration AI is thought to be another rising technology that is going to significantly impact the human society. In his keynote speech, Yunhe Pan, a member of the Chinese Academy of Engineering, highlighted that AI is already evolving to its next stage due to the emergence of new social needs such as smart cities, smart medicine, and unmanned driving, as well as significant changes in information environments like
securityfocusafrica.com
the Internet, mobile computing, cloud computing, IoT and others. In short, the next generation of AI is moving towards big data intelligence, collective intelligence, and cross-media intelligence. “A large number of application requirements are surging in a fragmented way. The implementation of AI is restricted mainly by three factors: data, computing power and application. To accelerate the process, it is necessary for all stakeholders in every industry to be open and collaborative to build an AI industry ecosystem,” said Yangzhong Hu, president of Hikvision at the summit. “To enable more partners to participate in the construction and sharing of the AI ecosystem, the company will be fully open on its products and services, including the AI Cloud software platform, training system, AI services, data annotation and data sharing services, etc,” he said.
The emerging needs for edge computing At the summit, Oliver Philippou, associate research director at IHS Markit, gave Yangzhong Hu, Hikvision president, addressing the audience at the summit.
Hikvision’s international attendees a presentation titled “Artificial intelligence – the present and future prospects for video surveillance”. According to Mr Philippou, increasing numbers of network cameras on the global market pushes the development of video analytics further toward convergence to edge and cloud systems, requiring better algorithms and deep learning to provide maximum accuracy. Dr Shiliang Pu, president of Hikvision’s research institute, shared the company’s AI research facilities, milestones, and achievements over the past years. Dr Pu pointed to advantages of edge perception and its ability to generate multi-layered cognition to empower AI applications. It is the joint efforts for various providers to build up this AI ecosystem. Hikvision was honoured to have three of its strategic partners, Intel, Milestone Systems, and AxxonSoft, give keynote speeches in a summit session about mutual partnership and how AI changes partner ecosystems.
SECURITY FOCUS AFRICA APRIL 2018
27
INTERNATIONAL NEWS
Hikvision assists state-of-the-art vehicle production Providing a comprehensive security, health & safety and production management tool, SAIC General Motors Wuling (SGMW), is now operating a Hikvision based HD surveillance system at one of the world’s newest vehicle manufacturing plants.
A
n annual producer of 1 million commercial vehicles and passenger cars, to meet its ambitious automotive production plans, SGMW recently opened a third manufacturing plant in Bekasi, Indonesia, built on a massive 60-hectare site and costing 700 million USD. To provide the level of intelligent camera functionality and surveillance management required at the state-of-the-art SGMW factory, the automotive manufacturer enlisted the help of Hikvision distributor, Prima Inovasi Teknologi.
Smart surveillance Installed by Autojaya, the 172 Hikvision Full HD Smart video surveillance camera based system utilises IP transmission over a local fibre Video Private Network, to deliver full HD capture, recording, decoding and display. Using a mix of Hikvision DS2DF8223I-AEL 2MP WDR Darkfighter IR PTZ cameras with Smart Tracking & Detection, DS-2CD6026FWD/E-L ultra-low light Smart Darkfighters, DS-2CD4A26FWD-IZ 2MP Smart Low Light cameras and DS-2CD6986F-H 8MP Multi-Imager Panoramic Dome cameras with 180° Horizontal View, the HD camera system supplies ultra-detailed imaging of every key internal and external factory location. Across the site, the Full HD Smart camera
28
SECURITY FOCUS AFRICA APRIL 2018
network provides effective scene coverage and VCA alarm activation, providing HD imaging and automated situation alarm handling for the factory’s vehicle production areas, components warehouse, restaurants, data centre, offices, perimeter fence line, and exit & entry points. The system also uses Hikvision DS3E1318P-E Web-managed PoE Switches, DS-6916UDI HD Decoders and DS96128NI-I24 128-channel Super 4K NVRs with up to 12-megapixel resolution recording, multi-format video encoding and HDD hot swappable storage. At the factory’s Control Centre, the system’s camera images are displayed on multiple Hikvision DSD2055NL-B LCD HD ultra-slim 55” display monitors.
E-Map control SGMW operatives view the entire site on a 3D electronic E-Map render, with intuitive Smart control provided by Hikvision’s iVMS-5200 Enterprise Software. Operators can easily locate and select any camera, and control specific camera live or recorded video, along with video preview of triggered alarms, with their precise locations displayed on the e-map. Using the Hikvision HD cameras, operators can monitor every stage of vehicle production. In the event of an incident or anything unusual taking place, the operators
can select and review video information for analysis, to keep vehicle production safe and efficient.
Multiple applications Video data can be accessed for use by many factory departments, to support improved manufacturing and management efficiency, and health & safety. The factory’s vehicular traffic is managed by a separate Hikvision ANPR subsystem with automated Whitelist and Blacklist alarm management. “The Hikvision surveillance system supports SGMW’s site-wide management needs,” comments Bella Gerania, lead engineer at SGMW. “Using the cameras for multi-functional applications enriches the efficiency, security and implementation of best practice management across the whole factory, paying back its initial return on investment many times.” “The system’s end-to-end unified hardware and software delivers advanced situation awareness of the factory’s personnel, vehicle production line, paint shop, data centre, offices and finished vehicles storage,” explains Arijanto Hartanto, director at Autojaya. “Using Hikvision Smart camera VCA alarm functionality, the system provides the highest level of protection and safety for factory personnel, assets and site facilities,” he says.
securityfocusafrica.com
LAW & SECURITY
Public Protector and State Security Agency By Peter Bagshawe
The office of the Public Protector Busisiwe Mkhwebane has been involved in fallout and public commentary in respect of a number of high profile reports released by her office.
T
he last of these reports is the Estina Report on the Vrede Dairy and the irregular processes followed in regard to the funding of the dairy purchase, flow of funds subsequent to the establishment of the entity, and failure to empower local small businesses. The report has been referred to as a whitewash, and the parties identified as having acted irregularly are provincial employees with no reference to higher levels of authority in the provincial government. One of the major criticisms is the recommendation made that the then Free State Premier Ace Magashule should “initiate and institute disciplinary action against all implicated officials involved in the Vrede dairy project.” It is possible that Magashule was implicated in the matter and this gives rise to a possible conflict of interest in Magashule having a role in the disciplinary process. Based on this, and the perceived incomplete review of information available at the time of the review, the official opposition in Parliament has called for this report to be taken on review. The Public Protector’s office is a Chapter 9 Institution, established to investigate and protect the public against matters such as maladministration in connection with the affairs of government, improper conduct by a person performing a public function, improper acts with respect to public money, improper or unlawful enrichment of a person performing a public function, and an act or omission by a person performing a public function resulting in improper prejudice to another person. In this, the Public Protector is expected to act impartially, without fear or favour, and in the interests of the public. Parliamentary Committee reports are often of interest in respect of the oversight functions that they reveal and the level of interrogation of functions that the committees investigate. Recent court actions and committee sittings have an interesting interrelationship between the two institutions referred to in the article title and further link into an
securityfocusafrica.com
oversight function and discord within the intelligence community. The Justice Committee has expressed concern at the level of involvement of the State Security Agency (SSA) in the administration of the Public Protector’s office, with the Public Protector having confirmed that currently the office’s security manager is being trained by the SSA in the classification of information, the computerised case management system that Public Protector’s office is installing and its security is being reviewed and managed by the SSA (presumably via their electronic communications security company), and that the acting chief financial officer is on secondment from SSA. Given the nature of the office and duties of the Public Protector, the level of involvement of the SSA and its clandestine, information gathering and surveillance activities the multiple roles and interaction at the Public Protector’s office is certainly sufficient to raise concerns. The SSA is a department within the South African Government bearing overall responsibility for civilian intelligence operations and intelligence gathering. The agency primarily focuses on information regarding terrorism, sabotage, subversion, espionage and organised crime and has both internal and foreign operations as well as being responsible for the interception of communications used in gathering intelligence. The SSA is responsible for the preparation and presentation of reports to the Minister of State Security, the State President, National Intelligence Coordinating Committee and, as required, with government departments and the South African Police Service (SAPS). The SSA is also responsible for counterintelligence services. Oversight of the SSA, Defence Intelligence Division of the South African National Defence Force and Intelligence Division of the SAPS is, in terms of the Intelligence Services Act, via the office of the Inspector General of Intelligence.
The Inspector General has access to any intelligence, information and premises of the intelligence services that he is accountable for and is enabled to request from their heads or employees any intelligence, information, reports or explanations. One of the powers afforded the Inspector General of Intelligence is that no access to intelligence, information or premises of the intelligence services that the Inspector General is accountable for may be withheld from the Inspector General on any grounds. Given the nature of the operations of the intelligence community referred to above, the scope of their roles and nature of the information gathered the oversight role, and application of external review is essential. Contemporaneously with the Committee’s review of the Public Protector referred to above, Inspector General of Intelligence Setlhomamaru Dintwe brought a interdict hearing before the North Gauteng High Court in Pretoria, asking it to bar the then SSA Director General Arthur Fraser from interfering with Dintwe’s execution of his duties. This was based on the withdrawal by Fraser of Dintwe’s security clearance which was done on the basis that Dintwe had revealed information in violation of his duties, and more particularly, that Dintwe had, without authority, disclosed classified information to representatives of political parties in Parliament. Dintwe denied these allegations. The counter argument from the Inspector General of Intelligence was that Fraser’s action in attempting to revoke his security clearance interfered with his functions while the Inspector General was investigating a complaint lodged against SSA Director General Fraser. The complaint relates to the alleged running, by Fraser, of a parallel intelligence network known as the Principal-Agent Network and the irregular use of funds in respect of the PrincipalAgent Network. Fairly obviously, without a security clearance, Dintwe would not be entitled
SECURITY FOCUS AFRICA APRIL 2018
29
LAW & SECURITY
to access classified information and be unable to fulfil his function. Immediately prior to the commencement of the hearing in the North Gauteng High Court, Minister of State Security Dipuo Letsatsi-Duba advised that Dintwe’s security clearance had been restored and that, in consultation with President Cyril Ramaposa, Arthur Fraser had been transferred as Director General to the Department of Correctional Services. As a result of the transfer, Loyiso Jafta has been appointed as Acting Director General of the SSA. The move of portfolio has been met with disfavour from political parties but, given the
INDEX OF ADVERTISERS
information available to Fraser historically and the power that he will continue to wield within his circle of influence, the move is probably best regarded as tactical in the short term. Given the stance adopted with regard to corruption by the current Executive and the quantum of alleged funds irregularly used in the Principal-Agent Network, the investigation is highly likely to continue and gain a higher profile. The role of the SSA internally, and its interaction with the Defence Intelligence Division of the South African National Defence Force and Intelligence Division of the SAPS is essential for the stability and
security of South Africa. A further concern is the historic interaction between the office of the Public Protector and the SSA and here a distinct line should be drawn between the two with no direct interaction. The recent impasse and way forward for the SSA appears clouded, and that has serious implications for the security community going forward. Peter Bagshawe holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.
April 2018 PAGE
WEBSITE
Active Track
17
info@activetrack.co.za
www.activetrack.co.za
BTC Training (Africa)
13
errol@btctraining.co.za
www.btcafrica.co.za
Cash Connect Management Solutions
23
info@cashconnect.co.za
www.cashconnect.co.za
Hikvision Digital Technology
1
overseasbusiness@hikvision.com
www.hikvision.com
IDEMIA
5
andrina.diedericks@idemia.com
www.idemia.com
KAV
15
info@kitdirect.co.za
www.kitafrivest.co.za
Magtouch
20
info@magtouch.co.za
www.magtouch.co.za
Paxton Access
OBC
support@paxtonaccess.co.za
www.paxtonaccess.co.za
Pyronix
21
michelav@pyronix.com
www.pyronix.com
Radio Data Communications
OFC, 6,7 gert.v@radiodata.co.za
www.radiodata.co.za
SASA
IBC
admin@sasecurity.co.za
www.sasecurity.co.za
Security Dogs and Dog Handler Training Centre
8
secdogs@mweb.co.za
www.secdogs.com
Sensor Security Systems
19
info@sensorsecurity.co.za
www.sensorsecurity.co.za
Sentinel Guard Monitoring
12
sales@guardreports.co.za
www.guardreports.co.za
Sparks & Ellis
11
info@sparks.co.za
www.sparks.co.za
Specialised Exhibitions – Securex 2018
IFC
leighm@specialised.com
www.securex.co.za
Suprema
24-25
enquiry@suprema.co.za
www.suprema.co.za
SUBSCRIBE HERE
ADVERTISER
Contact Publications (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764 6977 Fax: 086 762 1867 Email: jackie@contactpub.co.za Yes, please, I would like to subscribe to Security Focus Africa at R650 per year (RSA only). The subscription includes an annual Buyer’s Guide. Enclosed please find cheque to the amount of R Please start my subscription from the Do you require a tax invoice
Yes
issue.
No
(If yes, one will be sent to you on receipt of your payment.)
BANKING DETAILS: First National Bank Branch: Kloof Branch Code: 221526 Account No: 50730106925 Name: Contact Publications (Pty) Ltd
NB: Please make cheques payable to Contact Publications (Pty) Ltd Name ................................................................................................ Signature ............................................................................................... Date ...................................................... Company .................................................. Position ........................................................................ Address ........................................................................................................................................................................ Code ............................. Tel .......................................................... Fax .............................................................. Email .............................................................................
30
SECURITY FOCUS AFRICA APRIL 2018
securityfocusafrica.com
CALENDAR
Conferences, events & exhibitions of interest to the security industry LOCAL EVENTS: 2018 May 22-24: SECUREX SOUTH AFRICA 2018 Venue: Gallagher Convention Centre, Midrand, Johannesburg Tel: +27 (0)11 835 1565 www.securex.co.za May 22-24: A-OSH EXPO Venue: Gallagher Convention Centre, Midrand, Johannesburg | Tel: +27 (0)11 835 1565 | www.aosh.co.za September 16-19: 2018 CAMPROSA Conference | Venue: Spier Wine Farm, Stellenbosch | www.camprosa.co.za
INTERNATIONAL EVENTS: 2018 11-13 April: ISC West | Venue: Sands Expo & Convention Center, Las Vegas, NV, United States | www.reedexpo.com/en/ Events/6355/ISC-West 24-26 April: Expo Seguridad Mexico powered by ISC | Venue: Centro Citibanamex, Mexico City, Mexico | www.reedexpo.com/en/Events/6353/ExpoSeguridad-Mexico-powered-by-ISC
24-26 April: Intersec Saudi Arabia 2018 Venue: Jeddah, Saudi Arabia www.intersec-ksa.com 25-27 April: Secutech - SMAhome - Fire & Safety - Info Security | Venue: Taipei | secutech.tw.messefrankfurt.com 14-17 May: CNP Expo | Venue: Rosen Shingle Creek, Orlando, United States | www. reedexpo.com/en/Events/6479/CNP-Expo 17-18 May: Homeland Security Expo Venue: Pragati Maidan, New Delhi-India www.homesecexpo.com/India May 23 – 24: Infosecurity Mexico 2018 Venue: Centro Citibanamex, Mexico www.infosecuritymexico.com 30 May - 1 Jun 2018: IFSEC Philippines 2018 | Venue: Pasay City, Philippines | www.ifsec.events June 5-7: Infosecurity Europe | Venue: London, UK | www.infosecurityeurope.com/ 19-21 June: IFSEC 2018 | Venue: ExCeL London, United Kingdom | www.ifsec.events/international
July 25-27: Security Exhibition & Conference | Venue: Melbourne Convention & Exhibition Centre, Melbourne, Australia | www.securityexpo.com.au September 9 -12: 21st Information Security Conference | Venue: London, UK | http://isc2018.sccs.surrey.ac.uk 23-27 September 2018: Global Security Exchange (GSX) 2018 Venue: Las Vegas, United States of America (USA) | www.gsx.org 25-28 September 2018: Security Essen 2018 | Venue: Essen, Germany www.security-essen.de October 3-4: Infosecurity North America 2018 | Venue: Hynes Convention Centre, Boston, US www.infosecuritynorthamerica.com. November 6-8: Expoprotection Venue: Paris Expo Porte de Versailles, Paris, France www.reedexpo.com/en/Events/6502/ Expoprotection.
TEL: +27 11 452 1115 FAX: +27 11 452 3609 WEBSITE: www.plaslope.com EMAIL: glenda.aereboe@plaslope.com
TAMPER EVIDENT SECURITY BAGS • Debasafe® Tamper Evident Security Bags are used whenever tamper-evident movement is critical. • We manufacture to order and assist in tailor-made solutions to suit your security needs. • A comprehensive range of security features are standard on the bags and additional features can be added. • The sealing strip is used for exacting demands with a heat indicator displaying attempts to tamper. • Tampering by means of cold, heat, solvents, liquids & manipulation is clearly visible. • Bags can be customised according to customer’s requirements with exclusive numbering & bar-coding. • Bags are manufactured in either transparent or opaque LDPE film, in various grades to meet specific requirements.
The bags are used for the safe movement of: • Government Departments • Foreign Exchange • Confidential Documents (Examinations, Elections, Passports, Visas etc.) • High Value Items (Diamonds, Precious Metals, Forensic Evidence, Cellphones, Computer Equipment) • Cash (Banks & Cash-in-Transit companies)
securityfocusafrica.com
SECURITY FOCUS AFRICA APRIL 2018
31
DIRECTORY
SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) ADMINISTRATION 1st floor, Block A, 153 Ontdekkers Road (corner Crane Avenue), Horizon Park, Roodepoort
SASA OFFICE BEARERS
Suite 147 Postnet X2, Helderkruin, 1733
National chairman: Chris Laubscher c: +27 (0)82 441 4092 | e: laubscherc@proteacoin.co.za
National administrator: Tony Botes | t: 0861 100 680 e: tony@sasecurity.co.za | f: 0866 709 209 Office & accounts: JP Botes | t: 0861 100 680 c: +27 (0)83 650 4981 | e: admin@sasecurity.co.za
National president: Costa Diavastos c: +27 (0)82 498 4749 | e: costad@servest.co.za
National deputy chairman: Marchel Coetzee c: +27 (0)84 440 0087 e: marchel_coetzee@omegasol.com
REGIONAL OFFICE BEARERS Gauteng: Dolf Scheepers c: +27 (0)82 444 6844 e: dscheepers@thorburn.co.za KwaZulu-Natal: Gary Tintinger c: +27 (0)84 429 4245 | e: garyt@enforce.co.za Western Cape: Dave Waywell c: +27 (0)83 261 3059 e: dave.waywell@elvey.co.za
SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA (Private Security Industry Regulatory Authority) Eco Park, Centurion t: +27 (0)12 003 0500/1 | Independent hotline: 0800 220 918 | e: info@psira. co.za | Director: Manabela Chauke | Chairperson: T Bopela | Vice chairperson: Z Holtzman | Council members: Advocate A Wiid | Commissioner A Dramat APPISA (Association for Professional Private Investigators SA) Bertie Meyer Crescent, Minnebron, Brakpan | e: info@appelcryn.co.za | www.appelcryn. co.za | c: +27 (0)73 371 7854 / +27 (0)72 367 8207 | Chairperson: Ken Appelcryn ASIS International Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060 | t: +27 (0)11 652 2569 | www.asis155jhb.webs. com | President/chairperson: Johan Hurter | Secretary: Chris Cray ASIS International (Chapter 203: Cape Town – South African Security Professionals) President/ chairperson: Yann A Mouret, CPP Secretary: Eva Nolle t: +27 (0)21 785 7093 f: +27 (0)21 785 5089 | e: info@aepn.co.za | www.asis203.org.za BAC (Business Against Crime) Box 784061, Sandton 2146 | t: +27 (0)11 883 0717 | f: +27 (0)11 883 1679 | e: info@bac.org.za CAMPROSA (Campus Protection Society of Southern Africa) President: Derek Huebsch | e: derek. huebsch@nmu.ac.za | Vice president: Mokgawa Kobe | e: Mokgawa.kobe@wits.ac.za | Executive secretary: John Tunstall | t: +27 (0)28 313 1711 | e: jtunstall@ iafrica.com | www.camprosa.co.za CISA (Cape Insurance Surveyors Association) Shahid Sonday t: +27 (0)21 402 8196 | f: +27 (0)21 419 1844 | e: shahid.sonday@saeagle.co.za | Mike Genard t: +27 (0)21 557 8414 | e: mikeg@yebo.co.za DRA (Disaster Recovery Association of Southern Africa) Box 405, Saxonwold 2132 | Chairperson: Grahame Wright | t: +27 (0)11 486 0677 | f: (011) 646 5587 | Secretary/treasurer: Charles Lourens t: +27 (0)11 639 2346 | f: +27 (0)11 834 6881 EFCMA (Electric Fencing and Components Manufacturers Association) Box 411164, Craighall 2024 | t: +27 (0)11 326 4157 | f: +27 (0)11 493 6835 | Chairperson: Cliff Cawood c: +27 (0)83 744 2159 | Deputy chairperson: John Mostert c: +27 (0)82 444 9759 | Secretary: Andre Botha c: +27 (0)83 680 8574 ESDA (Electronic Security Distributors Association) Box 17103, Benoni West 1503 | t: (011) 845 4870 | f: +27 (0)11 845 4850 | Chairperson: Leonie Mangold | Vice chairperson: David Shapiro | www.esda.org.za ESIA (Electronic Security Industry Alliance) Box 62436, Marshalltown 2107 | t: +27 (0)11 498 7468 | f: 086 570 8837 | c: 082 773 9308 | e: info@esia. co.za | www.esia.co.za FDIA (Fire Detection Installers Association) Postnet Suite 86, Private Bag X10020, Edenvale, 1610 | t: +27 (0)72 580 7318 | f: 086 518 4376 | e: fdia@fdia. co.za | www.fdia.co.za | President/chairperson: Clive
Foord | Secretary: Jolene van der Westhuizen FFETA The Fire Fighting Equipment Traders Association) Postnet Suite 86, Private Bag X10020, Edenvale 1610 | Chairperson: Lizl Davel | Vice chairperson: Astrid Wright | Administration manager: Rosemary Cowan | t: +27 (0)11 455 3157 | e: ffeta@tiscali.co.za | www.ffeta.co.za FPASA (Fire Protection Association of Southern Africa) Box 15467, Impala Park 1472 | t: +27 (0)11 397 1618 | f: +27 (0)11 397 1160 | e: library@fpasa.co.za | www.fpasa.co.za | General manager: David Poxon GFA (Gate & Fence Association) Box 1338, Johannesburg 2000 | t: +27 (0)11 298 9400 | f: +27 (0)11 838 1522 | Administrator: Theresa Botha HSA (Helderberg Security Association) Box 12857, N1 City Parow 7463 | t: +27 (0)21 511 5109 | f: +27 (0)21 511 5277 | e: info@command.co.za | www.command.co.za | Chairperson: Stephen van Diggele IFE (Institution of Fire Engineers (SA) Treasurer: Andrew Greig | President: Mike Webber | Administrator: Jennifer Maritz | PO Box 1033, Houghton 2041 | t: +27 (0)11 788 4329 | f: +27 (0)11 880 6286 | e: adminstaff@ife.org.za | www.ife.org.za ISA (Insurance Surveyors Association) Box 405, Saxonwold 2132 | Chairperson: Graham Wright | t: +27 (0)11 486 0677 | Vice chairperson: Alan Ventress | Secretary: Alex dos Santos LASA (Locksmiths Association of South Africa) Box 4007, Randburg 2125 | t: +27 (0)11 782 1404 | f: +27 (0)11 782 3699 | e: lasa@global.co.za | www.lasa.co.za | President/chairperson: Alan Jurrius | Secretary: Dora Ryan NaFETI (National Firearms Education and Training Institute) Box 181067, Dalbridge 4014 | Chairperson: MS Mitten | Vice chairperson: Ken Rightford | t: +27 (0)33 345 1669 | c: +27 (0)84 659 1142 NaFTA (National Firearms Training Association of SA) Box 8723, Edenglen 1613 | National chairperson: Peter Bagshawe | t: +27 (0)11 979 1200 | f: +27 (0)11 979 1816 | e: nafta@lantic.net POLSA (Policing Association of Southern Africa) t: +27 (0)12 429 6003 | f: +27 (0)12 429 6609 | Chairperson: Anusha Govender c: +27 (0)82 655 8759 PSSPF (Private Security Sector Provident Fund) Jackson Simon c: +27 (0)72 356 6358 | e: jackson@ psspfund.co.za | www.psspfund.co.za SAESI (Southern African Emergency Services Institute) Box 613, Krugersdorp 1740 | t: +27 (0)11 660 5672 | f: +27 (0)11 660 1887 | President: DN Naidoo | Secretary: SG Moolman | e:info@saesi.com SAIA (South African Insurance Association) Box 30619, Braamfontein 2017 | Chief executive
officer: Viviene Pearson | Chairperson: Lizé Lambrechts t: +27 (0)11 726 5381 | f: +27 (0)11 726 5351 | e: info@saia.co.za SAIDSA (South African Intruder Detection Services Association) | Association House, PO Box 17103, Benoni West 1503 | t: +27 (0)11 845 4870 | f: +27 (0)11 845 4850 | e: saidsa@mweb.co.za | www. saidsa.co.za | Chairperson: Johan Booysen Secretary: Cheryl Ogle SAIS (South African Institute of Security) Postnet Suite 86, Private Bag X10020, Edenvale, 1610 Chairperson: Dave Dodge | Administration manager: John Baker | t: +27 (0)63 782 7642 | e: info@instituteofsecurity.co.za | www.instituteofsecurity.co.za SAN (Security Association of Namibia) Box 1926, Windhoek, Namibia | Administrator: André van Zyl | t: +264 81 304 5623 | e: adminsan@iway.na SANSEA (South African National Security Employers’ Association) Box 62436, Marshalltown 2107 | Administrators: SIA t: +27 (0)11 498 7468 | f: 086 570 8837 | e: galen@sansea.co.za SAPFED (Southern African Polygraph Federation) President: Flip Vorster | c: +27 (0)82 455 1459 | e: info@sapfed.org | Secretary: Anrich Gouws | e: admin@sapfed.org | www.sapfed.org SAQCC FIRE (South African Qualification Certification Committee) Postnet Suite 86, Private Bag X10020, Edenvale 1610 | Executive committee: Chairperson: Tom Dreyer | Vice chairperson: Duncan Boyes | 1475 Committee: chairperson: Lizl Davel | Vice chairperson: John Caird | D&GS committee: Chairperson: Laura Swart | Vice chairperson: Hans Davel | Administration manager: Rosemary Cowan | t: +27 (0)11 455 3157 | e: saqccfire@tiscali.co.za | www.saqccfire.co.za SARPA (South African Revenue Protection Association) Box 868, Ferndale 2160 | t: +27 (0)11 789 1384 | f: +27 (0)11 789 1385 | President: Naas du Preez | Secretariat: Mr J. Venter, Van der Walt & Co SIA (Security Industry Alliance) Box 62436, Marshalltown 2107 | t: +27 (0)11 498 7468 | Chief executive officer: Steve Conradie | www. securityalliance.co.za SKZNSA (Southern KwaZulu-Natal Security Association) t: +27 (0)39 315 7448 | f: +27 (0)39 315 7324 | Chairperson: Anton Verster c: +27 (0)82 371 0820 VESA (The Motor Vehicle Security Association of South Africa) Box 1468, Halfway House 1685 | t: (011) 315 3588/3655 | f: +27 (0)11 315 3617 | General manager: Adri Smit VIPPASA (VIP Protection Association of SA) Box 41669, Craighall 2024 | t: +27 (0)82 749 0063 | f: 086 625 1192 | e: info@vippasa.co.za | www.vippasa.co.za | Enquiries: Chris Rootman c: +27 (0)82 749 0063 | e: vippasa@protectour.co.za
* Every attempt has been made to keep this information up to date. If you would like to amend your organisation’s details, please email jackie @contactpub.co.za 32
SECURITY FOCUS AFRICA APRIL 2018
securityfocusafrica.com
DRIVING COMPLIANCE in South Africa’s Private Security Industry
With a five decade legacy, SASA is the greatest advocate of industry compliance, serving as resource for its members, an educational platform for consumers of security services, and an essential link between the private security industry and government. The Security Association of South Africa (SASA) is nationally recognised by the Government, South African Police Service and all Municipalities as having members with a proven track record within the industry and a Code of Ethics by which members must abide. SASA Gold Membership promotes compliance not only to the industry role-players, but to the end-users of security services as well. Join SASA today and find out more about how we can fight the scourge of non-compliance, promoting SASA Gold Membership as an essential requirement for all security service providers, ensuring industry excellence for the private security industry.
For more information, contact the SASA Administrator on admin@sasecurity.co.za Postal Address: Suite 147, Postnet X2 Helderkruin, 1733. Tel: 0861 100 680 Fax: 086 670 9209
www.sasecurity.co.za
paxton.info/3240
Net2 Entry Premium Monitor Latest Addition to Our Door Entry Range
Customisable Interface
Concierge Functionality
Call Administration
Premium Build Quality
Elegant. Intelligent. Secure.
Versatile Design