Security Focus Vol 33 No 01

Page 1




Contents page SERVING THE SOUTH AFRICAN SECURITY

Cover Story

INDUSTRY FOR 33 YEARS

Features 9

PSSPF OPINION Peter Mzwandile Zibi, Private Security Sector Provident Fund principal officer, gives a glimpse into the PSSPF.

12 SPECIAL FEATURE: SURVEILLANCE

Mark Nazarenus, president, iTech Digital, discusses four key trends in video surveillance for 2015; and Atul Rajput, regional director, Northern Europe, for Axis Communications, discusses game-changing technologies for video surveillance.

14 SPOTLIGHT ON IDENTITY MANAGEMENT SOLUTIONS

In this feature, Security Focus takes a look at the changing trends and technologies in the surveillance and identity management solutions industries.

10 TWO GIANTS IN THE SECURITY CASH INDUSTRY JOIN FORCES Fidelity Security Group has, effective

31 January 2015, acquired Protea Coin’s cash-in-transit, cash processing and cameo devices business.

12

6

Security Focus

Advertising enquiries:

is published by the proprietor Security Publications S.A. (Pty) Ltd (Reg No. 1982/006233/07)

Tel: (031) 764-6977 Fax: (031) 764-6974 e-mail: contact@secpub.co.za Publisher: Godfrey King Editor: Andrea Müller Production Leader: Colleen McCann Official Journal of the Security Association of South Africa

Layout & Design: Beth Marchand Subscriptions: Jackie Goosen

Bernadette Fenton

Cell: 082 443 8931. Fax: (031) 764-6974 e-mail: bernadette@secpub.co.za


VOL 33 NO 1 2015

ISSN 1022 6427

14

24 30 Exhibition News

Regulars

• Increasing visitor value at Securex 2015. • Secutech Thailand 2014 closes with success. • Smart home security solutions on show at SMAhome Expo.

4 Comment

Can’t sleep at night?

32 International News

6 News

• Milestone highlights power of partnering. • Guard booth takes on Austin shooter and wins. • Fighting skimming, relay attacks and eavesdropping. • Farpointe moves head office to new location. • Sido Muncul installs VIVOTEK camera system.

• South Africa’s top 10 risks for 2015. • Structural changes in Africa reaching crisis point.

24 Company News • Elvey continues to bring convenience and innovation to customers. • Global crisis management guru issues warning. • How secure is your home? • Tracker SA relies on Johnson Controls GWS. • Ideco appoints new EVIM partner. • Hout Bay goes hi-tech.

36 Law & Security

Paris, unity and threats.

37 Association News • SASA condemns employee violence. • Cosatu condemns non-compliant companies.

38 39 40

Index of Advertisers Calendar Directory

26 Head Office physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610 Postal address: P.O. Box 414, Kloof 3640, South Africa Publication details: Security Focus is published monthly Printed by: Paarl Media KZN, 52 Mahogany Road, Westmead. www.paarlmedia.co.za

www.twitter.com/SecurityFocusza

Subscription rates: Annual subscription for magazine posted in Republic of South Africa is R525 including VAT and postage. Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640. Editorial contributions: Editorial contributions are welcome. For details please contact the Editor, Security Focus, on Tel: (031) 764-6977, or Fax: (031) 764-6974, or write to the editorial office address detailed elsewhere in this column.

32

Security Focus is a member of


editors comment

Can’t sleep at night?

A

n overactive imagination, coupled with whatever scary film had just been on the television often made the patterns on my bedroom curtains resemble monstrous faces at the age of four and five. As I grew older, other things would keep me awake. The prospect of a maths exam the next morning, a broken heart caused by some boy that I was too naïve to know wasn’t worth it and so on. Today, there are other concerns. A tax return left to the last minute, a deadline I know I cannot hope to meet on time – and crime. There are many things that keep us awake at night. For you, it may be your child’s performance at school. For another, it might be the prospect of having to tell 20 employees in the morning that retrenchments are inevitable. The things that keep us awake are us awake are all associated with what if? It’s all about risk. Integrated risk management has become a highly respected discipline in today’s business

environment. The company leaders who have recognised that you can no longer separate safety, security, health and risk matters, are finding that their organisations are staying ahead of the challenges. Those chief executive officers who are inviting their risk managers into the board meetings are more than likely the ones that will weather the storms to come in 2015. Globally, it’s been pointed out that some of the greatest risks facing the global economy include the rise of cyber-crime, terrorism and the rise of Islamic fundamentalists, which experts are now saying could give rise to a third world war. Other issues of global concern include social upheaval, organised crime and, of course, an escalating population, and climate change. I recently asked a couple of colleagues and friends to comment on what they thought were the biggest risks for South Africa at the moment and, upon closer inspection, the experts seem to agree. So, in no particular order, here are the things that keep South Africans awake at night. Power and water. Following Eskom’s decision to come clean about the state of things concerning South Africa’s energy crisis, we now know that it’s not a matter of if, but when. An organisation’s ability to adapt to the unpredictable energy supply will separate those that grow from the ones that buckle under the pressure. However, according to the Institute of Security Studies, South Africa is being pushed towards a water crisis that will, within a decade, rival the electricity catastrophe. Unsurprisingly, this is due to ageing infrastructure and a backlog of water delivery to communities. In a report called “Parched Prospects: The emerging water crisis in South Africa” which was released last year, the ISS says that SouthAfricans use 235 litres of water each a day compared to the international average of 173 litres. The report said high use, coupled with waste, poor planning, abuse, and looming climate change, was creating the predicament. For whom the bell tolls. More than one million Gauteng motorists are refusing to pay e-tolls, which means that most of the current revenue is coming from companies that have fleets of vehicles. The DA has now called for an E-Toll

Referendum to test the views of local residents on e-tolls. And I’m sure we can all guess what the outcome will be. The question remains though, who and how will the country fit the bill for the upgraded freeways. Crippling Corruption. With R215-million in public money having been used to upgrade President Jacob Zuma’s private homestead, it’s little wonder South Africans feel corruption is on the rise. Last year, the PricewaterhouseCoopers Global Economic Crime Survey exposed the shocking prevalence of economic crime, stating that companies here at home are hit by more fraud, bribery and corruption than their global counterparts. Poor Parastatals. From a non-existent postal service in 2014, to a public broadcaster falling apart at the seams, as well as an air carrier on the brink of bankruptcy. One point that always seems to be overlooked is that these “state-owned” enterprises actually belong to the people. The problem is that those custodians that have been tasked with running OUR companies are not doing their jobs. Perhaps one day, but probably not in the foreseeable future, we will have a say in those appointed to run them. Violence and crime. Last, but by far the most concerning, is our disturbingly high rate of crime. While our murder, rape, assault and robbery statistics are horrifying, we face a far more sinister problem. And that’s the fact that the average South African shows complete and utter disregard for the law. It’s down to the little things. Have you ever driven down the emergency lane on the congested highway because everyone else is doing it? Do you buckle up every time you get behind the wheel of the car? Have you ever driven home after a couple too many? Have you ever raced through a red light? And, are all your traffic fines paid for? I think you know where I’m going with this. Many South Africans have developed poor attitude towards the laws of our country. And it’s certainly difficult when those tasked with upholding the law show little to no regard. Andrea Müller Editor andrea@writescene.co.za

Editorial Policy Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services. It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.

4

Security Focus | Vol 33 No 1 2015


anytime anywhere

NOT ONLY A GUARD MONITORING SYSTEM • The Active Track device is efficient in tracking personnel via GPS. • It is a reliable tool for monitoring a sales team, fleet of vehicles or drivers on the road. • Generates a GPS position to identify clients and track sales personnel via Google Maps. • Door to door movements can be viewed and monitored via Google Maps. • The system has the capability to record the duration of time a sales person is at a client and your driver is on the road. • An alarm can be generated for ‘New Client’, ‘Training’, ‘Routine Visit’ etc, via RFID tags. • Please Call Me button for easy communication access to sales person or driver. • Panic button if sales person or driver is in distress. Tel: 011 100 5259 Fax: 086 218 2928 Twitter: @ActiveTrackRSA www.activetrack.co.za Terms and Conditions Apply


NEWS

South Africa’s top 10 risks for 2015 The Institute of Risk Management South Africa (IRMSA) has launched the first edition of its South African Risk Report (IRMSA Risk Report: South Africa Risks 2015: First Edition). This report provides essential reading for and management teams and business leaders to be more pro-active in identifying risks impacting on the South African landscape.

A

On Line/Live Units Radio or GPRS up to 4 Patrols per unit

Historical Systems For Single / Multiple Site Application No wiring required on site For more information Please visit www.guardtrack.co.za or contact Dane/Brad Tel: 011-784 3803/4 Fax: 011-784 3805 email: info@guardtrack.co.za

fter surveying more than 620 respondents, an extensive period of interaction with IRMSA members and the public, as well as consultation with subject matter experts and various industry bodies, the IRMSA Risk Intelligence Committee has produced a report that highlights the most significant risks relevant to South Africa. “Every year we reflect on the World Economic Forum Global Risks report to prepare and inform the programme for our annual Risk Lab in order to address risks facing businesses in South Africa,” says Gillian le Cordeur, chief executive officer, Institute of Risk Management South Africa. “To complement and enhance this process, the committee saw the need for a similar but more specific report focused on South Africa,” she added. “Our report sets out to present the reader with the most significant risks identified by the South African risk fraternity and, by default,

the most significant country-specific risks that need to be considered by South African organisations,” says Christopher Palm, chairman, IRMSA Risk Intelligence Committee. “We have supplemented each risk we have identified with views from participating subject matter experts who truly ‘South Africanise’ the risk with their thought leadership, give relevant detail, further clarify the risks and make them more relevant to your own business leadership space.” According to Mr Palm, the report represents an evaluation of the country’s top risks over a two-year time horizon through several workshops at IRMSA conferences and a survey of 620 of the country’s foremost risk management experts. The risk management fraternity respondents represent every major industry within the public and private sectors. What makes this exercise different is that the respondents who assessed the risks covered in this report are Continued on page 8

6

Security Focus | Vol 33 No 1 2015


NEWS

Structural changes in Africa reaching crisis point Africa is facing the formidable challenge of managing and stopping violent conflict. The latest report from Think Security Africa (http://www.thinksecurityafrica.org) is the organisation’s fifth annual review on security in Africa. Security in Africa 2014 is a detailed assessment of the overall health of Africa’s security situation. It assesses changes in Africa’s security situation between 2013 and 2014 in three main categories: (1) Challenges impacting the national chain of command, (2) Maintaining territorial integrity, and (3) Societal management. The overall findings are bleak, and indicate the existence of a structural security crisis. If left unattended, it could change the map of Africa as we know it. The key findings of the report show that African countries are increasingly struggling to maintain territorial integrity. In 2014, 10 African governments were competing with

non-state groups for territorial control, which represents more than a 50 per cent increase from last year. What has made the problem worse in 2014 is that non-state groups are no longer making demands, they are just going ahead and establishing fiefdoms, indicative of a decline of governmental capacity vis-à-vis non-state actors. There was also a substantial rise in the number of countries impacted by border and maritime security challenges, indicative of a growing structural problem that is regional in scope Although the report noted a decrease in the number of countries experiencing challenges in relation to managing national chains of command and society, the sharp decline in the overall ability of African governments to maintain territorial integrity offset improvements in those areas. The result was a sharp rise in the number of

countries impacted by conflict. Between 2013 and 2014, the number of African governments impacted by serious conflict rose from seven to 10. “The key to improving security in Africa, and improving the ability of governments to maintain territorial integrity, is to ensure that improvements in the number of countries impacted by serious chain of commandrelated challenges are sustained in 2015. However, with elections in several fragile states due to occur this year, this is going to be difficult,” says Adunola Abiola, founder of Think Security Africa. According to Ms Abiola the security situation in Libya is among the most serious, but against the backdrop of broader international security concerns, the situations in Egypt, Nigeria, Sudan, Cameroon and Mali are also of serious concern. Continued on page 8

Security Focus | Vol 33 No 1 2015

7


NEWS

Continued from page 6 responsible for proactively managing these risks in their own organisations on a daily basis. A greater understanding of the risks in this regard should lead to a more accurate evaluation of the risks in the South African environment. The report is created within the context of the latest World Economic Forum’s (WEF) Global Risks report, which examined 31 global risks in five categories, namely economic, environmental, geo-political, societal and technological risks. The Top 10 South African risks by likelihood: 1. Corruption (increasing corruption). 2. Unemployment (structurally high unemployment).

3. Infrastructure (failure/shortfall of critical infrastructure). 4. Political and social instability (profound political and social instability). 5. Organised crime (major escalation in organised crime and illicit trade). 6. Cyber attacks (escalation in large-scale cyber attacks). 7. Financial mechanism Failure of a major financial mechanism or institution. 8. Income disparity (severe income disparity). 9. Urbanisation (mismanaged urbanisation). 10. Data fraud (massive incident of data fraud/ theft). Top Ten South African risks by consequence 1. Corruption (increasing corruption).

2. 3.

Governance failure. Unemployment (structurally high unemployment). 4. Infrastructure (failure/shortfall of critical infrastructure). 5. Critical infrastructure (shortfall of critical infrastructure). 6. Fiscal crisis (fiscal crisis in key economics). 7. Financial mechanism (failure of a major financial mechanism or institution). 8. Economic and resource nationalisation (escalation of economic and resource nationalisation). 9. Cyber (escalation in large scale cyber attacks). 10. Income disparity (severe income disparity). The annual IRMSA Conference, which took place in September 2014, was used as a platform to identify the risks that are specifically relevant to South Africa despite not being explicitly surveyed. Seven additional risks were raised – in no particular order – spanning across the societal, technological and economic risk categories. These included increasing strike action, Ebola virus outbreak, skills shortage, insufficient electricity supply, lack of innovation, banking reputational risk, and economic slowdown. “The South Africa Risks Report 2015, First Edition, demonstrates that the country is not isolated from the increasingly interdependent and rapidly evolving global risks landscape,” says Mr Palm. “These events indicate that South Africa is in no position to deal with further unforeseen shocks in the near term considering that its resilience and ability to cope with new challenges is being increasingly compromised.” n

Structural changes in Africa reaching crisis point Continued from page 7 “There has been a major escalation in terrorist activity in Africa, to the extent that it no longer poses a law and order problem, but has escalated to the point that people wielding terrorist tactics are increasingly becoming capable of taking on national armies,” she says. “One of the main issues facilitating this problem is the persistence of stubborn conflicts that enhance the availability of weapons in new zones of instability, and also provide safe havens from which extremist

8

groups can operate. “In addition to this, the generally poor state of border management in Africa, is creating core vulnerabilities that can easily be exploited to facilitate anti-state activities.” The report also states that the need to strengthen and enhance the independence of African justice systems fundamentally, lies at the root of Africa’s rapidly escalating societal management problems. Ms Abiola goes on to say that there is also a very important human element to the

Security Focus | Vol 33 No 1 2015

security challenges that Africa is facing. “While states are facing a threat to their existence, people’s lives have been lost, others have had their livelihoods destroyed, and statistics simply do not reveal the full horror of the situation,” she says. “Many of Africa’s most deadly conflicts are occurring in some of the poorest and most remote parts of the world, and it is often the people that have the least, that are having everything taken away from them,” she concluded. n


PSSPFopinion

A glimpse into the PSSPF By Peter Mzwandile Zibi, Private Security Sector Provident Fund principal officer

I

t has been 12 years since 2002 that the Private Security Sector Provident Fund (PSSPF) was enacted through the revision of the Sectoral Determination 6. In the security sector, consultation and negotiation was vital to the establishment of a successful provident fund. It was important that employees, through their representatives, were involved in the design and conditions of the employee benefit programme which led to direct member representation on the board of trustees – a feature that was legislated in 1996 as a compulsory requirement for all registered retirement funds in South Africa. The coming into effect of PSSPF automatically improved the lives of security officers that belonged to the Fund including

their families by providing better retirement, disability, death and funeral benefits. Since the provision of such benefits, it is estimated that more than two million families have directly and indirectly benefited by virtue of their loved ones being part of this fund. However, one of the major challenges that the PSSPF is facing is that it operates in a dynamic industry that does not have a set number of operating employers. The Fund may currently be in the process of weeding out the non-compliant employers whilst new companies are being registered with PSIRA on a monthly basis. The fund currently receives contributions from some 800 employers equating to R1 billion annually. This is in spite of another 250 000 security officer’s contributions not being received by the fund through fraud perpetrated by some employers. The loss to members translates to R1.5 billion on contributions held

back. The effect of non-compliance is also evident on settlement of death claims in cases where a member passes on and it turns out that the employer did not contribute, and the claim is then repudiated. In cases of withdrawals, there are instances where a member has been part of the Fund for more than five years, but the Fund only received contributions for one year, then a member’s claim is also repudiated. On disability cases, the honours’ is on the employer to notify the Fund but in some cases this does not happen. This fund was established as a solution towards the introduction of proper basic benefits for security workers who are for most on the frontline of the battle against crime. What an irony that the lack of justice meted by some employers, who prefer to pocket contributions meant for their workers, perpetrate crimes that contradict the pledge they make to their customers. This very act negates the principles of justice upon which the agreement between workers and employers who make up the bargaining structure agreed on. For many South Africans white collar crime is something that is hidden away – out of view, out of sight, and beyond their reckoning. The purpose of Trustees and other designated personnel from a fund perspective in writing these articles is to perhaps begin a new era of enlightenment for the private security employer, average security officer, his family and those related to him. It is in the involvement of the larger community that we all can make a stand and fight against injustice at all levels. The wanton disempowerment that is currently happening has to be stopped. But this can only happen through greater involvement of the benefactors. The year 2015, we will be accelerating the pace of activism in relation to dealing with non-compliance. It is encouraging though, that the industry has come together to implement collaborative efforts to enforce compliance through structures represented by various stakeholders such as PSIRA, Department of Labour, SAPS, NPA, Organised Labour, UIF and the FSB. This will, at least, assist the industry in its quest of achieving industry wide compliance and the fund may double its current membership to include other sub-sectors in the industry. n

Peter Mzwandile Zibi.

Security Focus | Vol 33 No 1 2015

9


Cover story

10

Security Focus | Vol 33 No 1 2015


Cover story

Security Focus | Vol 33 No 1 2015

11


SpecialFeature:Surveillance

Four key trends in video surveillance for 2015 has improved significantly and the price has decreased, making them more affordable and favourable in more situations. 360° cameras allow you to survey a larger field of view, as well as focus on multiple specific areas, with a single camera. You can put one 360° camera in the middle of your store and record everything within the full range of view. And, with dewarping software built into the server, you can choose to focus on specific areas of interest. As the technology continues to evolve with deeper integration by the NVR companies, we will see more 360° video surveillance cameras in more applications. By Mark Nazarenus, president at iTech Digital

V

ideo surveillance technology is evolving faster than ever before, and it’s difficult to know what to buy and when. It seems there’s always something new around the corner. However, there are a few key trends in video surveillance technology you can rely on to guide your purchase decisions and prepare your surveillance systems for the upcoming year and beyond. As we look toward 2015, here are four key trends in video surveillance. 1. As IP cameras become less expensive, more people will incorporate them into varied applications Traditionally, HD megapixel cameras have been expensive, making it difficult for some businesses to make the jump to HD surveillance. But, as the technology has improved, the cost of HD cameras has come down substantially, making HD cameras affordable to more businesses. We expect that prices will continue falling throughout 2015.

This means that HD cameras will be more common, and used in a wider variety of applications and situations. 2. All HD cameras are not equal, we are seeing poor image quality with minimal features While the cost of HD cameras will continue to decrease, we’ll also see more low-quality HD cameras entering the market that don’t have the feature set of previous models. One key thing that is important to look for to ensure you’re getting a superior camera is the length of the warranty. Most low-quality cameras include one or two year warranties, while the higher-quality cameras from brands such as IQinVision, Sony and Axis, include 5-year warranties. Considering the lifecycle of a system is usually five years, the 5-year warranty will often cover the entire lifespan of the system. 3. 360° technology is an interesting option for C Stores and QSR When 360° video surveillance cameras entered the market, the concept was intriguing, but the price point and lack of integration slowed markets adoption. However, the technology

4. Business intelligence will provide business owners with a better ROI on their traditional video surveillance solution Besides the improvements in cameras and network video recorders (NVRs), the biggest trend in 2014 was the integration of business intelligence software to the video surveillance system. By utilising your system to capture marketing and point of sale data, you’ll be able to realise far more value from your video surveillance. While increasing security and loss prevention, data captured by the cameras will also give you information you can use to improve other aspects of your business. Recently, I talked with the owner of a quick service restaurant who shared that he could increase profits by about $50 000 per year simply by improving his drive-thru throughput during lunch by 15 seconds per car. Cameras can track total throughput along with individual transaction times while recording best practices. This can then be put into a report that provides detailed and measurable data along with a visual overview of the best practices or specific opportunities for improvement. n

Game-changing technologies for video surveillance By Atul Rajput, regional director, Northern Europe, Axis Communications With the Internet of Things (IoT) a hot topic throughout 2014, consumers and businesses are increasingly aware of the advantages of IP connectivity. And security professionals and business owners are keenly aware of the concept’s importance in ensuring the safety of their clients

12

and organisations respectively. The new HD standard 4K or “Ultra HD” have been two of the year’s most talked-about technologies and the next natural step in the industry’s ongoing endeavours to enhance image quality and greater surveillance coverage. It is expected to make a big impact in 2015 and beyond. Image quality is a core consideration, and the real challenge is optimising image quality for the task at hand, regardless of how bad or ambient

Security Focus | Vol 33 No 1 2015

conditions are. Technology that enhances image quality for advanced video applications will be a key innovation here, and an industry driver. However, advancements in image quality have generated bigger pressure on managing the resources that support them. For example, they can impose a significant burden on network bandwidth and storage requirements, necessitating more effective compression methods.


SpecialFeature:Surveillance

Video surveillance-as-a-service (VSaaS) and cloud computing This is where video surveillance-as-a-service (VSaaS) becomes invaluable for managing and archiving surveillance video footage via cloud storage. Video surveillance systems can be a powerful tool in preventing or investigating crime when installed in locations such as shopping centres, parks, banks, airports, and other public transport locations. Rapidly growing demand for video surveillance systems has been driven by growing safety and security concerns worldwide. According to Transparency Market Research, the video surveillance and VSaaS market is expected to reach a value of $42,81bn by 2019, growing at a CAGR of 19,1 per cent from 2013 to 2019. By system, the IP-based video surveillance market is expected to grow at a CAGR of 24,2 per cent during the forecast period from 2013 to 2019. Valued at $9.49bn in 2012 the hardware market is expected to grow at a CAGR of 17,3 per cent during the forecast period from 2013 to 2019. It comprises analogue and IP-based video surveillance cameras, recorders and storage, encoders, and monitors. The recorders and storage segment held the largest share of 37 per cent in 2012 of the total hardware market followed by surveillance cameras with a 32 per cent share, but is expected to lose share in the coming years due to a growing preference for cloud-based storage (VSaaS). Also, the share of surveillance cameras is expected to increase to around 46 per cent by 2019 owing to the growing popularity of IPbased video surveillance cameras that offer better video quality and in-built recorders. Cloud computing may well have been a buzzword in IT circles for several years, but a new era is very much upon us. Whether in a public environment, where tenancy on servers is shared with other customers, or in a private environment, where your data and applications are stored in isolation, cloud computing brings three advantages to your network: redundancy, scalability and shifting costs from capital expenditure (CAPEX) to operating expenditure (OPEX). Depending on whether the cloud is hosted or run internally, there may also be the convenience of leaving routine maintenance like upgrades, updates and patches to a third party. Cloud storage will grow inexorably throughout 2015. A recent survey conducted by the Centre for Retail Research (CRR) in conjunction with Axis Communications questioned nearly 300 UK retailers, encompassing more than 20 000 stores, about how they would like to access instore surveillance footage and whether access from a mobile device would help. A majority of UK retailers (82 per cent) wanted to view in-store video remotely – a rise of 6,5 per

cent from 2013. This demand for making realtime decisions based on footage was reinforced by the 68 per cent of retailers wishing to use a mobile device (eg smartphone or tablet) to access in-store video. Scalability doesn’t just factor in the need for more cameras. It also enables access to more computing power and storage if, for example, a higher resolution or faster frame rate is needed. And, if analytics are needed for customer traffic pattern analysis, the processing capacity is already there and only paid for when required. Better functioning analytics running on the edge are also appropriate for critical infrastructure applications. For instance, the extra computing power could be used to store half a million car number plates and capture registrations from cars driving past at up to 24 miles per hour. Another interesting aspect of VSaaS is the scope it offers for adding further services to their video surveillance, such as guard force or remote monitoring services. Analytics, business intelligence (BI) and big data Harnessing enormous amounts of structured and unstructured data (big data), analytics technology is also likely to finally take off next year. With network cameras’ capability to provide higher resolution video and be connected from everywhere, around the clock, security departments are receiving more information from a wider array of sources. Therefore, more analytics are needed to help organisations make sense of the tremendous amount of information, such as images and videos. Increasingly, intelligent applications are needed to help categorise and interpret the wealth of information, so it can be turned into something useful. The “three Vs” of big data – volume, velocity, and variety – can provide vital information during a crisis by providing the right data at the right time. By starting with more factual data, such as surveillance footage, physical access control data, and cyber activity information and then building useful associations, costs can be reduced by only searching for the most relevant information. This is where IP video transforms the surveillance camera from a forensic tool aimed at solving problems to a proactive tool designed to improve business processes. According to the CRR retail survey, integration with BI applications was the single most important reason for UK retailers to migrate to IP video, with 27 per cent citing it as their main driver. Nearly half of the UK retailers polled also said that people counting (49,2 per cent) and queue management (49,9 per cent) were the two most important non-security network IP applications that most interested them. Video images can be used in conjunction with analytical “horsepower” to analyse retail customer traffic patterns and shopping behaviour,

as well as gather data to isolate bottlenecks instore. Mix that up with other structured and unstructured data sources, including transit schedules, lists of promotions, competitor pricing data, social media etc, and a skilled data analyst can tease out patterns and relationships that retailers never knew existed – data that could give a significant competitive advantage. Video compression and bandwidth usage Video compression technologies are aimed at reducing and removing redundant video data so that a digital video file can be effectively sent over a network and stored on portable media. With efficient compression, a significant reduction in file size can be achieved with little or no adverse effect on the visual quality. The video quality, however, can be affected if the file size is reduced further by increasing the compression level for a given compression technique. There are several video compression standards, including Motion JPEG, MPEG-4 Part 2 (simply referred to as MPEG-4) and H.264 – the latter being the latest and most efficient video compression standard and already the standard for video surveillance and other industries, such as entertainment. At the same time, the continual improvement in image resolution and light sensitivity for example, also increase the data output from the cameras – imposing higher demands on the efficiency of the video compression. Video surveillance manufacturers need to balance the upsurge in resolution with improvements to H.264 compression algorithms to make sure network bandwidth and storage costs do not spiral out of control. A combined effort of working on noise reduction methods and bit rate reduction should run parallel with investigation into new video codecs to get the best results. Beyond improvements in current H.264 compression, the future will embrace H.265 technology, which is rapidly gaining interest in the broadcast industry. H.265 can reduce bandwidth and storage demands by up to 50 per cent under the right circumstances, so expect the technology to be introduced into the security industry over the next few years. It’s likely to be initially deployed in high-end, high-resolution cameras, and it’s expected that H.264 and H.265 will co-exist for a while within the industry. Ultimately, high quality images and videos such as 4K resolution needs to be supported by the right technologies in order for organisations to get the most out of their data, which can be analysed and turned into useful insight not only for security purposes, but also for efficiency to gain a competitive advantage. I believe this really should be the key consideration for everyone who is looking for the next ‘big thing’ in surveillance. n

Security Focus | Vol 33 No 1 2015

13


SpotlightonIdentitymanagementsolutions

ANPR technology: a real option? Many cities globally continue to become more congested, driving increased investment into offstreet parking facilities. In recent years, automated number plate recognition (ANPR) cameras and software have started to be used as part of the overall solution which also includes barriers, payment machines, and loop detectors. Justin Siller, research manager for security and building technologies at IHS Inc., discusses the trend toward free-flowing parking structures using ANPR technology.

T

he main use of ANPR equipment is to alleviate issues related to ticket payments, where a licence plate can be looked up in the system to verify entry times, or for security purposes. However, what if ANPR equipment was the sole solution to automate parking structures? This trend is starting to occur. Parking barriers and loop detectors are widespread and have been used for many years, but eliminating the use of these products in favour of barrier-free parking is slowly starting to gain traction. Free-flow parking can use ANPR technology to scan plates of cars as they enter and exit a facility, offering real benefits to parking lot operators and customers. One benefit of barrier-free parking is it can eliminate bottlenecks at entrances and exits. These hold-ups are a real frustration for customers, where lines can back-up and create significant wait times to enter and exit. For entry, cars would now no longer

14

have to stop to collect a ticket upon arrival and could drive straight into a facility to park. When exiting, payments would already have been made, allowing cars to leave immediately without having to stop to make payment. This would get rid of the need to have barriers, booth attendants or payment stations at the entrance and exit points. Another benefit is it can be extremely expensive to build entry/exit lanes. With faster throughputs, fewer lanes would be required because cars would be able to easily move in and out of the structure. The additional space could be used for more parking spots, creating the possibility of lower costs and higher returns for parking lot owners. Finally, barrier-free parking is convenient for customers. Parking structures need a way to distinguish themselves from one another to win new customers and to retain existing ones. Reducing or eliminating wait times makes

Security Focus | Vol 33 No 1 2015

for better customer service and can keep users happier. Operators can also create convenience for everyday clients with parking payment subscriptions that keep a credit card on file to be charged each time the licence plate is scanned. These customers would then never have to worry about payment when parking. Today, the main barriers to widespread acceptance free-flow parking are ANPR equipment prices and the possibility of lost payments. Parking facilities that use ANPR cameras today typically install lowcost solutions because parking barriers are present. Cars are required to come to a complete stop in the entrance and exit lanes, which makes a low-end product sufficient enough to scan, read and produce an image of the licence plate. If the barriers are removed, cars would be in motion when driving through the lanes, which requires a better and more expensive product. Avoiding payments is also an issue where


SpotlightonIdentitymanagementsolutions

Logical access is key to privacy management Information about individuals has become readily available due to multiple transactions and the various online accounts people have. With the advances in technology comes greater access to the once unattainable confidential information we would never let out of our sight. As a result, our security and personal details aren’t as secure as they once were. In companies around the world, we access internal systems and offices via smartcards, passwords, PIN numbers and the old-fashioned lock and key. These security mechanisms have been sufficient to some degree in securing our details, personal information and valuable goods, though with clever hackers and fraudulent activity, these measures have proven easy to manipulate. The missing link in achieving total security is a biometric measure such as those designed and developed by Muvoni Biometrics and Smartcard Solutions (MBSS). Biometric technology relates to the identification of a person using unique biological information. Biometrics analyses and utilises fingerprints, voice patterns and waves, eye retinas and irises, facial patterns and even hand measurements to authenticate an individual. On a daily basis, we each have so many passwords to remember to access our money, various accounts and even to log in to our computers. With greater amounts of information to remember, people find themselves storing their log-on or PIN details somewhere in hard copy format, or even using the same PIN or same password across all locked accounts in an effort to recall them quickly. This is not safe and makes it incredibly easy for criminals to gain access to. With biometric access, it means the user is the only person who can access said accounts,

areas and their profiles as it requires unique biometric data from that particular user. Logical access solutions can be described as the securing of accesses to information and software applications to authorised users only. Logical access solutions protect information assets against unauthorised access and provide an audit trail of who access what, when and where so that an indisputable chain of evidence can be traced – so called “non-repudiation”. MBSS is a leader in Africa in the design and integration of solutions for identification and security. Specialising and promoting the use of biometrics as the complete solution for companies’ security needs, they offer personal identity verification authority services which provide solutions for the smallest to largest companies. They understand how important it is to keep information secure and confidential. There can be no denying the fact that fraud, bribery and corruption has a significant impact on a company’s reputation, culture, brand and financial performance. We take the extra step to ensuring a concrete multi-factor authentication mechanism whereby additional credentials are needed for user access, ensuring access remains unique for each individual.

Supersign is one such biometric product on offer from MBSS. With the SuperSign technology, users aren’t required to manually type their passwords, instead their log-on credentials are stored securely on a system vault or on a secure token. This log-on credentials including fingerprint biometric data, identifies the user and contains information and passwords specific to them only. The SuperSign software is compatible with smart cards, USB tokens, one-time PINs and biometric fingerprint readers, making it extremely versatile for most office environments. This biometric-based application sign-on provides a single means of secure user-authentication and allows for multiple applications from any web, desktop or transversal application. The automated password management function generates password changes to ensure strong passwords on behalf of all users and automatically maintains these. Combined with fingerprint readers, the SuperSign software provides a secure authentication mechanism. A further step in security and protection of details is voice-controlled activation. With bank transactions, the account holder currently receives an OTP (one time pin) to confirm a transaction or transfer. Though this is a good security measure, as it links your cellphone number to your bank account, it can’t guarantee security as anyone can access your phone. A third step in securing information is to have a biometric security component. MBSS is currently looking at a voice activation solution for bank transactions. MBSS offers programmes and products that seek to combat fraud by implement measures to plan for, prevent, detect and respond to the threat of fraud by addressing relevant business process, people’s behaviour and attitudes and the complexity of technology. MBSS provides solutions and services that cover a wide spectrum of what is required in an effective fraud management system. n

users could just leave without paying to park. The question is then: “How would operators collect the fee if this were to occur?” The simple answer is the fee would likely go uncollected and would become lost revenue. However, parking lot operators can store the licence plate of the offender so this never happens with the same car twice. This then makes lost payments an issue only with one-

time users. The key for ANPR equipment vendors is to educate end-users about the total cost of traditional parking systems. ANPR technologies eliminate the need to buy traditional equipment, making the free-flow parking option more affordable. Combine this with the benefits to customers, and the market could soon see change. While

the trend to barrier-free parking is unlikely to occur in the short-term, in its latest report, World Market for ANPR and Detection Sensors, IHS has stated it expects freeflow parking to gain momentum during the next five years. This will occur as end-users recognise the benefits, and manufacturers push the solution as an alternative to the traditional systems used today. n

Stan Khan, managing director, Muvoni Biometrics and Smartcard Solutions (MBSS).

Stan Khan

Security Focus | Vol 33 No 1 2015

15


SpotlightonIdentitymanagementsolutions

Partnership introduces CCTV Sentry smart monitoring system Hikvision is expanding the opportunities for comprehensive CCTV system checks through a unique partnership with EMCS, one of the UK’s largest independent monitoring stations. EMCS will use their CCTV Sentry software to proactively monitor every customers’ CCTV system, not just those that traditionally opt for a monitored solution, and send an e-mail if any problem is detected, and Hikvision has ensured that its entire range of DVR, NVR, Hybrid, and HD-SDI products are 100 per cent compatible. EMCS has worked closely with Hikvision to roll out this comprehensive system checking service to the 80 per cent of customers that have not, until now, had their CCTV systems monitored. Every Hikvision DVR is now compatible with CCTV Sentry and provides information on

camera and hard disk failures, recording issues and time accuracy problems. As well as e-mail alerts, CCTV Sentry customers can view a live status webpage on a smartphone, anywhere, anytime. “As a result of our partnership with EMCS, CCTV Sentry will now be available to every multi-site organisation where a fullyfunctional CCTV system is a necessity, such as retail, banking, hotels, education, logistics, transportation and critical infrastructure,” says Keen Yao, international marketing director at Hikvision. “It provides all EMCS customers with a valuable and highly proactive maintenance service tool to help ensure that their CCTV systems are fully operational 24/7.” According to Mark Hewerdine, CCTV

manager at EMCS: “Our customers can be rightly confident in the knowledge that all Hikvision’s products are 100 per cent compatible with CCTV Sentry, competitively priced, easy to use and, most importantly, stable and reliable.” Keen adds: “Integrating CCTV Sentry into EMCS’ standard alarm panel is a breakthrough for sites with unmonitored CCTV installations, allowing them to be alerted when a fault happens rather than finding out after an incident has occurred. It also means the team at EMCS can offer an immediate visual check for an intruder if an alarm is triggered. “We bring a totally transparent approach to working with all our technical partners and are proud to stand behind EMCS in their roll-out of CCTV Sentry.” n

Hikvision showcased at INTERSEC Hikvision, a global leader of innovative video surveillance products and solutions, revealed the new generation DS-7108NI-E1/V/W WiFi Router NVR, in an expansion of the company’s highly trusted Easy IP line-up. The versatile Wi-Fi NVR, which was included in Hikvision’s display at its INTERSEC booth, provides the most convenient way yet to set up a network video surveillance system. It allows automatic IP camera connection and video recording without any interference, making this stylish product a perfect solution for SMB applications. With the straightforward Wi-Fi NVR set-up steps, anyone can easily equip their home or office with the Wi-Fi NVR. Wireless router The DS-7108NI-E/V/W boasts a built-in WiFi router supports 802.11 b/g/n and has a builtin dual Wi-Fi antenna. Connects to the NVR WiFi router’s strong wireless Internet hotspot from anywhere in the home or office with your stationary and mobile devices. Save on cost with an NVR and router rolled into one. Silent fan The Wi-Fi router NVR is equipped with a silent fan that automatically adjusts its speed as necessary for heat dissipation, making it

16

Security Focus | Vol 33 No 1 2015

an unintrusive addition to a productive work environment. This is particularly suitable for home application. Internal hard drive The new Wi-Fi Router NVR provides the added convenience of containing an internal hard drive, which circumvents the need to install one manually. Users can choose between capacities of 1T, 500G, or opt for none. The product supports up to six megapixel resolution recording, and up to 1920x1080P resolution for HDMI output. Additionally, it supports up to 8-ch real-time live video viewing and playback at 1080P. A WiFi surveillance solution you can bank on As part of Hikvision’s Easy IP Solution, the WiFi Router NVR brings easy connection and easy viewing when coupled with Hikvision Easy IP Wi-Fi cameras and video management software. By scanning the QR code on the back of the camera and NVR through the free Hikvision EZVIZ app, these devices can be added to the EZVIZ platform. After being added to the platform, users can view live video and playback, as well as manage video information over the Internet anytime and anywhere. n



SpotlightonIdentitymanagementsolutions

Active Track: more than just another guard monitoring solution Active Track provides a complete monitoring solution that allows employers to seamlessly track and monitor the movements of their employees, including sales representatives, drivers and even a fleet of vehicles. With an endless range of applications for the widest scope of industries, Active Track goes far beyond the security sector with a monitoring solution that offers complete accountability and peace-of-mind. A cost-effective logistics solution When it comes to supply chain management and logistics transportation there are a number of challenges facing companies who need to be accountable to clients for the timeous delivery of goods. These include road infrastructure limitations, increased traffic congestion, volatile fuel and toll pricing, offloading turnaround times, delays at border points, as well as the availability of qualified drivers. However, the Active Track device does provide a solution to companies that need to efficiently track the movement of their employees and vehicles at all times. Using the GPS (Global Positioning System),

which is a space-based satellite navigation system, Active Track provides an efficient monitoring tool by generating a GPS position to identify the location of drivers and vehicles via Google Maps. The system has the capability to record the duration of time that a driver spends on the road, as well as how long the vehicle has stopped at various points. Using the device’s RFID (Radio Frequency Identification) technology tags, Active Track can generate new alarms for various functionalities. The device includes a ‘Please Call Me’ button for easy communication access to the driver, as well as a Panic button if driver is in duress. It’s clear that Active Track is the ideal solution for companies that require a monitoring solution for their long-haul and cross-border fleet of vehicles. Active Track provides the ability to stay in contact with drivers, even in the most remote locations. It also provides a significant cost saving in terms of cell phone communication costs, as the driver does not require a mobile phone to remain in contact with head office. In addition to a 24-hour battery life, Active Track now comes with a harness and docking station to prolong the battery life of the device, where it can be charged from the vehicle itself. Managing your sales team effectively Meeting current and potential clients face-toface remains one of the most effective ways to ensure that your business keeps growing. But many companies that use travelling sales representatives and personnel still struggle to maintain control over a mobile workforce where productivity is key to survival. Active Track provides the most efficient and cost-effective solution on the market, to keep you connected to your sales team in real time. Active Track provides a simple, yet highly effective and reliable personnel tracking system through its GPS technology. Using Google maps, Active Track generates the GPS position to identify the client’s position and track the door-to-door movement of sales personnel to these clients. The system has the capability to record the duration of time a sales person spends at a particular client. In addition the device can generate a series of new alarms via the RFID tags, including: ‘New Client’, ‘Training’, ‘Routine Visit’ etc, via RFID tags.

18

Security Focus | Vol 33 No 1 2015

Active Track again cuts down on the cost of cellular phone communication via the ‘Please Call Me’ button for easy communication between the sales person and head office. The Panic button also ensures that your sales personnel are safe, particularly when travelling to remote locations. A seamless real-time personnel monitoring solution Active Track is comprised of multiple technologies including RFID, GPS GPRS and GSM, all driven by the web interface software solution, Active View. It’s the seamless integration of these technologies that has resulted in one of the most cost effective staff monitoring solutions available on the market today. The Active Track unit is a robust and easy-touse device that can be operated by employees to provide a direct line of communication as well as an innovative reporting system in real time. Providing all the functionality and advantages of smart phone, the system is reliant on network coverage. The Active Track system operates on the GSM network to transmit data collected from various sites. The Active Track device is a two-way communication device. The device can be called and the call is automatically answered, but the call cannot be ended by the end-user. It can also be programmed to make calls to a designated number if required. Active View is the web-based software that allows for ease of access wherever there is internet connectivity. Active View essentially provides the platform for monitoring and generates all alarm conditions via email and sms. The reporting system provides a complete business intelligence tool that monitors movements, productivity and provides accountability in terms of reporting back to clients. In short, Active Track provides complete control and peace-of-mind to the user, manager and client. It’s an empowerment tool that enables all parties to react and respond to a security threat or alarm to take immediate action. The Active View reporting system provides accurate information of personnel movements, ensuring that they are performing their duties as and when required. n



SpotlightonIdentitymanagementsolutions

Thermal imaging cameras the ideal solution

By Leon Cahill, security product manager, Jasco Enterprise Surveillance is an essential component of many security systems today, as it acts both as a deterrent and provides evidence to assist with identifying and prosecuting offenders. However, in many instances, a detailed image of the perpetrators is not required, and standard CCTV imaging has limited application in certain environments, particularly when large-scale or challenging outdoor areas need to be monitored. Thermal imaging cameras are the ideal solution to this challenge, as they do not require additional lighting and can operate just as effectively during the day as at night, helping organisations bolster security and safety by ensuring that no persons enter restricted or dangerous areas. One of the biggest challenges with surveillance is the lighting conditions in the area to be monitored. CCTV cameras rely on adequate light in order to capture an accurate image. This means that weather can have a serious detrimental impact on the effectiveness of the monitoring solution. Heavy rainfall and dense fog can obstruct the camera’s view, which opens up security vulnerabilities that can then be exploited by criminal elements. In addition, environments that do not have a clear view of the area to be monitored can prove challenging, as CCTV relies on line of sight. During the hours of darkness, when the majority of criminals operate, CCTV surveillance requires adequate lighting, which is another vulnerability that can be exploited. Thermal imaging security cameras solve all these challenges, as they utilise the heat generated from objects and individuals to form an image of the environment. This means that regardless of the weather, the time of day or the number of superficial objects obstructing the camera’s view, it is still able to deliver a quality picture, 24 hours a day, seven days a week. It is therefore ideal in any environment where regular CCTV proves ineffective, as well as an additional solution in areas where night security

20

Security Focus | Vol 33 No 1 2015

needs to be enhanced. One of the most effective applications for thermal imaging is perimeter surveillance and monitoring. Using these cameras, along with analytics that can be included with a surveillance solution, alerts can be created and disseminated to the relevant parties when a person crosses a restricted perimeter. Whether this is the outer fence of a farm, the boundary of a gated community or the walls of a prison, the thermal cameras will pick up the heat signature of any intruders. They will then alert the security control room for immediate action, regardless of the weather or the time of day. Thermal cameras are also useful inside buildings such as laboratories, where access to certain areas is restricted, as well as national borders where patrolling large areas is difficult to achieve effectively. Thermal cameras can also be used effectively for a wide range of other applications. These include marine environments, where the cameras are useful for navigation at night or in fog, as well as for detecting man overboard, the approach of pirates, and general security and perimeter monitoring. In addition, thermal cameras can be used in power plants and electrical substations to detect hotspots on equipment, which could potentially alert to danger before a major crisis occurs. With the addition of solar panels and battery cells, thermal cameras can operate regardless of the availability of external power, ensuring that even in a power failure, security is not compromised. Thermal imaging adds an essential component to any comprehensive security solution, offering a number of benefits. Chief among these is its high level of accuracy. Standard CCTV cameras use motion detection to create alerts, which means that birds flying across the frame of image, or even fast moving clouds, can cause false alarms. Since thermal imaging cameras use heat detection, they are able to precisely detect potential intruders, day and night. Thermal cameras also benefit from luminary independence. They do not require light to operate, so regardless of the conditions they will continue to operate effectively, whether in floodlit areas, complete darkness, or severe weather. In addition, thermal cameras have a range of between 10 and 600 metres depending on the environment, which provides a cost-saving benefit for perimeter security. This wide range of detection means that fewer cameras are required on long stretches of perimeter fencing or borders, saving money on equipment and installation without requiring additional lighting. Integration is also fairly straightforward, as the majority of original equipment manufacturers (OEMs) offer the relevant video analytics and thermal cameras can generally be integrated into existing CCTV solutions. In many organisations and industry sectors, CCTV surveillance is an essential part of security. However, its application can be limited depending on the environment in which the video recording needs to take place. For challenging environments, outdoor applications, surveillance during the hours of darkness and a number of other applications, thermal imaging is the ideal solution as another component to add to the existing security arsenal. Partnering with a specialist security solution provider will ensure the right combination of solutions to deliver comprehensive security to meet the individual needs of any organisation, environment or community. n


SpotlightonIdentitymanagementsolutions

Integration provides biometric identity management solution Paxton, a UK market leader of electronic IP access control and door entry solutions has announced the integration of its networked access control system, Net2, with neaMetric’s biometric management application, ProSync. The integration utilises technology from the leading global provider of biometrics, Suprema. This integration allows seamless connectivity of Suprema access control readers and Paxton’s Net2 access control platform enabling the straightforward addition of biometrics to Net2. This provides a user-friendly interface to manage building security more easily. Administrators can biometrically enrol users, create biometric tokens in Net2 and automatically link user templates to Suprema access control readers. This is all done via the addition of a single function to the Net2 client software. Frequent upgrades to the ProSync biometric management engine make it ideal for continuously evolving business requirements. New functions and features are also released as they become available, avoiding long, costly product specific development and maintenance cycles. Paxton provides industry-leading access control systems which meet the challenges and trends of the security market. With 30 years’ experience, they offer engineering excellence, creating simple, yet intelligent and innovative products with simplicity designed in, ensuring they are straightforward to install, use and maintain. Net2 is the UK’s most popular access control solution. The IP-based networked security system offers centralised administration and control of sites ranging from one to hundreds of doors, and thousands of users. neaMetrics aims to develop, implement and maintain expert IT systems with a distinct focus on customer needs, quality and superior service delivery. The main areas of focus are to provide expert business systems, as well as integrate fingerprint biometrics into existing solutions. Walter Rautenbach, neaMetric’s managing director, said: “Paxton delivers an exceedingly effective access control solution which is easy to use and suitable for any size operation. Our benchmark was to keep it easy with an interface that opens up the world of Suprema biometrics within Net2 with no fuss. “While utilising the proven neaMetricsProSync engine, it is nowhere to be seen, but takes care of all the aspects of biometrics allowing users to continue to enjoy

their Net2 experience. We are looking forward to the new markets created through this seamless integration of globally recognised front-runners in biometrics and access control.” Suprema Inc is a leading global provider of biometrics technology and identity management solutions in biometrics and security. The company’s range of products includes fingerprint modules, biometric access control systems, e-passport readers and live-scanners. Young S. Moon, Suprema Inc’s vicepresident, said: “The integration of Suprema biometric readers withPaxton’s Net2 access control is a well-blended combination of state-of-the-art solutions in each category of biometrics and access control. This integrated

solution will enable users to enjoy the power of Suprema's biometric authentication solutions under the same Net2 access control environments.” Gareth O’Hara, Paxton’s sales and marketing director, said: “Paxton’s market leading Net2 access control is built on the foundation of being easy to install, configure and operate, while neaMetrics pride themselves on transforming users needs into working solutions as demonstrated with the Suprema ProSync Paxton integration. “The wealth of experience and expertise held by neaMetrics and Suprema make this the ideal integration for our installers. We hope it provides an ideal solution to suit their needs, and look forward to receiving feedback.” n

Indian video surveillance market growth to accelerate By Jon Cropley, Principal Analyst, Video Surveillance & Security Services (IHS Inc) The Indian market for video surveillance equipment exceeded $300 million for the first time in 2013, and is forecast to grow at an increasing rate over the next five years. This is according to a recently published report by IHS Inc. entitled: “The Indian Market for CCTV and Video Surveillance Equipment”. Much of the market growth is forecast to come from increased government spending. In June 2014, a new government was elected in India. It won enough seats to govern without the support of other parties. Such independence is expected to help the new government push through the difficult economic reforms that are necessary for India to return to higher rates of GDP growth. It is also expected to help push through spending on public projects which have previously struggled to gain final approval. Demand for video surveillance equipment is therefore forecast to grow quickly in such end-user sectors as city surveillance, traffic monitoring, railways, and education. Big plans have already been announced in each of these end-user sectors, but nothing should be taken for granted. One complexity of the Indian market is that authorities often

announce intentions to install video surveillance equipment before firm plans are in place. It can therefore take a long time from these announcements being made to tenders being issued and funding becoming available. Sometimes these projects never actually come to fruition as priorities change or funding is never approved. Sometimes the conditions of supply are too onerous for suppliers to bid (e.g. credit terms, warranty terms, maintenance terms). One example of a large project that has been delayed many times is a major city surveillance project in Mumbai that was planned to be started years ago and has been put out to tender four different times. This is not the only challenge vendors face when doing business in India. The market is very price-sensitive and a highly fragmented supply base means that customers are able to choose from a wide selection of alternative products. Nevertheless, the Indian market offers excellent growth opportunities for vendors with the right strategy. The market is forecast to almost double in size between 2013 and 2018. Furthermore, it is more open to foreign vendors than some other regional markets. Many of the big international brands already have a local presence in India, but they are likely to expand and be joined by other international brands as the market continues to grow. n

Security Focus | Vol 33 No 1 2015

21


SpotlightonIdentitymanagementsolutions

Game-changing trends and technologies in 2015 and beyond With the Internet of Things (IoT) continuing to be a hot topic throughout 2014 and across all industries – whether it’s about smart cars or intelligent appliances such as connected refrigerators – more consumers and businesses are now aware of the advantages of being connected to the Internet, and so should the security professionals and business owners who are trying to ensure the safety of their organisations. As many professionals in the security industry predict, the new HD standard “4K Ultra HD” is a natural next step in the industry’s ongoing strive towards more image details and larger coverage from a security camera. “4K for surveillance purposes is expected to take full effect in 2015 and beyond,” says Roy Alves, regional business development manager for Axis Communications. “Image quality is a core consideration and, while everyone is talking about 4K, the real challenge is to optimise image quality for the surveillance task at hand, no matter how bad the light or what the ambient conditions are. “Innovation in this area – technology that enhances image quality for advanced video applications – will be a key industry driver. However, the advancements in image quality have created bigger pressure on managing the resources to support them. “For example, they can have a significant impact on network bandwidth and storage requirements, increasing the need for more

Roy Alves

22

Security Focus | Vol 33 No 1 2015

effective compression methods.” Video surveillance-as-a-service (VSaaS) and cloud computing This is when video surveillance-as-a-service (VSaaS) becomes useful for managing and archiving video footage captured by surveillance cameras onto cloud storage, says Mr Alves. Video surveillance systems can be a powerful tool in preventing or investigating crime when installed in locations such as shopping malls, parks, banks, airports, and other public transport. Some of the rapidly increasing demands for video surveillance systems has been driven by the growing safety and security concerns worldwide. Cloud computing might have been a favourite buzzword in IT circles for several years, but the new era is very much upon us now. Whether in a public environment, where tenancy on servers is shared with other customers, or in a private environment, where your data and applications are the only ones on a system, cloud computing brings three advantages to your network – redundancy, scalability and shifting costs from capital expenditure (CAPEX) to operating expenditure (OPEX). Depending on whether the cloud is hosted or run internally, there may be the added convenience of leaving upgrades, updates and patches – routine maintenance – in the hands of a third party. Scalability doesn’t just factor in if more cameras are needed. It also enables access to more computing power and storage if, for example, higher resolution or faster frame rate is needed. If analytics on the video data collected is needed for customer traffic pattern analysis, for example, the processing capacity is there and is only paid for when needed. Better functioning analytics running on the edge are also appropriate for critical infrastructure applications. The extra computing power could be used to store half a million licence plate numbers and capture plates from cars driving past at 40 kilometres per hour, for instance. Another interesting aspect of VSaaS is that it offers users the possibility to add additional services to their video surveillance – such as guard force or remote monitoring services. Analytics, business intelligence (BI) and big data Analytics technology is also considered to finally take off within the surveillance industry from 2015 and beyond for getting valuable insights from the enormous amount of both structured and unstructured information collected (also known as big data). With network cameras’ capability to provide higher resolution video and to be connected from everywhere and around the clock, security departments are getting more information from more sources. More analytics are needed to help organisations make sense of the tremendous amount of information, including unstructured data such as images and videos. More intelligent applications are needed to help categorise and interpret the information, so it can be turned into actionable insight. “The three Vs of big data – volume, velocity, and variety – can provide vital information during a crisis by providing the right data at the right time,” says Mr Alves.


Identitymanagementsolutions

“By starting with more factual data, such as surveillance data, physical access control data, and cyber activity information and then building useful associations, costs can be reduced by searching for the most relevant information.” This is where the IP revolution changes the surveillance camera from a forensic tool aimed at solving problems after an incident has occurred, to becoming a vital part of a proactive chain. Video images can be used in conjunction with analytic horsepower to discover customer traffic patterns in a retail outlet, dwell time at certain displays or isolate bottlenecks. Mash that up with other structured and unstructured data sources including transit schedules, lists of promotions, pricing data from your competitors, social media, and a skilled data scientist can tease out patterns and relationships that you never knew existed. And that is a significant competitive advantage. Video compression and bandwidth usage Video compression technologies are about reducing and removing redundant video data so that a digital video file can be effectively sent over a network and stored on computer disks. With efficient compression techniques, a significant reduction in file size can be achieved with little or no adverse effect on the visual quality. The video quality, however, can be affected if the file size is further lowered by raising the compression level for a given compression technique. There are several video compression standards including Motion JPEG, MPEG-4 Part 2 (or simply referred to as MPEG-4) and H.264 – being the latest and most efficient video compression standard and already the standard in video surveillance as well as many other industries, such as entertainment. At the same time, the ongoing improvement in cameras regarding image resolution and light sensitivity for example, also increase the data output from the cameras – putting higher demands on the efficiency of the video compression. Video surveillance manufacturers need to balance the upsurge in resolution with improvements also to H.264 compression algorithms – to make sure costs for network bandwidth and storage do not spiral out of control. A combined effort of working on noise reduction methods and bit rate reduction should be in parallel with investigation new video coding to get the best results. Beyond improvements in current H.264 compression, an interesting future technology is H.265, which is rapidly gaining interest in the broadcast industry. H.265 can reduce bandwidth and storage demands significantly (up to 50 per cent) under the right circumstances, and the technology can be expected to be introduced in the security industry during the next few years. It is likely to be first deployed in high-end, high-resolution cameras, and it is expected that H.264 and H.265 will co-exist for quite a long time in the industry. “At the end of the day, higher quality of images and videos such as 4K needs to be supported by the right technologies in the background for organisations to get the most out of the data, which can then be turned into useful insight not only for security purposes, but also for efficiency and gaining business advantages. “This should be the key consideration for everyone who is looking for the next big thing in surveillance,” Mr Alves concludes. n


CompanyNews

Elvey continues to bring convenience and innovation to customers

T

he months of May and June 2014 were momentous for Elvey Security Technologies, with the hosting if its premier exhibitions. These events were designed to bring customers the latest security technology by showcasing Elvey’s range of premium quality products, from intruder protection, access

24

Security Focus | Vol 33 No 1 2015

control, fire protection to CCTV and integration. In an effort to maintain its drive to bring customers the highest degree of service and convenience, Elvey Security Technologies will, once again, be hosting Elvey expos in 2015. With the continued and incredible support from suppliers, Elvey says it hopes to make this year’s events even better than before. n


CompanyNews

Global crisis management guru issues warning “A crisis mitigation and management strategy is essential. Just like insurance, you hope you never need it, but not having it can be fatal.” So says Alan Hilburg, president and chief executive officer of Hilburg Associates in the US and in South Africa. For nearly 30 years, Hilburg has been one of the most sought-after strategic counsellors in some of the most complex, high-visibility, high-risk crises and ‘impossible’ situations. Mr Hilburg first gained global recognition when he led the Johnson & Johnson team in the textbook management of the Tylenol crisis, the number one crisis management case history studied worldwide. He has advised national presidents, university chancellors, members of Congress and many other high-profile individuals who found their reputations being threatened. Many local organisations lack the internal capacity to effectively respond to a crisis, which leaves consumers scrambling to adjust to outages. Among recent examples here in the public sector are Eskom’s move to load shedding and the recent strike action at SA Post Office. Companies across the country who rely on these public sector organisations have seen sales drop and costs go up as a result of service disruptions. In both instances, one organisation’s lack of an effective crisis mitigation and management plan has had a knock-on effect on hundreds of companies who did not have an effective plan in place either. Among recent cases in the private sector is the infamous ‘Cell C’ banner. The subsequent bad publicity due to how a disgruntled customer’s compliant was handled is a good example of how not to handle a crisis. Mr Hilburg urges business leaders to ask themselves “What’s the cost of not having a crisis mitigation and management plan? What’s the cost of losing the trust of your customers, your employees, your shareholders, the media or your key regulators?” He adds that the most common challenges faced when operationalising a crisis mitigation and management strategy include “migrating from ‘having it’ to ensure it is comprehensive in that it covers all possible vulnerability scenarios, and that all the necessary roles and responsibilities have been understood and confirmed. “Everyone within an organisation is responsible for business continuity – from leaders to marketers, to brand custodians to business continuity professionals.” Mr Hilburg will be in South Africa to present a one-day masterclass on crisis mitigation and management in February, an event aimed empowering delegates to effectively prepare for, prevent and cope with a crisis. During this masterclass he’ll share the 10 steps business leaders and other company decision-makers should follow when developing and implementing a crisis mitigation and management strategy. n


CompanyNews

How secure is your home? Are you still hiding your keys under the front door mat or your favourite pot plant or garden gnome? Do you know what lock you have on your front door? More importantly if you accidently locked yourself outside your house, could you “break in”? National Home Security Month is designed to create awareness around home security and to highlight ways in which you can keep your home and family safe throughout the year. National Home Security month officially takes place in March ... which is one of the more popular times for perpetrators to attack. The campaign is designed for everyone, especially homeowners and

tenants with homes to protect and with the day-today pressures of work and family life, it’s easy to overlook home security, so we offer handy tips, precautions and advice on how to protect you, your home and your possessions throughout the year. We also offer a platform where you can get in touch with supporters of the campaign nationally who will assist you with upgrading the security of your home, offer self-defence courses and should the need arise, get you in touch with a victim support centre in your area. Latest crime statistics reveal the following concerning data around residential crime in South Africa: House robberies have increased by 3,6 per cent and house burglaries went up by 3,3 per cent. To place this in context, on average 290 robberies are reported every day. In other words every five minutes a robbery takes place. In the 2012 Victims of Crime Survey (VOCS), housebreaking and robbery were highlighted as crimes that people in South Africa are most fearful of. With the above crime statistics in mind, it is important to start creating a secure and safe environment for yourself and your family and to have a “preventative” rather than “reactive” mindset as often incidents are opportunists that take advantage when it is easier to attack and simple security measures have not been put in place to deter burglars. As Clint Jones, product and marketing manager from Yale Security (SA) adds, “ We are committed to promoting the importance of keeping safe and secure and that’s why we believe it’s important to fully get behind the National Security Month campaign.” National Home Security Month is supported by Yale. Home security specialist, Yale, is South Africa’s most recognised and trusted name in the locking industry. n

Tracker SA relies on Johnson Controls GWS Tracker South Africa is one of the foremost vehicle tracking and fleet management companies in the country. Responsible for more than 700 000 vehicles and its 1 200 staff, of which 70 per cent are contact centre agents that work from two facilities in Johannesburg. Taking care of those facilities – and helping Tracker maximise its performance – is Johnson Controls Global WorkPlace Solutions (GWS). Clement Olivier, technical director at Tracker South Africa says: “Johnson Controls GWS has worked closely with us for more than six years and become an important part of the Tracker team. Their professional management of our facilities, which includes management of our mission critical servers, allows us to concentrate on our core business. “What makes Johnson Controls GWS truly excellent, however, is their high level of engagement with us and the quality of service they provide. They remain keyed in to our

26

needs and focused on maximising benefits to the organisation.” Johnson Controls GWS began supporting Tracker in 2008, providing disaster recovery – i.e. Uninterrupted Power Supplies (UPS) and generators to drive its 24x7 call centre service and ensure its servers stay up. Today, Johnson Controls GWS provides Tracker with an integrated facilities management service that encompasses cleaning and hygiene, building maintenance, environmental control (heating, ventilation and air conditioning), office support (from stationary to tea), utilities management (water and power), boardroom management, parking management and security (access control, CCTV and intrusion detection) and maintenance. Johnson Controls GWS has also begun servicing Tracker’s branches nationally. Thando Ncube of Johnson Controls GWS explains: “Johnson Controls GWS makes use

Security Focus | Vol 33 No 1 2015

of its global experience and best practices to design, implement and maintain these facilities. We put in place a business and implementation plan, which includes budgets and technical plans, and are driven to meet service levels.” Johnson Controls staff provide on-site building maintenance and Johnson Controls electricians take care of all critical onsite repairs. In addition Johnson Controls appoints, co-ordinates and manages all thirdparty service contractors and ensures rates are competitive and high quality services are delivered. “Johnson Controls GWS delivers a turnkey solution,” notes Mr Olivier, “and the relationship is built on a partnership. How the Johnson Controls GWS facility manager interfaces with our business is key to understanding and meeting strategic and performance goals. We look forward to continuing our relationship with them.” n


Enquire about our card printer Trade-in offer

T

he Datacard® SD and SP Series printers operate faster, better, and at a lower cost, whether you’re striving for security, loyalty or convenience.

Their competitive features and price make them the best value on the market. Dozens of innovations combine to create these industry-leading card printers. SD and SP Series printers outperform in their categories so you can do the same in yours. TruePick™ anti-jam card handling (SD Series) accurately picks cards and helps reduce the stress of a busy workday. The SD360™ and SD260™ card printers consistently print ID cards faster and more reliably – and at the best value on the market. Whether you need a more secure workplace or a convenient solution to office identification, SD Series printers adapt to your needs and your budget so you can print confidently. Designed for card issuers looking to increase productivity and manage costs, the Datacard® SP30 Plus card printer offers an economical printing solution that produces professional, high-quality cards with full- or partial-colour images – ideal for issuing drivers licenses, national healthcare cards, corporate ID cards, government ID cards and more. Smart card encoding on most printer models produce more secure solutions for a range of applications including education, healthcare and corporate needs.

SD460™ card printer

For enhanced security and durability, the Datacard® SP75 Plus card printer has been engineered to enable government agencies, high-tech corporations, universities and other security-minded organisations to protect people, facilities and critical assets.

Datacard® SD360 for vibrant images at superior speeds Two-• sided (duplex) card printing

The next generation of card printing from Datacard combines dozens of great innovations into industry-leading perfection.

• Full-colour printing: up to 200 cards per hour (one-sided) up to 155 cards per hour (two-sided). Monochrome: up to 830 cards per hour (one-sided) • Intuitive LCD panel with soft-touch controls • TruePick™ Features

Datacard® SP30 for low cost per- card, high yield printing

Datacard® SD460 card printer with inline lamination module

Datacard® SD260 for superior speed and productivity

The impact of security breaches presents an imposing threat for commercial enterprises – which places critical importance on employee and student ID programs. The new Datacard® SD460™ card printer empowers security-minded enterprises in important new ways with a variety of technologies, including highperformance laminates and an entirely new tactile impression personalization feature. The result is stronger security and cost-saving card durability.

• One-sided edge-to-edge printing; manual two-sided printing • Full-colour printing: Up to 160 cards per hour; Monochrome: Up to 750 cards per hour • Easy to operate: The printer driver provides message prompts, recovery instructions, colour image preview and online user help

• One-sided, edge-to-edge printing; manual two-sided printing • Full-colour printing: up to 200 cards per hour (single-sided), up to 155 cards per hour (two-sided). Monochrome: up to 830 cards per hour • Easy, fast installation • Printer messages display on LCD panel • TruePick™ Features


CompanyNews

Ideco appoints new EVIM partner As part of its future growth strategy and due to increased demand for the EVIM visitor management solution, Ideco Biometric Solutions has appointed Stallion Security as a Value Added Reseller (VAR). EVIM is a cutting edge mobile scanning solution that reinforces security as a digital visitor register and is the only offering of its kind that is fully compliant with the country’s newly promulgated Protection of Personal Information (POPI) Act. Ideco designed and piloted the EVIM solution in anticipation of the POPI act before officially launching the solution to end users and industry service providers earlier this year. This ingenious device captures visitor data and automatically verifies vehicle and person ID data. Ideco managing director Marius Coetzee is excited to have Stallion Security on board as a partner. “We are impressed by the intuitive way in which Stallion recognised EVIM as a whole new solution vertical, taking it to market as a new value-added supply chain opportunity.” “Stallion seized the opportunity to become a partner and they fully understand the unique dynamics of partnership relationships,” he says. Stallion Security group technical director Alvin Flaum says the EVIM system is a natural fit for the Stallion offering and is also a great value-add to Stallion’s existing guarding security services and systems portfolio. “The Stallion group embraces the amalgamation of conventional guarding with electronic protection and detection solutions.” He believes that by introducing EVIM as their visitor management offering will ensure they remain firmly ahead as one of the leading providers of guarding solutions.

“Many guarding companies kick against the latest technology and are not keen to embrace it, as they believe that their manpower revenue base will be impacted.” “Instead of viewing the advent of technology as a threat to our business, we actively adopt the latest technology as a value added offering wherever possible, which helps ensure our clients’ sites remain safe and protected,” he explains. Ideco Business Solutions executive Mark Paynter says Stallions’ national footprint along with its large and mature guarding client portfolio, made it a superb fit for the EVIM solution. “We were impressed by their eagerness to adopt the product and to gain access to the solution on a national basis.” “In fact, it was a pleasure to see their eagerness. They instantly recognised the new industry opportunity and decided that they wanted to be part of this industry transformation. When the EVIM solution was officially launched, the Stallion directorate showed a keen interest in understanding and adopting EVIM. This proved to us that once their product adoption cycle is completed, we won’t need to allocate unreasonable support and sales resources to babysitting them,” he adds. Mr Paynter says Stallion understands the true essence of a partnership and realise that being accredited as a partner is so much more than a supplier client relationship. “Stallion showed no hesitation at all in committing to a binding partnership which obliges them to upskill their support and sales staff in terms of the EVIM solution to ensure they answer all first line end-user enquiries and support requests.”

“We are aware of the implications that the POPI act will soon have on the traditional visitor management process and we believe that we are now correctly positioned to offer our clients a solution which takes care of their POPI compliancy within their visitor screening process flow,” says Mr Flaum. “We already have the system successfully implemented at a number of key national clients and we are confident that as we upskill our support and solutions staff the solution will gain substantial traction until it eventually becomes a standard offering to all our clients,” he concludes. n

Marius Coetzee

Hout Bay goes hi-tech Independent off-site CCTV monitoring company, Verifier, have partnered with Nexus Wireless to secure a new high site in Hout Bay on Mount Rhodes Drive. “The new high site has a link to the rest of our network via Constantia Neck,” explains Verifier director, Mike Voortman. “This will allow our Hout Bay clients to costeffectively link their CCTV to Verifier and in addition obtain fast, reliable wireless Internet services from this new mast. Importantly, these wireless services do not require a Telkom

28

line or ADSL connection; this dramatically improves the reliability of the service. “Independent off-site monitoring allows you to have real-time pro-active alarm detection and visual verification in order to be forewarned of impending dangers,” says Mike. “If a real threat exists, we are able to immediately give a remote audio challenge, giving you more time to get into your safe zone while intruders are kept at bay. While doing this, we are also able to contact the relevant authorities in order to ensure your safety.

Security Focus | Vol 33 No 1 2015

“Not only does the monitoring allow you pro-active security and peace of mind, the recorded footage is also admissible in court, helping to ensure that the criminals are put behind bars. “We can no longer rely solely on traditional security providers to look after our safe-being, while our houses and our lives, and even our security systems have become more hitech, so have the criminals. We need to keep outsmarting them, letting them know that we are still in control.” n



ExhibitionNews

Increasing visitor value at Securex 2015

S

ecurex 2015 has a number of new features in store for visitors. “In addition to the name change we adopted in late 2014, we have also conducted market research to determine what the majority of our visitors would like to see at Securex,” says Joshua Low, Securex event director at show organiser Specialised Exhibitions Montgomery. The Securex Global Academy Conference will provide visitors with access to up-to-theminute information on best practice, as well as pertinent industry-related and legislative issues. “Our free educational programme is always very popular with visitors. In fact, the demand is so high that often there is standing room only in many of the sessions,” says Mr Low. The Installer Workshop is being launched

at Securex 2015 to address the gap in what is deemed a very important sector of the industry. This interactive educational platform, which will be run by SAIDSA, will provide installers with the latest technology trends and best practice from specialists in the field. Topping off the programme, an installer competition will be run on 14 May. A new Products Showcase will be erected in a prominent area at the entrance to Securex 2015. This will allow visitors to preview the latest technology in a number of security and fire modalities before even entering Securex 2015. A new service – known as the Global Meetings Programme – will see visitors matched up with companies that are best able to devise solutions to their apparent threats and risks. This will substantially reduce the time it takes

to find a suitable supplier, allowing visitors to maximise their time at Securex 2015. In addition to the extensive array of traditional security technology such as surveillance and access control, visitors to Securex 2015 can also look forward to more in-depth coverage of other security modalities such as cybersecurity and guarding services. Attention to the growing field of fire detection, monitoring and prevention will increase and the Fire Protection Association of South Africa (FPASA) will run a competition throughout the three days of the exhibition. “We have a number of other exciting plans in the pipeline and we will be rolling these out over the months preceding the exhibition,” Mr Low points out. Visitors can pre-register online by visiting www.securex.co.za n

Secutech Thailand 2014 closes with success Secutech Thailand successfully concluded its fourth edition with 145 exhibitors showcasing the latest safety and security products and technologies. The show, held from 26-28 November 2014, at Bangkok International Trade and Exhibition Centre, attracted more than 3 000 visitors from 22 countries and regions. The show was organised by Messe Frankfurt New Era Media Business Ltd and its new partner, Asian Exhibition Services (AES). Additional support came from various Thailand official bodies and industry associations. Opening the event was Mom Rajawongse Sukhumbhand Paripatra, the Bangkok Governor (Bangkok Metropolitan Administration). He discussed Bangkok’s safe city projects and surveillance initiatives, and how they are expanding to other parts of the country. Mr Paripatra commented: “Bangkok has established itself as a hub destination for the MICE industry here in Southeast Asia. There has been no better time than now to welcome the Thailand edition of Secutech, as Bangkok leads the way with safe city infrastructure developments.” Fellow guest Nopparat Maythakulchai, president of the Thailand Convention and Exhibition Bureau (TCEB), agreed by stating: “Secutech Thailand is well established in Thailand, and is set to expand and develop along with the market’s rapid expansion. TCEB has been pleased to support the show’s organisers

30

in developing their global marketing campaign through exhibitions to reinforce Thailand as the regional hub for their events.” Mr John Shi, General Manager of Messe Frankfurt New Era Media Business Ltd, further noted: “As Thailand’s political environment is becoming more stable, government-funded infrastructure and transportation projects are resuming after a pause last year. Effective city surveillance, smart access controls, safety and security are major focuses that will lead to a surge in the demand for high-quality related products and integrated solutions. Secutech Thailand serves as a holistic platform where engineers, system integrators and importers can connect with overseas exhibitors. As a result, they can learn about and acquire nextgeneration technologies.” Industry professionals regard show as a networking and trade hub Recognised as a premier trade networking and trade hub for Thailand’s security industry, exhibitors from 16 countries and region joined to display their solutions over 3,000 sqm of fairground space. For returning exhibitor, Dahua Technology Co Ltd from China, the fair offered an important opportunity to broaden their business network in Thailand. Mr Tim Shen, Marketing Director for the company’s Overseas Business Centre,

Security Focus | Vol 33 No 1 2015

shared: “Dahua entered the Thailand market a few years ago and we see the potential for new projects in the public sectors. Secutech Thailand 2014 has attracted a larger crowd of local visitors than the last edition. On the show’s first day, we acquired a number of contacts from professionals and industry insiders. This forming of more partnerships and dealerships is imperative for promoting our brand and extending our network.” Leadtek Research Inc from Taiwan was a first-time exhibitor, and specialises in integrated security and data management solutions for hospitals and healthcare centres. Mr Kevin Tay, Sales Manager in the Broadband Communication Product Business Unit, expressed: “With the growing trend of medical tourism in Thailand, we noticed that the demand for intelligent solutions in hospital and healthcare centres is increasing. It is the right time for us to enter the market, so we decided to participate in Secutech Thailand. We are hoping to network with local industry players, and we are delighted that Taiwanese products are well-received by local professionals. We are always busy dealing with enquiries during the show. Hopefully we can close distributorships with the new leads generated here. The results are satisfying and we will consider exhibiting at the fair again.” Fellow exhibitor, Coretech Corporation Co Ltd, is a leading supplier of comprehensive security


ExhibitionNews

Smart home security solutions on show at SMAhome Expo The highly anticipated 18th edition of Secutech will again serve as a premier networking platform for security professionals from across the world to form strategic partnerships and distributorships with Asia’s top-tier manufacturers and service providers. The event will run from 28-30 April 2015 at the Taipei Nangang Exhibition Centre in Taiwan. Security-related devices top demands in the current smart home market. As such, fair organisers will build on the success of the SMAhome product zone at Secutech 2014 and add a new show component in 2015 called the SMAhome Expo. The objective is to streamline sourcing processes from the early stages of design to final production. Visitors can expect to find products categorised under Home Security, Home Control and Connected Home in the new Expo. A wide spectrum of smart home safety and

security-related products including entrylevel DIY kits, mid-range solutions, complete interconnected home control systems and wireless door solutions, as well as related technologies such as ultra HD, NFC, cloud storage, and smart smoke detection will be showcased. Expected to be in attendance are telecom companies, Internet service providers, retailers, home security experts, appliance brands, and automation importers and dealers. Over the course of three days, a projected 200 booths in the SMAhome Expo will house manufacturers who are highly adept at R&D, product design, customisation, efficient production, technical support and international trading. Asia’s Top 100 manufacturers will be selected from Taiwan, China and Korea – three manufacturing hubs accounting for nearly 70 per cent of the global home security-based

product output. These manufacturing elites include names such as Chicony, Climax, D-Link, Forscam, Optex, Sercomm, Starvedia, Wolfguard and others, and will showcase the trendiest products and solutions of 2015 to visitors from around the world. To ensure participants maximise their return at the fair, a number of seminars led by major industry players will take place. A highlight includes the Smart Home International Conference, featuring the latest technological and application developments in various user markets such as telecom and building automation. Attendees can expect to gain insights into the evolving global smart home industry through presentations and interactions with field experts. For more details about SMAhome 2015, visit www.secutech.com/15/SMAhome. n

products and solutions. Coretech took part in various large-scale public facilities projects, one of which involved the Bangkok Suvarnabhumi Airport. Mr Nuttawaj Chieobangyang, the company’s CEO, shared: “Secutech Thailand is popular among local security industry professionals, making it a must-attend event for us. We have exhibited at Secutech Thailand many times and it is always a remarkable occasion for meeting new customers, existing partners and end-users. This year, Coretech presented a full series of IP cameras and visitors are very much interested in our showcase. Here, we hope to promote not only our concepts and products, but also the importance of security in domestic and industrial sectors. We are happy with the results so far and look forward to participating in the next edition.” As a professional sourcing destination, Secutech Thailand attracted thousands of local and international visitors. Among attendees was A2MG from Hong Kong, an exporter of security products to Europe and Africa. Mr Arnaud Keyren, Trade Agent for A2MG, came to Bangkok solely for Secutech Thailand. He said: “I came to source CCTV products, such as IP cameras and NVR from suppliers in China, Korea, Taiwan and Thailand. I also want to learn more about the market and how it will develop in the near future. At the fair, I have met some manufacturers and suppliers which I am already quite familiar with who carry some interesting products that I am

interested in. The fair is effective for sourcing since I can meet them under one roof.” Mr Kiatchai Chirapornsuk, Senior Product Development Manager at Computer Union Co Ltd from Thailand, was also impressed with the fair. He noted: “My clients are mainly from the banking sector. They are demanding highquality surveillance systems, access controls and related security products. I came to source new IP-based solutions needed to upgrade my customers’ existing analog systems. I am interested in products from China, Taiwan and other overseas countries, where the markets are more mature. I have acquired some good contacts and it is highly possible that I will place orders after the show. This trip was fruitful and I will attend the show again.”

(VMS) for CCTV systems. He mentioned: “The fair is certainly helpful to our business since it gathers all important industry players in one place. GDSF Thailand offered us a chance to promote our VMS, which potentially brings more convenience to end-users from different industry sectors. I hope to start thoughtprovoking discussions among attending system integrators and potential partners, so we can exchange ideas on how we can meet their expectations and demands with our technologies and services. The results have been positive.” Seminar attendee Mr Kyaw Lwin Oo, Managing Director of May Tech (Myanmar) Co Ltd, affirmed that he gained a wealth of knowledge from the event. He noted: “The presentations were informative and I am particularly impressed by the session with Hayagriva. It talked about the implementation of their face recognition technology in CCTV systems and their newly launched mobile application which generates smart incident reports. All the technologies presented were new to me, and I am pleased to have learned more about the brand’s concepts and latest innovations. The seminar has been helpful to my business.” The next edition of Secutech Thailand is scheduled to take place from 25 – 27 November 2015 once again at the Bangkok International Trade and Exhibition Centre (BITEC). n

Global Digital Surveillance Forum (GDSF) Thailand delivered market intelligence The annual GDSF Thailand was held alongside Secutech Thailand on 26 November, adding value to participants’ experience. Leading brands were invited to share the latest news and their opinions on market trends. These brands included Hayagriva, Hikvision, Osram, WD and others. Mr Adam Zhan, Asia Business Team Project Manager of Hikvision Digital Technology Co Ltd (China) in Thailand, held a presentation on his company’s latest Video Management Software

Security Focus | Vol 33 No 1 2015

31


InternationalNews

Minneapolis / St. Paul

Milestone highlights power of partnering Open platform IP video management software (VMS) from world-leading provider Milestone Systems is improving safety and public services in eight cities around Minnesota’s largest metropolis. Minneapolis/St. Paul is the most populous area in the state with a sprawl of more than 3 000 000 people.

E

ight cities here covering more than 200 square miles have formed a valuable circle of relationships by connecting their video surveillance to protect citizens and quickly resolve incidents that can cross between their borders. With the networked Milestone XProtect® video management software, individual municipalities control their own security monitoring, yet quickly connect with neighbouring systems for collaborations. “We had a collective idea between municipalities to centralise local systems with the same IT backbone. “Every city can adopt software from the Milestone platform to have its own system. But, there are times administrators may want to open access to their system to solve a mutual incident, and they can get assistance from neighbouring emergency services for as much help as possible to solve a problem. Sharing camera feeds through Milestone has been a valuable, yet easy-to-integrate solution that each municipality has eagerly installed,” says Tim Ferrian, director of sales

32

and marketing, Pro-Tec Design. Security integrator Pro-Tec Design identified the parallel and individual needs of each city and their various departments. For example, the police department in one city has a variety of unique applications different from the IT department, schools or retail business in another. The widespread commonality for all cities was the need for IP video management software (VMS) to replace limited legacy analogue systems. Milestone XProtect VMS with its open platform technology allows each city to monitor and secure its own assets, be it a government building, transit stations or cityowned business. Milestone enables each to strategically design and install the hardware and software that meet its own needs, providing a costeffective, flexible solution that can also be shared across locations to leverage more resources. With a combined Milestone VMS service, updates and maintenance are streamlined for quick response from Pro-Tec. Milestone solves the core needs of each

Security Focus | Vol 33 No 1 2015

municipality, but offers versatile feature sets and client interfaces that address unique requirements. For example, Milestone Mobile is deployed on tablets and smartphones. The cities are saving money by efficiently deploying emergency services, knowing exactly what they are dealing with before sending out first responder teams. Pro-Tec also expanded the open platform into additional applications, such as video integration using XProtect® Transact for government-owned retail stores. Pro-Tec’s relationship with the cities in Minnesota developed from a foundation of card access control and video surveillance, so a transition into open platform, networkbased VMS that could integrate the two was a logical step. “We could see the shift in security and surveillance to IP, and we wanted to partner with strong companies to provide our clients with a solution beyond their current expectations that could easily be installed, upgraded and expanded over time,” says Mr Ferrian. “Milestone understood this, not only


InternationalNews

Guard booth takes on Austin shooter and wins Delta Scientific, a leading manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that no bullets penetrated a Delta bullet-proof guard booth in a recent downtown Austin shooting. Early in the morning of 28 November 2014, a gunman started shooting up the recently opened federal courthouse, the Mexican consulate and the Austin Police Department headquarters. Standing in the middle of the melee was a Delta bullet-proof guard booth. During the shooting, nobody was injured but the gunman, was killed. “Most everyone is familiar with the standard manned guard booth, in which a person sits and allows drivers in and out of a facility,” explains Jeremy Andrews, Delta Scientific sales manager. “However, government facilities, border stations, military bases and other locales where there can be a ‘very unwanted guest’, all use much higher security booths, such as our bullet-resistant units.” According to Mr Andrews, bullet-resistant booths can be specified as Level 1, 2, 3 or 4, with 4 providing the highest level of resistance. Bullet-resistant booths are tested and certified to conform to Underwriters Laboratories standard UL 752 and others as required. If wanted, they are pre-wired to N.E.C. (i.e. 125

AMP, 120/240 Volt, 6/12 station, single phase or whatever current is used in that region) and come fully assembled, ready for service. Typically, the specifications for a bulletresistant booth will include: * Protection against: o Impact - Level 1 o Handgun - 9mm or .357 - Level 2 o Handgun .44 magnum, 5.5 ammunition or 12g shotgun - Level 3 o High-power rifle such as a 30.06, 7.62 ammunition, hand grenade, high explosive - Level 4 * All structural members meet or exceed ASTM A500. * Sliding or swing door fabricated from structural steel with heavy duty hardware for bullet resistance. * All electrical components will be UL- approved and installed in accordance with the N.E.C. Delta bullet-resistant Level 4 booths currently protect such varied locations as the Pentagon in Washington, DC, Ontario Airport and US and other nations’ embassies needing extra security in volatile countries. Fifty custom-designed bullet-resistant guard booths are now in use at the San Ysidro Landed Port of Entry (SYLPOE), the busiest land port in the world. Located between San Diego in the US and

Tijuana in Mexico, the port processes an average of 50 000 northbound vehicles per day. The majority of the traffic lanes have two stacked bullet-resistant inspection booths created by Delta Scientific. n

in the technology’s infancy but how it would evolve to what end-users expect in the future, to deliver as a flexible core offering.” There are many common themes within city surveillance: watching out for the visitors of city halls, keeping track of persons in custody at police stations, providing evidence for investigations, protecting staff and equipment, monitoring community pools and protecting the government from liability, or watching intersections for public works operations (moving snow, salting roads). There are also such needs as monitoring a busy farmer’s market, senior centres, community sports, schools, historical landmarks, water towers and treatment facilities. These eight cities are currently linked via Pro-Tec’s Milestone video solution: Shoreview, Farmington, Brooklyn Centre,

Minnetonka, Maple Grove, Brooklyn Park, Edina and Minneapolis Proper. In addition, the Minnesota Department of Transportation (MNDOT), Minnesota Department of Employment and Economic Development and the Minneapolis Convention Centre are included within this “Ring of Protection”. Nick Lovejoy, IT specialist, City of Edina, says: “Our Milestone installation process was very simple. The interface is easy to use and very straightforward. It’s evident in our dayto-day operations that the Milestone interface has helped us improve services in the city, addressing and solving many issues with a quick turnaround.” Brooklyn Centre has integrated the Point of Sale (POS) systems at its liquor stores with Milestone’s XProtect® Transact software, which displays video associated with register

transactions. This integration gives a timesynchronised interface linking receipt data with corresponding video, extending the monitoring of operations to include actual cash register data. This identifies problems involving POS and credit cards to reduce shrinkage and fraud, providing a safer shopping environment. “Ease of use was extremely important when deciding on our VMS installation,” states Patty Hartwig, IT director for Brooklyn Centre. “We did our research looking for user-friendly, adaptable and easy-to-modify solutions. Our system needed to play back and pull up video in an instant. We put an extreme value on the Milestone VMS protecting our city assets. We required a product that would be here today, tomorrow and in the future. Milestone has, and continues to show that value.” n

Security Focus | Vol 33 No 1 2015

33


InternationalNews

Fighting skimming, relay attacks and eavesdropping Farpointe Data, the access control industry’s global partner of choice for premium RFID solutions, has announced that access control manufacturers and integrators can now provide customers with a way to protect their card-based systems from skimming, eavesdropping and relay attacks. Skimming occurs when the attacker uses an unauthorised reader to access information on the unsuspecting victim’s RFID card or tag without consent. From that point on, the attacker can control when and where unauthorised entries may occur. An eavesdropping attacker recovers the data sent during a transaction between the legitimate reader and card. In a relay attack, the invader relays communication between the reader and a tag, which lets the attacker temporarily possess a “clone” of a token, thereby allowing the assailant to gain the associated benefits. “What’s scary about all this is that the equipment used to perpetrate the above attacks can be quite inexpensive and is widely available,” emphasises Scott Lindley, Fairpointe Data president. “For organisations worried about such invasions of their proximity or smart card systems, access control system manufacturers and leading integrators that deploy Fairpointe proximity/smart cards and readers can provide increased security with our MAXSecure option. “MAXSecure provides a high-security handshake, or code, between the card, tag and reader to help prevent credential duplication and ensure that your readers will only collect data from these specially coded credentials. “For those familiar with mechanical access control, it’s the electronic security equivalent of a mechanical key management system, in which a specific organisation is the only one that has the individual key that they use. Such keys are only available through their integrator, and their integrator never provides another company with the same key. “In the MAXSecure electronic access control scenario, no other company will have the reader/card combination that only that specific organisation gets from their integrator. Only their exclusive reader will be able to read their exclusive card or tag and their reader will read no other card or tag.” MAXSecure is available now with Farpointe Pyramid proximity cards and readers and Delta smart cards and readers. n

34

Farpointe moves head office to new location

Scott Lindley

Security Focus | Vol 33 No 1 2015

Farpointe Data has relocated its offices to a new larger, more modern facility located approximately 10 minutes north of its former headquarters. The new location features a larger, more proficient layout that lets Farpointe add new manufacturing equipment and increase its production and inventory capabilities. “This move is a testament to our customers,” emphasises Farpointe president Scott Lindley. “Their success has contributed to our continued growth. The move also comes as a result of our staff’s dedication. “We are proud of our proven track record of providing excellent service and performance to our customers. OEMs and integrators appreciate that we ship within 48 hours and do not demand minimums on cards or readers. This move enhances that commitment.” n


InternationalNews

Sido Muncul installs VIVOTEK camera system Sido Muncul: Safeguarding Indonesian Health Since 1940 Sido Muncul is one of Indonesia’s leading producers of Jamu (a herbal health drink), as well as a wide range of other health products. From the humble beginnings of a small household business in 1940, Sido Muncul has grown steadily to become a key provider of herbal health products while constantly striving to provide only the highest quality nutritional supplements and guaranteeing the purity of their ingredients. This is no simple task as Sido Muncul’s factory occupies a huge 34 hectare plot of land in Klepu, Semarang, in Central Java, and includes seven separate laboratories focused on instrumentation, microbiology, pharmacology, formulation, pharmacognosy, stability, and chemistry. These laboratories are all equipped with the latest tools and devices and operate to the highest standards. Further, Sido Muncul’s state-of-the-art production process adheres to extremely high standards and exceeds the good manufacturing practices (GMP) guidelines. Sido Muncul also pays great attention to product safety and, therefore, keeps strict records of the production process in order to maintain process uniformity and ensure products of a consistently high quality. The Challenge: Sido Muncul’s Old CCTV Surveillance System Had Reached Its Limits Within this context of extremely high demands

on the safety and security of the production process, Sido Muncul decided that its old system of analogue CCTV security monitoring was no longer offering high enough quality coverage and lacked an IR capability. Further, its old PC recording and viewing system was unreliable – often crashing or randomly going offline. A new video management system was also needed. In short, this high-tech operation had outgrown its previous surveillance system and required a high-tech security system to match its exacting standards. The Solution: VIVOTEK – A Natural Fit with Sido Muncul A total of 200 VIVOTEK cameras were installed across Sido Muncul’s largest plant. The high quality coverage, IR capability, and smooth operation of VIVOTEK cameras in all conditions ensured that the production process could be monitored, losses prevented, and human resources managed effectively. Further, some cameras were used to monitor any waste from the production process. VIVOTEK also supplied a brand new video management system, bringing Sido Muncul’s total surveillance system into a new era of functionality and stability. High Quality IP Cameras Secure the Integrity of the Production Process For the warehouse and factory, 150 VIVOTEK IP8332 day and night network bullet cameras were chosen for their high image quality and

versatility. Equipped with a 1-megapixel sensor enabling viewing resolution of 1280x800 at a smooth 30 fps, the IP8332 is an all-in-one camera capable of capturing high quality and high resolution video. Further, it can adapt to any lighting conditions as it features a removable IR-cut filter as well as IR illuminators effective up to 15M for superior image quality around the clock. Making this VIVOTEK camera an even more enticing choice, the extensive features of the IP8332 are provided in an economical package, meaning Sido Muncul was able to install a large number of cameras and ensure total coverage of their production process. For office spaces, IR capability was desired by Sido Muncul, and FD8134 fixed dome network cameras provided this, as well as the highest possible image quality in all lighting environments while maintaining a sleek and stylish appearance. For a camera with a 1-megapixel sensor enabling viewing resolution of 1280x800 at 30 fps, users need to look no further for an all-inone camera capable of capturing high quality, high resolution video. For outdoor areas, IP8362 2MP full HD network bullet cameras and IP7361 day and night network bullet cameras provided coverage of the huge 34 hectare grounds. The WDR feature of the IP8362 ensures startlingly clear images in all light conditions, and its IR illuminators and IR-cut filter means this image quality is provided throughout the day and night. Both cameras feature rugged housing designed to protect the integrity of the surveillance system from both the environment and any attempts to tamper with the cameras. The Latest Surveillance Solution, the Simplest Installation. Finally, this quantum leap in security and production-process surveillance at Sido Muncul’s largest plant was able to be achieved easily and quickly, thanks to VIVOTEK’s commitment to providing cameras and systems that are not only easy to install, but also simple to maintain. In fact, in moving from the old CCTV system and its reliance on extensive cabling networks, Sido Muncul’s new VIVOTEK surveillance system is actually easier to maintain, while providing astonishing advances in coverage and image management. As a result of this upgrade, Sido Muncul now boasts a surveillance system which matches its own commitment to quality, security and reliability. n

Security Focus | Vol 33 No 1 2015

35


Law&Security

Paris, unity and threats

R

By Peter Bagshawe

ecent events in Paris have highlighted the danger posed to a number of sovereign countries in Europe who are part of the European Economic Union as well as the United Kingdom, the United States and other states within the alliance that are involved in military action against the Islamic State. This action has brought responses from and against a number of organisations that include al-Qaeda in the Arabian Peninsula, Shabaab militants in Somalia and numerous cells of militants based in various European and other countries. There have been prior attacks in French cities dating back to the 1990s when the Algerian Armed Islamic Group (GIA) carried out attacks that included the bombing of a commuter train in 1995 which killed eight and injured 150, the firebombing of headquarters of Charlie Hebdo in 2011, the driving of a vehicle into a crowd of pedestrians in 2014 that injured 13 and, most recently, on 7 January 2015, two gunmen entered the offices of Charlie Hebdo (a weekly satirical French language magazine) and shot 10 members of the magazine staff and a policeman seconded to provide close quarter security to the editor. The gunmen subsequently identified as brothers Said and Cherif Kouachi killed a member of the police as they exited the building and escaped in a vehicle. They subsequently hijacked a second vehicle and evaded the police. On 8 January, the brothers robbed a service station and the following day, after a car chase, the brothers were located in a printing works in an industrial estate some 35 kilometres from Paris and surrounded by police. After a stand-off that may have involved a hostage situation, the Kouachi brothers exited the building firing at the police. Both were killed by police who returned fire. During the early morning of 8 January, a police woman and civilian were shot by a lone gunman in the south of Paris. The gunman, who was later identified as Amedy Coulibaly, entered a Jewish specialty supermarket in eastern Paris on 9 January and took a number of hostages. The supermarket was cordoned off by police and after some four hours, the police entered the kosher supermarket and Coulibaly was shot dead and 15 hostages were freed. Prior to the police action, four hostages were fatally injured by Coulibaly. During the course of the hostage situation, Coulibaly made a number of demands,

36

including the safe passage of the Kouachi brothers. The three deceased were all buried in unmarked graves at undisclosed and separate locations sometime after the events described above. Immediately following the shootings there was an outpouring of national grief combined with solidarity with the tag “je suis Charlie” becoming a prominent rallying point and vigils and marches being held. This culminated in a march estimated at some 1,6 million strong in Paris, which was attended by 40 leaders from countries including Great Britain, Germany, Israel, Palestine, Jordan, Mali and the president of the European Union. Marches also took place in various cities in France with the total number of attendees estimated in excess of 3,7 million. Marches in support of France and the stand taken by the French government were held in London, Washington, Berlin and Madrid. At around the same time, expressions of support were made by Islamic State (to whom Amedy Coulibaly indicated he was aligned) and al-Qaeda in the Arabian Peninsula who the Kouachi brother appeared aligned to and from whom one or both of the brothers was believed to have received training in Yemen, as well as protests (some of which led to fatalities) in a number of countries against the latest issue of Charlie Hebdo which (again) featured a representation of the Prophet Mohamed on its cover. The representation of the Prophet is prohibited within Islam and is, accordingly, considered a serious insult to Islam. Reaction from France and other countries has been swift in respect of actions by intelligence authorities and the deployment of state security elements on the streets of various cities in Europe. The French authorities have enacted legislation that provides for the potential loss of citizenship within prescribed circumstances. French authorities deployed 10 000 troops to protect sensitive sites, including Jewish schools and synagogues, mosques and travel hubs, while in Belgium paratroopers were deployed on a similar basis. Intelligence organisations continue to search for other members of the cell responsible for the attacks in Paris, while the funding of the cell and supply of weapons is being followed up and four men linked to Coulibaly have been arrested. In Belgium, special forces raided premises and were involved in a firefight that left two dead and a third suspect was injured and

Security Focus | Vol 33 No 1 2015

arrested. Authorities have indicated that this stopped attacks against hard targets, including police stations. Some 30 arrests have been made in France, Germany, Belgium and Ireland. Bulgaria has returned a suspect with links to French extremists to France. European Commissioners are to meet to discuss the bloc’s new counter-terrorism strategy, including changes to the region’s Schengen free travel area and intelligence cooperation within the 28 nations forming the European Union. Indications are that tightening of terror attack legislation is expected in France and Belgium with early parallels being drawn with the post September 11 Patriot Act enacted in the United States. Turning to the three shooters involved in the Paris attacks, concerns are apparent that radicalisation is prevalent, particularly within the prison system. The Kouachi brother came from a poor background and spent time in an orphanage after the death of their Algerian-born father, prior to working in various low paid jobs. Their initial exposure to Islam was followed by the radicalisation of Cherif Kouachi while imprisoned, where he met Amedy Coulibaly, who was serving a sentence for robbery. Subsequent to their respective release from prison, the two in conjunction with Said Kouachi, continued to be involved in radical circles and one of the brothers is thought to have received military-style training in Yemen. The exposure of prisoners to radical elements is a source of concern to authorities, and French authorities are considering the isolation of prisoners thought to be at risk of this exposure in prison. The free travel within the European Union is a cause for concern, and it is likely this will be tightened via the establishment of flight watch lists, while substantial additional budget has already been allocated to intelligence activities in France. Attacks against soft targets, and the impact on the various countries, have led to widespread safety concerns which include curtailment of tourism and possible visa restrictions. Sympathies must be extended to the countries involved and families of victims, as well as the survivors of the incidents. It is hoped that South Africa is not involved or suffers attacks within our very porous borders. n

PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.


associationNews

SASA condemns employee violence individuals, in terms of the industry code of conduct, as there is no place for this type of unacceptable behaviour in our industry,” adds Mr Tintinger. He concludes by saying that in a society where high levels of crime are an everyday norm, the private security industry plays a significant role in protecting private individuals,

T

Gary Tintinger

he Security Association of South Africa (SASA) has noted, with concern, an article that was published by Independent Online on Saturday 17 January 2015 (Beaten to a pulp on the beachfront, by Nondumiso Mbuyaz). According to the article, four security officers from Isidingo Security have been arrested and charged for allegedly attacking a homeless man on the Durban beachfront, to the extent that he later died as a result of his injuries. “Our Association was shocked and dismayed by this incident,” says Gary Tintinger, regional chairperson for SASA KwaZulu-Natal. “SASA condemns any act of brutality demonstrated by employees of private security companies,” he says. Mr Tintinger says SASA trusts that the South African Police Service (SAPS), who have arrested and charged four suspects in connection with this case, will thoroughly investigate the allegations up to and including the prosecution phase. “We are also certain that the Private Security Industry Regulatory Authority (PSIRA) will investigate the allegations against these four

businesses and assets. “It is sad that the actions of a few individual employees can tarnish the reputation of the industry,” says Mr Tintinger. “The private security industry offers an exceptionally valuable service in a country where private citizens do largely depend on the services of private security companies,” he concluded. n

Cosatu condemns non-compliant companies The Congress of South African Trade Unions (Cosatu), jointly with SATAWU, has released a press statement in which it states that it condemns the treatment that is given to workers employed by most of the security companies that are doing business with South Africa’s government. Cosatu says it has been informed that most of the security companies working with government are not complying with the laws of South Africa, in terms of paying workers according to the sectoral determination for security workers. “We are calling on all the security companies that are doing business with government to pay workers what is due to them and to comply with all the laws of the country now,” says Solly Phetoe, Cosatu (NW) Provincial Secretary. “Workers must be provided with relevant security protective clothes, protection during the night and proper accommodation during working hours, in particular, during the night.” Cosatu says it is calling on the Department of Labour and all government departments

to start investigations into all those security companies with how they are conducting business, to provide proof of compliance with the Private Security Industry Regulatory Authority Act, and proof of payment to employees. “We have also been informed that most of the security companies instruct workers not to join Satawu, but call on them to join flyby-night unions that are called ‘jang bass’. Almost all those workers who are employed, are threatened with dismissal when they join a union of their choice,” says Mr Phetoe. Cosatu has warned that it will take mass action against those companies that continue to flout the law, and that it will name and shame those illegal companies that are currently doing business with various government departments. “We call on all security workers to report any ill-treatment to the nearest Satawu local office or to the Cosatu locals,” he says. “Workers are advised not to keep quiet when they are treated poorly by bosses,” he concluded. n

SASA Gold members • 24/7 Security Services • 3MSouth Africa (Pty) Ltd • Access Security Systems • Afri Guard (Pty) Ltd (SSEO) • Alpha Security & Patrols • Analytical Risk Management (Pty) Ltd • Apcan Risk Management • Bidvest Magnum (Pty) Ltd • Blue Security • Bona Electronics Solutions (Pty) Ltd • Bosasa Security (Pty) Ltd • Byers & Associates Security Services CC • Callguard Security Services (Pty) Ltd • Combined Private Investigations cc • Corporate Security • DDL Security T/A 24/7 Security Services (Pty) Ltd • Digicore Electronic (Pty) Ltd • D&K Management Consultants cc

• Doculam (Pty) Ltd • E Magubane t/a Evening Flaming Trading • Elvey Security Technologies • Enforce Security Services (Pty) Ltd • FBS Security Services (Pty) Ltd • Fidelity Security Services • G4S Secure Solutions SA (Pty) Ltd • Gallagher Power Fence SA (Pty) Ltd • Grinnell Security Services • Guardforce International Transportation Limited • Icon Security Services (Pty) Ltd • iMvula Quality Protection (Africa) Pty Ltd • IP Security and Automation Systems (SLA Group) • IPSS Security Operations cc • ISASA Security Training cc • Izikathi Security (Pty) Ltd • Jackcliffy Trading CC

• LAD Security Services • Macsteel Trading (Pty) Ltd • Malandela Security Services (Pty) Ltd • Mantis Risk Solutions • Maxim Security Services (Pty) Ltd • Metro Security Services • Nationwide Security Holdings (Pty) Ltd • Omega Risk Solutions (Pty) Ltd • Peaceforce Security Group (Pty) Ltd • Protea Coin Group (Pty) Ltd • Quatro Security Services • Reagola Security and Projects cc • Red Alert TSS (Pty) Ltd • Red A Risk Consultants t/a Alpha Alert • RR24 Group Security • Saflec (Pty) Ltd • Security Patrol Experts • Securitas SA (Pty) Ltd • Securitas Specialised Services (Pty) Ltd

• Servest Security - a Division of Servest (Pty) Ltd • Sharks Protection Services • Sinuku Security (Pty) Ltd • SLA Group • Sparks & Ellis (Pty) Ltd • Stallion Security • SW Africa Fencing Construction & Civils • Symbiotix Group (Pty) Ltd • Tactical Security Services CC • Thorburn Security Solutions • Triotic Protection Services (Pty) Ltd • Tshedza Protection Services • Tyeks Security Services • Ummvemve Investments cc T/A Security-4-U • Vikela Aluvin (Pty) Ltd • X-Pert Security Services

Security Focus | Vol 33 No 1 2015

37


Indexofadvertisers

Vol 33 No 1 Advertiser

Page No.

E-mail

Website

Active Track

5

info@activetrack.co.za

www.activetrack.co.za

ADI International

29

Altech Card Solutions

27

kurtb@acs.altech.co.za

www.acs.altech.co.za

Axis Communications

OBC

sasha.bonheim@axis.com

www.axis.com/outdoor

Deggy SA

7

deggy@deggy.co.za

www.deggy.co.za

EcoRider

19

Ian@ecorider.co.za

www.ecorider.co.za

Elvey Secuirty

23,25

info@elvey.co.za

www.elvey.co.za

Fidelity Security

1

Guardtrack

6

info@guardtrack.co.za

www.guardtrack.co.za

Kit Group

1

info@kitgroup.co.za

www.kitgroup.co.za

Morpho South Africa

17

sec.san.orders@morpho.com

www.morpho.com

neaMetrics

IFC

enquiry@suprema.co.za

www.suprema.co.za

Plaslope

39

glenda.aereboe@plaslope.com

www.plaslope.com

Security Association of South Africa (SASA)

IBC

info@sasecurity.co.za

www.sasecurity.co.za

www.adiglobal.com/za

www.fidelitysecurity.co.za

Subscribe to To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: jackie@contactpub.co.za p Yes, please, I would like to subscribe to Security Focus. (Cost: R525,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide. p Enclosed please find cheque to the amount of R............................... p Please start my subscription from the..........................................issue. Do you require a tax invoice p Yes p No (If yes, one will be sent to you on receipt of your payment.)

Banking Details: First National Bank, Kloof Branch Code: 221526 Account Number: 50730011968 Account Name: Security Publications SA (Pty) Ltd

NB: Please make cheques payable to Security Publications SA (Pty) Ltd Name:....................................................................................... Signature:................................................................................................... Date:............................................Company:.................................................................. Position:................................................................. Address....................................................................................................................................................................Code:........................... Tel:..........................................................................................................Fax:................................................................................................

38

Security Focus | Vol 33 No 1 2015


Calendar

Calendar of security conferences, events and exhibitions of interest to the security industry – both local and international LOCAL EVENTS: 2015

March 7-8: Africa Hotel Security Expo and Conference. Venue: Arusha International Conference Centre, Arusha, Tanzania. More information: E-mail: hotelsecurityexpo@hospitalityafricagroup.com

May 12-14: SECUREX 2015. Venue: Gallagher Convention Centre, Midrand, Johannesburg. More information: Joshua Louw. Tel: (011) 835-1565. E-mail: joshual@specialised.com

March 11-13: AIPS 2015. 5th Almaty International Protection, Security, rescue and Fire Safety Exhibition. Venue: Atakent Exhibition Centre, Almaty, Kazakhstan. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@ite-events.com Website: www.ite-exhibitions.com

September 6-9: CAMPROSA Annual Conference. Venue: Table Bay Hotel, Cape Town. More information: John Tunstall. Tel: (028) 313-1711. E-mail: jtunstall@ iafrica.com. Website: www.camprosa.co.za

April 13-16: MIPS Moscow 2015. 21st Moscow International Protection, Security and Fire Safety Exhibition. Venue: VVC, Moscow, Russia. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@iteevents.com Website: www.ite-exhibitions.com

INTERNATIONAL EVENTS: 2015 February 3-4: TechSec Solutions Conference. Venue: Delray Beach Marriott, Delray Beach, FL 33483, US. More information: www.techsecsol.com

October 21-23: CAIPS 2015. 8th Central Asian International Protection, Security and Fire Safety Exhibition. Venue: Uzexpocentre, Tashkent, Uzbekistan. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@ite-events.com Website: www.ite-exhibitions.com

February 10-12: TB Forum 2015 – 20th International Exhibition and Forum Security and Safety Technologies. Venue: Trade and Exhibition Complex, Moscow, Russian Federation. More information: www.eng.tbforum.ru February 15-16: 6th Middle East security Conference & Exhibition. Venue: Dubai, United Arab Emirates. More information: www.asisonline.org February 23-25: SICUR – International Security, Safety & Fire Exhibition. Venue: Feria de Madrid, Spain. More information: Info IFEMA. Tel: +34 91 7223000. Fax: +34 91 7225801. Website: www.ifema.es March 3-6: SECURITY SHOW 2015. Japan’s largest Trade Fair for the Security & Safety Industry. Venue: Tokyo International Exhibition Centre, Tokyo, Japan. More information: Space Media Japan Co., Ltd. Tel: +81 3 3512 5670. Fax: +81 3 3512 5680. E-mail: tradefairs2015@smj.co.jp Website: http://messe. nikkei.co.jp/en

October 21-23: CAIPS 2015 – 8th Central Asian International Protection, Security and Fire Safety Exhibition. Venue: Uzexpocentre, Tashkent, Uzbekistan. More information: Agnius Kazlauskas. Tel: +44 207 596 5079. E-mail: security@ite-events.com. Website: www.securityshows.com

INTERNATIONAL EVENTS: 2016 February 24-27: SIPS South Russia 2016. 7th South Russian International Protection and Security Exhibition. Venue: Krasnodarexpo EC, Krasnodar, Russia. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@ite-events.com Website: www.ite-exhibitions.com

Tel: Fax: E-mail: Web:

+27 (0) 11 452-1115 +27 (0) 11 452-3609 glenda.aereboe@plaslope.com www.plaslope.com

TAMPER EVIDENT SECURITY BAGS l l l l l l

Reliable, permanent, special security closure to show evidence of tamper The closure system shows evidence of tamper by freezing, heat, aqua and solvent The bags are manufactured from high strength coextruded LDPE clear or opaque film Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available ) Bags have a unique sequential number or barcode For security purposes the bags are printed along the edge of the side seals

SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY

Under Licence to

DEBATIN Security Focus | Vol 33 No 1 2015

TM

39


Directory

SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) SASA OFFICE BEARERS

REGIONAL OFFICE BEARERS

ADMINISTRATION

Suite 147 Postnet X2, Helderkruin 1733

Gauteng: Christiaan Oelofse E-mail: coelofse@adt.co.za Cell: 082 339-3398

National Administrator: Tony Botes Cell: 083 272 1373 E-mail: info@sasecurity.co.za Fax: 0866 709 209

National President: Costa Diavastos Cell: 082 498-4749 E-mail: costa.diavastos@za.g4s.com National Chairman: Chris Laubscher Cell: 082 441-4092 E-mail: chrisl@bidvestmagnum.co.za National Deputy Chairman: Marchel Coetzee Cell: 084 440-0087 E-mail: marchel_coetzee@omegasol.com

KwaZulu-Natal: Gary Tintinger E-mail: garyt@enforce.co.za Cell: 084 429 4245 Western Cape: Koos van Rooyen E-mail: kvanrooyen@thorburn.co.za Cell: 082 891-2351

Accounts: Yolandi Evans Cell: 061 470-8736 E-mail: accounts@sasecurity.co.za Fax: 0862 124 142

OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA — Private Security Industry Regulatory Authority, Eco Park, Centurion. Tel: (012) 003 0500/1. Independent Hotline: 0800 220 918. E-mail: info@psira. co.za Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vicechairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member). APPISA – Association for Professional Private Investigators SA, Box 8064, Minnebron 1549. Cell: 073 371-7854 or 072 367-8207. Fax: 086 689-0166. E-mail: info@appelcryn.co.za. Website: www.appelcryn.co.za. President: Ken Appelcryn. Secretary: Dianne. ASIS International — Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060. Tel: (011) 652-2569. Website: http://www.asis155jhb.webs.com/ President/ Chairperson: Johan Hurter. Secretary: Chris Cray. ASIS International — Chapter 203: Cape Town – South African security professionals. President/Chairman: Yann A Mouret, CPP. Secretary: Eva Nolle. Tel: (021) 785-7093. Fax: (021) 785-5089. E-mail: info@aepn. co.za. Website: www.asis203.org.za bac — Business Against Crime, Box 784061, Sandton 2146. Chairman: James Fitzgerald. Tel: (011) 8830717. Fax: (011) 883-1679. E-mail: denise@bac.org. za. Eastern Cape: Box 40078, Walmer 6065. Tel: (041) 373-6401. Fax: (041) 373-6402. E-mail: info@bacec. co.za. Western Cape: 12th Floor Picbel Arcade, Strand Street. Tel: (021) 419-2044. Fax: (021) 419-2066. E-mail: jackie@bacwcape.co.za KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001. Tel: (031) 207-8273. Fax: (031) 207-3900. Provincial manager: Jody Nair, e-mail jody@backzn.co.za Mpumalanga: Box 430, White River 1240. Tel: David Pretorius (general manager) (013) 751-3188. Fax: (013) 744-3555. Cell: 083 2735515. E-mail: david@bac_mp.co.za; or Ed Coombes (chairperson) 082 807-3916, fax (013) 752-6002, e-mail: ed.coombes@worldonline.co.za. North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300; Charles Kendall (managing director) tel/fax: (014) 5923591, e-mail: charles.kendall@lonplats.com. Limpopo: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. Free State: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. CAMPROSA — Campus Protection Society of Southern Africa. President: Roland September. Tel: (021) 650-4858. E-mail: roland.september@uct.ac.za. Vice President: Derek Huebsch. Tel: (041) 504 2490. E-mail: derek. huebsch@nmmu.ac.za. Executive Secretary: John Tunstall. Tel: (028) 313 1711. E-mail: jtunstall@iafrica.com. Web: www.camprosa.co.za. CENSEC — Centre for the Study of Economic Crime. Director: Louis de Koker. Tel: (011) 489-2134. E-mail: ldekoker@uj.ac.za CISA — Cape Insurance Surveyors Association. Shahid Sonday (021) 402-8196. Fax: (021) 419-1844. E-mail: shahid.sonday@saeagle.co.za; or Mike Genard (021) 557-8414. E-mail: mikeg@yebo.co.za DRA — Disaster Recovery Association of Southern Africa, Box 405, Saxonwold 2132. Chairman: Grahame Wright, Tel. (011) 486-0677, Fax (011) 646-5587. Secretary/ Treasurer: Charles Lourens, Tel. (011) 639-2346, Fax (011) 834-6881. EFCMA — Electric Fencing and Components Manufacturers Association, Box 411164, Craighall 2024. Tel: (011) 326- 4157. Fax: (011) 493-6835. Chairperson: Cliff Cawood 083 744-

40

2159. Deputy chairperson: John Mostert 082 444-9759. Secretary: Andre Botha 083 680-8574. ESDA — Electronic Security Distributors Association, Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. President/Chairman: Des Whittal. Secretary: Shirley James. Website: www.esda.org.za ESIA — Electronic Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Fax: 086 570 8837. Cell: 082 773-9308. E-mail: sia@iburst.co.za or steveconradie@iburst.co.za. Web: www.securityalliance. co.za FDIA — Fire Detection Installers Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: 087 808 7527. Fax: 086 518 4376. E-mail: fdia@fdia.co.za. Website: www.fdia.co.za President/Chairperson: Matt Kielty. Secretary: Jolene van der Westhuizen. FFETA — The Fire Fighting Equipment Traders Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374/ (011) 455-4126. E-mail: ffeta@tiscali.co.za. Website: www.ffeta.co.za. Chairperson: Astrid Wright. Vicechairperson: Meshack Gabeni. FPASA — Fire Protection Association of Southern Africa, Box 15467, Impala Park 1472. Tel: (011) 397-1618. Fax: (011) 397-1160. E-mail: library@fpasa.co.za. Web: www.fpasa.co.za. General Manager: David Poxon. GFA—Gate&FenceAssociation,Box1338,Johannesburg 2000. Tel: (011) 298-9400. Fax: (011) 838-1522. Administrator: Theresa Botha. HCSA — Hotel & Casino Security Association, Box 91728, Auckland Park 2006. Chairman: Dick Glanville, Tel: (011) 447-2700, Fax: (011) 447-3276. Vice-chairman: Frans Joubert, Tel: (011) 898-7333. Secretary/Treasurer: Graham Bendell, Tel (011) 728-4405; Cell 082 699-2392. HSA — Helderberg Security Association, Box 12857, N1 City Parow 7463. Tel: (021) 511-5109. Fax: (021) 511-5277. E-mail: info@command.co.za. Website: www. command.co.za. Chairperson: Stephen van Diggele. IFE — Institution of Fire Engineers (SA). Treasurer: A.E. Greig, Box 1033, Houghton 2041. Tel/Fax: (011) 7884329. E-mail: adminstaff@ife.org.za Website: www.ife. org.za. President: John Khoza Mpiyakhe. Secretary: Lindi Mujugira. ISA — Insurance Surveyors Association, Box 405, Saxonwold 2132. Chairman: Graham Wright (011) 4860677. Vice-chairman: Alan Ventress. Secretary: Alex dos Santos. LASA — Locksmiths Association of South Africa, Box 4007, Randburg 2125. Tel: (011) 782-1404 Fax: (011) 782-3699. E-mail: lasa@global.co.za Website: www.lasa. co.za President/Chairman: Alan Jurrius. Secretary: Dora Ryan. NaFETI — National Firearms Education and Training Institute, Box 181067, Dalbridge 4014. Chairman: M.S. Mitten. Vice: Ken Rightford (033) 345-1669. Cell: 084 659-1142. NaFTA — The National Firearms Training Association of SA, Box 8723, Edenglen 1613. National Chairman: Peter Bagshawe.Tel: (011) 979-1200. Fax: (011) 979-1816. E-mail: nafta@lantic.net POLSA — Policing Association of Southern Africa. Tel: (012) 429-6003. Fax: (012) 429-6609. Chairperson: Anusha Govender, 082 655-8759. PSSPF — Private Security Sector Provident Fund. Contact: Jackson Simon. Cell: 072 356 6358. E-mail: jackson@psspfund.co.za. Website: www.psspfund.co.za SAESI — Southern African Emergency Services

Security Focus | Vol 33 No 1 2015

Institute, Box 613, Krugersdorp 1740. Tel: (011) 6605672. Fax: (011) 660-1887. President: DN Naidoo. Secretary: Mrs S.G. Moolman. E-mail:saesi@mweb. co.za SAIA — South African Insurance Association, Box 30619, Braamfontein 2017. Chief Executive: B. Scott. Tel: (011) 726-5381. Fax: (011) 726-5351. E-mail: faith@saia.co.za SAIDSA — South African Intruder Detection Services Association, Association House, P O Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. E-mail: saidsa@mweb.co.za Website: www.saidsa.co.za President/Chairman: Johan Booysen. Secretary: Cheryl Ogle. SAIS — South African Institute of Security, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157 or 0861 111 418. Fax: 086 518 4374/ (011) 455-4126. E-mail: SAIS@tiscali.co.za. Website: www.instituteofsecurity.co.za. Chairman: David Dodge. Vice-chairman: Mike Verster. Administrative Manager: Rosemary Cowan. SAN — Security Association of Namibia, Box 1926, Windhoek, Namibia. Administrator: André van Zyl. Tel: +264 61 205 2264. Fax: +264 61 205 2350. E-mail: pagvz@nampower.com.na SANSEA — South African National Security Employers’ Association, Box 9553, Edenglen 1613. Administrators: SIA, Box 62346, Marshalltown 2107. Tel: (011) 498-7468. Fax: (011) 498-7287. E-mail: sia@iburst.co.za. SAPFED — Southern African Polygraph Federation. President: Ben Lombaard 083 793-1152. Secretary: Amelia Griesel 082 786-3347. E-mail: info@sapfed.org. Website: www.sapfed.org SAQCC FIRE — South African Qualification Certification Committee, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374. E-mail: saqccfire@tiscali.co.za. Website: www.saqccfire. co.za Management Committee: Chairman: Brett Jones. Vice-Chairman: Duncan Boyes. SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer. Vice-Chairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty. Vice-Chairperson: Laura Swart. SARPA — South African Revenue Protection Association, Box 868, Ferndale 2160. Tel: (011) 7891384. Fax: (011) 789-1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co. SDOA — Service Dog Operators Association, Box 49554, Hercules 0030. Tel: (012) 376-2152/3. Fax: (012) 376-2359. E-mail: company@ppscanine.co.za Chairperson: Mr F. van Kraayenburg. Tel: (012) 376-2266. SIA — Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Chief Executive Officer: Steve Conradie. Website: www.securityalliance. co.za SKZNSA—SouthernKwaZulu-NatalSecurityAssociation. Tel: (039) 315-7448. Fax: (039) 315-7324. Chairman: Anton Verster – 082 371-0820. VESA — Vehicle Security Association of South Africa, Box 1468, Halfway House 1685. Tel: (011) 3153588/3655. Fax: (011) 315-3617. General Manager: Niresh Reddy. VIPPASA — VIP Protection Association of SA, Box 41669, Craighall 2024. Tel: 082 749-0063. Fax: 086 625-1192. E-mail: info@vippasa.co.za. Website: www.vippasa.co.za. Enquiries: Chris Rootman. Cell: 082 749 0063.E-mail: vippasa@protectour.co.za




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.