Contents page SERVING THE SOUTH AFRICAN SECURITY INDUSTRY FOR 33 YEARS
Cover Story
The tried and trusted source of information you can use
Features 10 Special Feature: Access Control
The case for biometrics seems like the perfect solution for those weary of remembering countless passwords. But, are biometrics really a secure solution? An expert panel argue the case for and against in this special feature.
20 Security in Action
Michaelhouse is well prepared for any unexpected incidents; and TeleEye protects Google-backed SA solar farm.
25 Vehicle Security Update
Hijacking, says Jerry Pierce of Cartrack, is costing the economy and insurance industry billions.
26 Cyber Security Update
Shailendra Singh, business director for Wipro Ltd Africa, says cyber security should be a top priority for CIOs.
8 Elvey on the road once again In a continued effort to extend its reach to its
customers, both current and future, Elvey is hosting its second year of Elvey Expos in 2015.
20
14
Security Focus
Advertising enquiries:
is published by the proprietor Security Publications S.A. (Pty) Ltd (Reg No. 1982/006233/07)
Tel: (031) 764-6977 Fax: (031) 764-6974 e-mail: contact@secpub.co.za Publisher: Godfrey King Editor: Andrea M端ller Production Leader: Colleen McCann Official Journal of the Security Association of South Africa
Layout & Design: Beth Marchand Subscriptions: Jackie Goosen
Bernadette Fenton
Cell: 082 443 8931. Fax: (031) 764-6974 e-mail: bernadette@secpub.co.za
VOL 33 NO 5 2015
ISSN 1022 6427
22 28 Business Against Crime
Regulars
4 Comment
Integration, quality and trust.
6 News
• Which country has the largest security industry? • PSSPF launches compliance drive. • Physical security market global growth.
19 Industry Opinion
Kalvin Subbadu, sales manager components for WD South Africa, says using just any hard drive in a DVR can cause catastrophic consequences.
22 Company News `
25
• Strategic partnership announced for South Africa. • New appointments at Cash Connect. • Cameras ensure 45% accident reduction. • New appointment at Centurion Systems.
In this issue the chapter on “Establishing Policy for Dealing with White Collar Crime” from the book, Dealing with White Collar Crime, has been published to give readers an idea of the important information available to them.
32 International News
• Hikvision releases iVMS-5200 professional software. • Sports stadium gets the Panomera treatment. • Hikvision introduces all-in-one NVR. • Comelet to showcase “Mini” at IFSEC 2015. • Big future for Milestone’s smallest NVR. • Intrusion detector a game changer. • Iconic HK cruise terminal deploys AMG. • ASSA ABLOY acquires Teamware Malaysia.
37 Law & Security
Xenophobia and its impact.
38 39 40
Index of Advertisers Calendar Directory
28 Head Office physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610 Postal address: P.O. Box 414, Kloof 3640, South Africa Publication details: Security Focus is published monthly Printed by: Paarl Media KZN, 52 Mahogany Road, Westmead. www.paarlmedia.co.za
www.twitter.com/SecurityFocusza
Subscription rates: Annual subscription for magazine posted in Republic of South Africa is R525 including VAT and postage. Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640. Editorial contributions: Editorial contributions are welcome. For details please contact the Editor, Security Focus, on Tel: (031) 764-6977, or Fax: (031) 764-6974, or write to the editorial office address detailed elsewhere in this column.
36
Security Focus is a member of
editors comment
Integration, quality and trust
T
hese are the three most important factors taken into consideration for surveillance investment decisions. However they might be true of all security purchasing decisions as well. With no shortage of industry exhibitions and product showcases taking place this May, industry trend-watchers are eager to see what the industry manufacturers will have on offer this year, and if there have been any significant developments that may impact on how organisations purchase their security systems.
This month’s access control and biometrics feature reveals that despite the significant global growth of the biometrics market, some are still concerned about privacy and security safety. This, is despite the now legally bound parameters that exist now that the Protection of Personal Information (PoPI) Act was signed into law. Another aspect of physical security that is never short of exciting changes, acquisitions and partnerships, is the surveillance market. The global CCTV and surveillance market has undergone three significant paradigm shifts over the past two decades. This is according to the IFSEC Global Video Surveillance White Paper: Market Trends and Expectations (www. ifsecglobal.com). These significant, market-impacting changes include the migration from analogue to IP, a quantum leap in image quality and latency, and a change in how surveillance cameras are being used by organisations. To put this industry paper together, IFSEC Global surveyed security professionals in a wide range of roles and seniority with 80 percent either owning their business or being a key decisionmaker. Here in South Africa we have also seen that surveillance solution providers, who have been able to demonstrate the additional benefits of an integrated surveillance system, are experiencing more growth as client procurement managers overcome the age old security grudge-purchase mentality. The IFSEC Global Research shows that South Africa is somewhat in line with global trends. Apparently the emergence of analytics technology is motivating procurement managers to invest more into surveillance technology. According to the paper’s research findings, video analytics software has been shown to streamline security management while
also cutting staffing costs. In addition, the ability to track and act on various incidents, as well as track employee and consumer behaviour – have all done their part to make the case for surveillance technology. IFSEC Global asserts that analytics software can bring tangible benefits to both sides of an organisation’s balance sheet: revenues as well as costs. Though still a nascent market, the latest survey reveals a significant uptake and enthusiasm for using video analytics to glean, and act upon, business intelligence. In fact, 18 percent of the survey respondents said that they were already using analytics, while an additional 52 percent said that they have plans to do so. Other significant surveillance market findings included: • 36 per cent of respondents have end-toend surveillance solutions – encompassing cameras, NVR/DVR/VMS and network equipment – by a single manufacturer. That left a significant majority (64 percent) with components from more than one brand. • One in five respondents said that their biggest concern regarding their surveillance system was the risk of the manufacturer going bust and no longer supporting software updates. • 65 per cent of CCTV operators/decision makers have HD or full HD resolution cameras. • 45 per cent of organisations use a combination of analogue and IP cameras. When the other 58 percent were asked why they still used analogue, the responses were as follows: A reluctance to rip out perfectly good cabling and other infrastructure (38 per cent), being unable to afford to upgrade (37 per cent) and an endorsement of the adage ‘if it ain’t broke, don’t fix it!’ (35 percent). Image quality, a reliable trusted brand, and easy integration with existing infrastructure are, apparently, the three most important factors in choosing a surveillance system. Andrea Müller Editor andrea@writescene.co.za
Editorial Policy Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services. It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.
4
Security Focus | Vol 33 No 5 2015
anytime anywhere
NOT ONLY A GUARD MONITORING SYSTEM • The Active Track device is efficient in tracking personnel via GPS. • It is a reliable tool for monitoring a sales team, fleet of vehicles or drivers on the road. • Generates a GPS position to identify clients and track sales personnel via Google Maps. • Door to door movements can be viewed and monitored via Google Maps. • The system has the capability to record the duration of time a sales person is at a client and your driver is on the road. • An alarm can be generated for ‘New Client’, ‘Training’, ‘Routine Visit’ etc, via RFID tags. • Please Call Me button for easy communication access to sales person or driver. • Panic button if sales person or driver is in distress. Tel: 011 551 1687 Fax: 086 218 2928 Twitter: @ActiveTrackRSA www.activetrack.co.za Terms and Conditions Apply
NEWS
Which country has the largest security industry? Makgale, told Africa Check that he believed her comments had been based on a report compiled by the Private Security Industry Regulatory Authority (PSIRA). Mr Makgale said he was “speaking to PSIRA about the report and if we can access it.” So far, no response has been forthcoming. Mr Mthethwa is now the Minister of Arts and Culture. Questions sent to his office went unanswered.
W
hile you may have guessed South Africa holds the title for largest security industry in the world, new research by Kate Wilkinson for Africa check, suggests that while South Africa does rank highly, it still does not bag the top spot. South Africa’s suburbs and business are wired with alarms and surrounded by high walls, barbed wire, electric fences and motion sensors. Big dogs with big teeth bark at strangers from behind steel gates. Guntoting private security guards patrol the streets. The high levels of security are the first thing that many visitors to the country remark on. But, does South Africa really have the largest private security industry in the world as is so often claimed in dinner table
conversation? Some of the country’s politicians and police officials seem to think so. Last year, the national police commissioner, Riah Phiyega, made the claim during the release of police crime statistics. And three years ago, the then police minister, Nathi Mthethwa, used the claim to justify the need for the Private Security Industry Regulation Amendment Bill. Africa Check took a look at the evidence.
Boots on the ground According to a PSIRA document compiled for a 2013 workshop on guarding and security, the South African private security industry is “considered one of the largest in the world”. A spokesman for the organisation, Mpho Mofikoe, said their most recent research did not show that South Africa had the largest security industry in the world. PSIRA’s 2013/14 annual report shows that out of 1 868 398 registered security officers in South Africa, 487 058 were classified as active. This includes people employed in security, active guarding, cash-in-transit and armed response businesses. By comparison, the South African Police Service employs 194 852 people. There are 103 746 people employed in visible policing and 6 331 people are employed in protection and security services.
Unsubstantiated claims First stop, Musa Zondi – the spokesman for the current Minister of Police – was little help. “I can’t answer what the source of data for the previous minister was,” he told Africa Check. Phiyega’s spokesman, Solomon
Comparisons are tricky The most recent and comprehensive international comparison of the private security industry was conducted in 2011 by the Small Arms Survey, an independent research project located at the Graduate Institute of International and Development
PSSPF launches compliance drive The Private Security Sector Provident Fund (PSSPF) has officially launched a nationwide compliance campaign aimed at achieving compliance in the private security sector. The PSSPF announced at a media briefing held on 29 April 2015 its initiatives of pursuing legal action against those employers with serious transgressions in honouring their legal obligation of contributing towards their employees’ retirement.
6
According to the PSSPF, these employers continue to defraud their employees by deducting retirement contributions from their salaries and not paying it over to the provident fund. Shareholders, directors, members in a cc, partners and trustees of a company operating in the private security sector will now be held personally liable for payments to the fund and failure to do so could lead to imprisonment or
Security Focus | Vol 33 No 5 2015
fines of up to R10-million. Further details of the PSSPF compliance drive will follow in the next issue of Security Focus. n
NEWS
Physical security market global growth A review by Security Focus of a range of industry surveys has produced some interesting results
Video surveillance products’ share of this was 53 per cent at $13,48 billion, access control 23 per cent at $5,62 billion, and intruder alarms 24 per cent at $6,18 billion. Access control and video surveillance are Combined product sales grew by 7,5 per driving the physical security market forward, cent in 2014. The growth of video surveillance according to the independent international was 9,9 per cent. Access control grew by 10 research and consultancy provider Memoori, per cent and could become Number One which found that the total world production in the growth market as it moves into IP value of security products at factory gate network systems and biometric and identity prices totalled $25,28 billion dollars in 2014. management systems
Studies in Geneva, Switzerland. The 2011 study contains data on the private security industries in 70 countries around the world. Nicolas Florquin, principal author of the study, told Africa Check that comparing the relative sizes of private security industries in various different countries wasn’t a straightforward exercise. “Generally speaking, data on [private security company] personnel is full of caveats and [it’s] difficult to compare country to country due to varying reporting practices”. Darren Olivier, a senior correspondent for the African Defence Review, echoed these sentiments. “International comparisons are tricky both because not all countries accurately track the data and those that do often have varying criteria for what types of jobs are grouped into the category,” he explained. Absolute number versus ratios Despite these limitations, the Small Arms Survey’s 2011 study provides some interesting insights. India is the country with the largest private security industry. Seven million people are employed by security companies there. China comes second with five-million, Russia next with 800 000 and then Brazil 000), Japan (459 305) and Mexico (570 (450 000). South Africa is seventh on the list with 387 273 security personnel in 2011. (PSIRA’s latest annual report shows that the figure now stands at 487 058.) But, Mr Olivier told Africa Check that absolute numbers were not useful for comparative purposes because they reveal little about the impact on the country. “For example, one million private security guards in India would be miniscule. The same
number in Swaziland would be notable. So ratios ... are probably the only useful method of comparison,” he explained. Comparing numbers of security guards to police The 2011 Small Arms Survey provides ratios for the number of private security personnel per 100 000 people in the country and the number of private security personnel compared to police. In relation to South Africa’s population, there were 806 private security personnel for every 100 000 people. This placed it fourth in the rankings behind Guatemala (944), Panama (928) and Honduras (870). This ratio takes a country’s population size into account and allows private security industries to be fairly compared. The rankings showed that South Africa had 2,57 private security personnel for every police employee. This placed South Africa in fourth place behind Guatemala (6,01), India (4,98) and Honduras (4,88). Mr Olivier believes this is the most useful measure of a country’s security industry: “It determines to what extent a country’s security is in the hands of private security as opposed to state security forces.” Conclusion – The claim is false Both former Minister Mthethwa and Phiyega failed to provide evidence to support their claims. While South Africa certainly has one of the largest private security industries in the world, the most comprehensive survey to date of the global private security industry does not support the claim. South Africa employs more private security personnel than police. But it doesn’t top any
Meanwhile, Asia remains the fastest growing market in the world, according to a report from IHS Inc. There is a strong focus on video surveillance, particularly in China with revenue often coming through large, government-funded schemes or projects. While, globally, the United States remains the largest country regarding revenue spend, China is getting closer to the Number One ranking each year. n
of the international rankings when it comes to the size of its private security industry. In both absolute numbers and ratios other countries fare much higher. n This article was first published by Africa Check, a non-profit factchecking organisation (@AfricaCheck) and edited for Security Focus.
On Line/Live Units Radio or GPRS up to 4 Patrols per unit
Historical Systems For Single / Multiple Site Application No wiring required on site For more information Please visit www.guardtrack.co.za or contact Dane/Brad Tel: 011-784 3803/4 Fax: 011-784 3805 email: info@guardtrack.co.za
Security Focus | Vol 33 No 5 2015
7
Cover story
Elvey on the road once
Elvey Security Technologies, established in 1946, is proud to be one of the leading distributors of electronic security equipment in Africa. The company has more than 20 branches in South Africa and its distribution network extends to other African countries such as Botswana and Namibia.
I
n a continued effort to extend its reach to its customers, both current and future, Elvey will be hosting its second Elvey Expos in 2015. The expos will be taking place in: • Port Elizabeth 12 - 13 May at Nelson Mandela Bay Presidential Suite. • Cape Town 19 – 20 May at Green Point Stadium Business Lounge. • Durban 26 – 27 May at Moses Mabhida Mixed Zone. • Johannesburg 2 – 3 June at the FNB Stadium Presidential Suite. Elvey will be exhibiting an array of electronic security solutions from its extensive and diverse quality product range. The show will cover intruder detection, CCTV, Internet Protocol (IP) surveillance, integration solutions, access control and fire detection. The expos will provide a platform in which visitors can experience all the latest cutting-edge quality electronic security equipment in one place. This offers visitors the distinctive chance to look at innovative security solutions. With highly knowledgeable personnel and premium quality products in one venue, an opportunity opens up for guests to discuss tailormade solutions to suit their unique needs in a timely manner.
Intruder Detection
One of the most important components of a comprehensive security system today is advanced intruder detection.
8
Elvey Security Technologies provides an extensive range of systems designed to detect and deter intruders from that critical first moment when security is either breached or threatened. In mid-2014, Elvey Security Technologies became the exclusive distributor of RISCO Group’s full range of products in South Africa. Elvey chief executive officer Jack Edery says the decision to bring RISCO on board offers both parties an opportunity for growth and increased customer centricity. RISCO Group chairperson Moshe Alkelai adds that the agreement between both parties will allow the group to reach their target customers and complement its aim to constantly provide customers with cutting-edge technology, personalised service and customer support that is consistent with the RISCO brand.
CCTV and IP Surveillance
The use of CCTV and IP surveillance has not only become a globally accepted and recognised deterrent to crime, but the use of these solutions as a means to aid in criminal identification and legal proceedings, is gaining momentum worldwide as well. Elvey is well positioned to offer its customers and their clients a wellrounded and comprehensive approach to CCTV and IP installations by bringing together technical expertise and domain knowledge of the security industry, with proven methods and a comprehensive range of analogue, digital, and IP (Internet Protocol) equipment. The company’s innovative security solutions include fixed cameras, domes, DVRs, NVRs, monitors and the most advanced software available. Integration is also a strong area in which the company operates. Elvey’s high-tech range of video solutions effortlessly combines globally-acclaimed technology with easy installation. In an effort to further strengthen its offering, Elvey has introduced HeiTel to its CCTV product portfolio. HeiTel’s core competence is with the remote transmission and digital recording of
Security Focus | Vol 33 No 5 2015
again
CCTV systems. Using intelligent video receiving concepts and with data protection rights at the forefront of its system design, HeiTel offers transmission and recording right up to multimegapixel quality. HeiTel essentially offers a complete solution concept rather than a single product solution.
Access Control
Elvey provides a wide range of access control technology for the most extensive range of applications. From time and attendance to monitoring solutions, integrated or stand-alone. The company recently welcomed Suprema’s range of biometric security technology to its access control range. During the month of March 2015, Elvey and Suprema went on the road throughout the country to showcase an incredible product offering which included access control devices, time and attendance systems and USB fingerprint scanners. This addition of Suprema to the business is consistent with Elvey’s drive to continuously supply the market with innovative quality security solutions from trusted world-class brands.
Fire Detection
Through its strategic relationships with the world’s leading manufacturers, Elvey is able to provide a wide range of stateof-the-art technologies that mitigate the unwanted effects of fire. These products include conventional, as well as addressable, control panels, detectors and accessories. Elvey Security Technologies has recently added Tyco’s FireClass to its range of security products. FireClass is a revolutionary new class of fire detection products designed to appeal to both the end-user and installer, and is an easy to install, digital open-protocol solution. Elvey looks forward to welcoming and sharing its journey into the future with you. n For more information contact info@elvey.co.za or 011 401 6700
SpecialFeature:Accesscontrol
Will biometrics eventually render passwords obsolete?
T
he case for biometrics seems like the perfect solution for those weary of remembering countless passwords. But, are biometrics really a secure solution? An expert panel argue the case for and against.
Angela Sasse, professor at Universty College London and director of the UK Research Institute in Science of Cyber Security People are fed up with battling to remember dozens of passwords. Entering them several times a day on various devices disrupts users’ flow and wastes time. Employers and service providers have started to realise this and are offering alternatives in the form of sensors and biometrics. Fingerprint biometrics have been available on mobile phones for a while, but the addition of Apple’s Touch ID marks a point of no return in the second coming of biometrics. While some security experts may be concerned about the use of fingerprints on their own, for customers it is a welcome escape from the struggle with passwords and the widely disliked two-factor authentification banks inflict on them. Ramesh Kesanupalli, founder of Nok Nok Labs and vice-president of Fido Alliance, an industry body that seeks to standardise authentication methods beyond passwords We are at an inflexion point where biometrics are ready for consumerscale adoption both from quality and cost standpoints. You will see more and more Fido-enabled services in the field in the next 18 to 24 months. However, for a considerable amount of time, passwords will still be there as a recovery process. You will see Fido not only addressing the business pain, but also addressing the user pain. Each one of us has 20-25 accounts. We all use two or three passwords. Every one of us is accessing our e-mails and financial accounts using cellphones, where
10
Security Focus | Vol 33 No 5 2015
typing user names and passwords is not much fun. The server-side hacking to harvest accounts is a major problem. There will not be any server-side global attacks possible if you deploy Fido. There is no single type of authenticating solution that is going to be Number One in the market. There is going to be a heterogeneous environment. Fido alliance brings all of them together. Dr Stevn Murdoch, principal research fellow, University College London, and security architect at the Vasco Innovation Centre, Cambridge Biometrics show promise, but only as part of an authentication solution which optimises security, privacy and convenience. Biometrics let you authenticate without noticing you’re doing so, but this strength can also be its weakness. Your biometrics are continually exposed: your fingerprint to everything you touch or your face to every camera; and your biometrics can’t be changed (whether they’ve been compromised or for privacy). You can have a different password for each service and change them when compromised, giving control of who you authenticate to. We need to ensure that authentication solutions accept only biometrics shown by a real person (not recorded ones), that individuals can choose who they authenticate to and for what, and that everyone’s privacy is protected. Starbug, security researcher at Telekom Innovation Laboratories, Berlin, showed how to hack Apple’s fingerprint sensor in 2013 It seems with Apple introducing fingerprint to their iPhone and the integration of face and iris recognition into Windows 10, the triumph of biometrics cannot be stopped. And, for most users, it’s better to use those features than weak or no passwords. But, you have to keep in mind
SpecialFeature:Accesscontrol
that biometric systems are not that much more secure than long passwords and if your biometric feature is stolen or lost, you can’t get a new one. You leave biometric traces on things you touch and show your features in public. n This article was first published by The Guardian (13 April 2015 by Nic Sultana (www.theguardian.com) and edited for Security Focus.
Opinion Piece
Biometric underlines real-time accurate and effective security In today’s market, the protection of resources is paramount. All assets in business and government have to be secured and carefully regulated – which explains why robust, multi-functional technology solutions have become more relevant and sought-after, particularly biometric-based infrastructure. This is according to Guenter Nerlich, managing director, AWM360 Data Systems. It is fortunate for businesses and those who communicate in sensitive, influential environments (for example, government), that security technology has largely evolved with the times. Today, the space is defined by unified communications and mobility to streamline processes and ensure two fundamental requisites for the market: the ability to accurately source and manage information in real-time and the means to analyse data to help with security strategies. From a cyber security point of view, many businesses are susceptible to a range of threats that continue to grow in sophistication and proliferation. The days of relying solely on standard virus detection and prevention are long gone – now, because of the advent of mobile applications, of the Internet and social media, the threats are continuous and multiplying. Today, there is more emphasis on threat detection and data analysis to understand threats better and where the weak points are in an organisation, and then mount as effective a defence as possible. This is essential given the escalation in cyber attacks and the variety of threats including malware, spyware, phising and the like, all perpetrated from a number of sources, from hackers to cyberterrorists. Security is no longer a matter of gaining access to data and manipulating this information, the methodology has evolved, the techniques are more sophisticated and the end results significantly more serious than simply defacing a website, for example. When it comes to physical security, biometric technology has made a name for itself in the area of access control. It is an area dominated by fingerprint-based infrastructure, such as readers, that are used together to “read” fingerprints and accurately assess all the contours that define individual fingerprints. Biometric systems now facilitate automated, real-time data capture and storage to help streamline Continued on page 13
SpecialFeature:Accesscontrol
Active Track: an all-in-one employee monitoring solution When it comes to seamlessly integrated access control, staff monitoring or even time and attendance solutions, look no further than Active Track. With its extensive capabilities and unique combination of technologies, this is the ideal employee management tool for any industry and all work environments. With Active Track, employers can track and monitor the movements of their employees, security personnel, sales representatives, company drivers and more. Active Track provides a solution to help management effectively monitor and manage employee attendance from any online local or remote location. Using a simple, but robust handheld communications device in combination with the Active View web-based software, Active Track provides a clear two-way communication tool with a complete reporting system. Active Track is comprised of multiple technologies, including RFID, GPS, GPRS and GSM, all driven by the web interface software solution, Active View. Active Track provides the ability to stay in contact with employees, even in the most remote locations. Providing all the functionality
12
and advantages of a smart phone, the system is reliant on network coverage. The Active Track system operates on the GSM network to transmit data from various sites. It also provides a significant cost saving in terms of cellphone communication costs, as employees do not require a mobile phone to remain in contact with head office or management. The Active Track device can be called and the call is automatically answered, but the call cannot be ended by the end-user. It can also be programmed to make calls to a designated number if required. In addition to managing employee performance and productivity, Active Track solves the problem of monitoring employees working from remote locations with its extensive capabilities and unique combination of technologies. For employees that are required on the road, the GPS (Global Positioning System), a space-based satellite navigation system, provides an efficient monitoring tool by generating a GPS position to identify the location of employees (drivers, reps) and vehicles via Google Maps. The duration that employees spend at
Security Focus | Vol 33 No 5 2015
various locations is recoded via the device’s RFID (Radio Frequency Identification) technology tags. Active Track can also generate new alarms for various functionalities. The device includes a “Please Call Me” button for easy communication access to the driver, as well as a panic button if the employee is in duress. For those remote applications, where time and attendance is a must, but biometric solutions are not possible, Active Track’s scan and report RFID technology provides the answer. Active View is the web-based software that allows for ease of access wherever there is Internet connectivity. Active View essentially provides the platform for monitoring and generates all alarm conditions via e-mail and SMS. The reporting system provides a complete business intelligence tool that monitors movements, productivity and provides accountability in terms of reporting back to clients. With Active Track, you get a complete empowerment tool that supervises and manages employee activities in real-time so you can provide clients with complete accountability and quality service. n
SpecialFeature:Accesscontrol
Biometric underlines real-time accurate and effective security Continued from page 11 traditional processes involved in access control. The value of these systems is that there is now more accuracy being brought into the whole access control procedure. Important information, such as personal IDs, vehicle information (number plates, make and models) can be captured in real-time, digitally, to avoid having unnecessary manual interface. Aside from the safety aspect, there is also the benefit of more streamlined, efficient operations – which is better for both the company, security personnel and visitors. And, access control not only applies to people visiting a company – the principle is just as important for businesses to regulate access to sensitive areas internally. Staff have to know where they are permitted and where they are not. Biometric-based technology has also found application in the business discipline of time and attendance. Today, all sized companies can accurately and quickly measure employee time and attendance, eliminate fraud (such as “buddy clocking”) and better control resources, and do so without stretching budget to breaking point. In a market in which resources are increasingly becoming scarce, out of reach or non-existent, security solutions that help to protect and strengthen makes sense. n
Guenter Nerlich
SpecialFeature:Accesscontrol
Top installer questions from Paxton Since its launch in South Africa last year, the Paxton Group, a global designer and manufacturer of electronic access control and door entry systems, has trained nearly 600 installers from more than 300 companies on the Certified Paxton Installer Programme, a free access control workshop. The workshop aims to provide the expertise and skills to install Paxton products confidently and correctly first time. For installers this means less time on site, increasing the profit, and greater customer satisfaction as the workplace experiences less disruption with highly-trained installers. As well as focusing on educating the installer, Paxton has also learnt a thing or two from conducting the programme. Feedback and response from attendees has broadened Paxton’s breadth of knowledge and understanding about the South African security market and its installers. With this awareness the company hopes to improve on its offering and give installers exactly what they’re asking for – fast training, simple to install systems and consistently great support. Paxton trainers, Riaan Van Der Merwe and Werner Geldenhuys have amassed 33 years’ experience in the security industry. They detail the top questions asked by installers attending the training programme. 1. How long has Paxton been available to buy in South Africa and where from? Paxton has been on the market in South Africa for 10 years. The company sells
14
through distribution, and its range of products are available to purchase from Reditron, Pinnacle Security Ltd and Westcon Security Solutions. 2. Is Paxton more expensive than local brands? Although Paxton is UK-based, it is no more expensive than buying a local brand. In many instances its products are cheaper. Paxton pays exceptional attention to the development of high-quality products, customer care and support. The company offer a variety of security solutions to suit different site requirements. Paxton’s modular system design and one-door philosophy means doors can be added as required, or when budget becomes available. The company also offers free software upgrades for life and free training for its installers. 3. Do Paxton manufacture multi-door controllers? Paxton’s signature access control system is Net2, an advanced PC-based access control solution. Net2 is a single door access control unit offering centralised administration and control of sites from one to one thousand doors and up to 50 000 users. Paxton controllers operate separately meaning that if one controller fails, the remaining doors will still operate as separate functioning units. In contrast, multi-door controllers can raise certain
Security Focus | Vol 33 No 5 2015
issues. For example, if you have a 4-door controller installed that fails, you will lose access to all four doors. Among other benefits this distributed intelligence architecture facilitates the simple extension of systems to future proof your installation. 4. If a controller goes offline will I still have access rights? Yes, most definitely. Net2 is designed to work seamlessly in the event of communication failure. It will continue to permit or deny access to users as appropriate. Once communications are re-established, the activity is reported back to the PC. 5. What is the process for returns? The first port of call is to contact Paxton’s technical support team, available to help six days a week, 52 weeks a year. They will then assist with troubleshooting and if a unit is confirmed as faulty, you simple return it to the distributor it was purchased from. All Paxton products are covered by Paxton’s five-year warrantee and no quibble returns policy. To find out more about attending the programme, visit Paxton’s website http:// paxton.info/2355. The programme covers both the commercial and technical elements of selling and installing access control. Sessions are taking place close to major cities such as Cape Town, Johannesburg and Pretoria, throughout 2015. n
pRODUCTshowcase-accesscontrol&biometrics
16
Security Focus | Vol 33 No 5 2015
pRODUCTshowcase-accesscontrol&biometrics
Security Focus | Vol 33 No 5 2015
17
pRODUCTshowcase-accesscontrol&biometrics
18
Security Focus | Vol 33 No 5 2015
Industryopinion
Specialised storage for security systems By Kalvin Subbadu, Sales Manager Components, WD South Africa
W
hen it comes to surveillance systems, the digital video recorder (DVR) is the heart of any solution. However, while many people understand the importance of the DVR, they fail to give thought to what goes inside it – specifically, the hard drive that is absolutely essential for the recording, playback and storage of surveillance footage. Using just any hard drive in a DVR can cause catastrophic consequences, and is often the single point of failure in security systems, bringing the entire system crashing down. Should hard drive data become corrupted, or the drive fails, everything recorded on that drive will be lost, negating the very purpose of surveillance. Dedicated, purpose-built surveillance drives have been designed with the specific demands of this environment in mind, ensuring they are more reliable and longer-lasting than other hard drive technologies. When it comes to DVR hard drives, cheapest is certainly not best, especially when given the critical nature of security solutions. However, purpose-built surveillance drives do not carry a significantly higher price tag than desktop drives, so risk of premature failure carried by desktop drives far outweighs any additional cost involved. In addition, increasingly popular 720p high definition (HD) cameras impose a massive extra workload on hard drives, requiring three to four times the amount of storage and processing power of standard VGA cameras. With regular desktop hard drives in place under this type of strain, the drives will inevitably fail even sooner, creating serious issues for surveillance systems. The next evolution to 1080p cameras will only exacerbate this challenge, further doubling network traffic and placing hard drives under strain. When a hard drive is designed and engineered, specific attention is paid to the role the drive is made to play. For example, a laptop drive uses a 2.5-inch form factor and is typically designed with shock resistance in mind, as well as lower power consumption to extend the battery life of a notebook. This in return limits capacity and performance. Enterprise and serverclass drives are optimised for 24/7 operation and high performance, but utilise higher power draw and are noisier and run hotter than other drives. Conventional desktop drives are designed for a typical eight to five office environment, with a 3.5-inch form factor and capacity of up to 6TB. None of these drives are optimised to the demand of a DVR environment, which requires high capacity, high performance, the ability to operate 24/7 as well as cool, quiet operation that minimises vibration. Purpose-built security and surveillance drives can deal with up to 32 simultaneous HD camera streams, and can effectively deal with the unpredictable workloads of surveillance environments, which are dependent on activity in the area being monitored. Using the entire cache and proprietary drive firmware such as AllFrame, found in WD Purple surveillance-class hard drives, the workload is monitored to identify the number of incoming streams and the amount of bandwidth required by each. AllFrame works to reduce frame loss, improve playback and increase
the number of drive bays supported, reducing video interruptions that commonly occur when desktop hard drives are incorrectly used as storage in security systems. Since the ability to deal with a variable workload typically means that the drive heads have to jump around, which can increase noise and vibration, WD Purple drives feature exclusive IntelliSeek technology. IntelliSeek ensures the WD Purple is able to calculate optimum seek speeds, reducing power consumption, noise and vibration that can damage hard drives and cause them to wear out more quickly. Surveillance drives are also designed to handle multiple data streams where they will be writing more than reading, and feature low power draw, resulting in less radiated heat, which prolongs the life of hardware. In addition, WD Purple drives are built for compatibility with industry-leading chassis and chip set manufacturers for seamless integration into new or existing video surveillance systems. The technology behind surveillance drives is engineered and optimised to function effectively in the demanding, high temperature, always-on, surveillance security systems. This ensures reliability and quality video play back, extended operation, and essential support for critical security applications. n
Kalvin Subbadu
Security Focus | Vol 33 No 5 2015
19
SecurityinAction
Michaelhouse well prepared for unexpected incidents
M
ichaelhouse School’s health and safety committee is proactive in terms of ensuring the school is a healthy and safe environment for learners and employees, as well as visitors to the school. With this in mind, and in line with their health and safety policy, they sought assistance on the develop0ment, implementation and monitoring of a site-specific emergency action plan. Action Training Academy (ATA), a subsidiary of the MICROmega group, worked together with the Michaelhouse health and safety team to develop the plan and an emergency drill was conducted in January to measure its effectiveness. The drill was planned over a period of two months which included close interaction with the Michaelhouse health and safety team. The drill was unannounced with the date and time not communicated to the learners or staff. Unexpected emergency scenarios were staged at various points on the premises. These scenarios included multiple patient casualties, all having simulated traumatic injuries from an explosion. In addition, a smoke machine
20
together with a gas fire unit were utilised to replicate a fire post the explosion. At 09h30, an explosion was simulated in the main quad using three smoke canisters. They were deployed in three different areas, creating a threat around the main evacuation routes. The alarm was sounded and learners and employees made their way safely to the assembly point. ATA liaised with emergency services in the area to ensure they were aware and ready to respond. The local fire department participated according to the predetermined fire scenario, paramedics arrived to assist first aiders with casualties, and police search and rescue arrived to do a sweep of the premises. A roll-call was conducted and the emergency co-ordinator was notified that a missing learner was last seen on a balcony in the main building. Further investigation indicated the learner was injured and could not move unaided. The emergency services located the missing learner and performed a high angle rope rescue, bringing him down to safety. At this point, the “all clear” signal was given and learners were permitted to return to class.
Security Focus | Vol 33 No 5 2015
ATA planned, co-ordinated and conducted the drill and, on completion, a detailed report was submitted with feedback on conformances, non-conformances, evacuation times and corrective actions. The Occupational Health and Safety (OHS) Act, 85 of 1993, stipulates the need for employers to ensure the safe and expedient evacuation of the workplace in emergency situations. Michaelhouse, with the help of ATA, have ensured they are well prepared should an unexpected incident occur in the future. n Keys to ensuring the drill was a success: • Appointment of an emergency team • Training of emergency team members. • Delegation of responsibilities • Identification of potential threats • Emergency equipment assessment • Accurate evacuation floor plans • Communication • Preparation of evaluation team • Engagement of participants • Evaluation and analysis
SecurityinAction
TeleEye protects Google-backed SA solar farm South Africans accustomed to increasinglysevere rolling electricity black-outs no doubt saw a ray of hope in the coming online in October last year of the Jasper solar energy project. The 96 megawatt (MW) photovoltaic power station, located near Kimberley, in the Northern Cape, counts Google as an investor and is set to power up to 80 000 electricity-starved South African homes. Protecting the assets of often unmanned solar farms is where remote CCTV monitoring comes into its own. After being rolled-out in 2012 at two much smaller 33 MW solar farms, also in the Northern Cape, CCTV specialist TeleEye South Africa’s thermal imaging technology is now being used in surveillance applications at the Jasper installation. To protect its valuable ground-mounted solar panel assets against unwanted intruders, the Jasper owners called upon TeleEye South Africa to best advise how its sophisticated video alarm monitoring and detection solutions, as well as its FLIR thermal imaging technology, could help secure the remote solar site. Together, they came up with a master plan that would provide real-time monitoring day and night in order to efficiently deter unwanted intruders and prevent vandalism of a site that has definite national importance in light of
South Africa’s current power supply challenges. In particular, SMAC-M multi-stream compression enables the TeleEye solution to ensure optimum performance on recording and live video monitoring simultaneously. The TeleEye sureSIGHT solution is also a highly scalable and sophisticated video management platform. It can be customised, in terms of the number of video monitoring terminals, multi-layer site map, video wall configuration, and more. TeleEye South Africa, a local division of Hong Kong-based company TeleEye, has many years of experience in securing public utilities sites which enables 24/7 stand-alone and remote operation with real-time monitoring and recording. For the Jasper solar plant, TeleEye provided a complete perimeter surveillance solution consisting of TeleEye optical cameras, FLIR thermal imaging cameras, video analytics, alarm verification and alarm management. The solar plant perimeter has been secured with thermal imaging cameras from FLIR Systems and electric fencing. Philip Smerkovitz, managing director of TeleEye South Africa, explains that FLIR thermal cameras deliver very accurate optics and image quality along with robustness, which is an important factor in the harsh temperatures of the sites they monitor.
The Jasper installation is located in desertlike conditions where daytime temperatures of 40°C in summer are not uncommon. FLIR thermal cameras allow monitoring day and night. Without any additional lighting, it is possible to detect intruders approaching the perimeter at night. The thermal camera’s ability to see in bright sunlight conditions was also important because sunlight can obviously be very bright in the Karoo desert. wwGlare from the sun may blind conventional video cameras, effectively hiding vehicles, people and animals. Jasper is located in a solar park that also includes the 75MW Lesedi solar power project, which came online in May 2014. Lead sponsor of the Jasper consortium is SolarReserve, which develops utility-scale solar power projects and advanced solar thermal technology. Google has a recent history of investing in wind and solar power, and since 2010 has committed to more than US$1-billion in renewable energy projects worldwide. Until 2013, little of this was spent on renewable energy in Africa. A new $12-million investment in the Jasper power project, at a project cost of approximately R2,3-billion ($260-million) signals a change in policy. South Africa has a goal of having 18 gigawatts of renewable energy by 2030. n
The Jasper solar farm located near Kimberley in the Norther Cape.
Security Focus | Vol 33 No 5 2015
21
CompanyNews
Strategic partnership announced for South Africa
U
niclox Technologies and global time and attendance leaders Bodet Software recently announced the signing of a strategic partnership agreement for Southern Africa at a customer event in April. Bodet Software, with its head office in Cholet Cedex, France, is a subsidiary of the Bodet Group, a European leader in the resource management, and is globally recognised for the quality of its solutions and services. “Bodet Software’s development strategy is based on strong partnerships with local companies, able to provide a high quality of service to their customers. “We, as Bodet Software, are delighted to
partner with Uniclox,” says Pascal Bodet, export director at Bodet Software. “Both our companies share the same core values: high quality of the solutions we deliver, constant innovation in our products, and above all, total dedication to our customers’ satisfaction. Overall, our companies aim to set a new reference in the local market of time and attendance solution providers.” Bodet’s solutions are used in a wide range of industries – from banking to the health industry, logistics and the leisure sector. With more than 30 000 customers such as Novotel, Hilton, and Sheraton in the hotel sector, and a solid set of testimonials – the cost savings
Mathieu Maurel, export sales manager of Bodet Software; and Rodney Rens, general manager of Uniclox Technologies.
22
Security Focus | Vol 33 No 5 2015
these companies have realised in both time theft elimination and resource management are tangible. In addition, Bodet has been ISO 9001-certified since 1997 for all activities: design, production and service. The ISO 9001 standard is their reference base and guarantees their ability to provide quality products that comply with current standards and regulations within set deadlines. Bodet has also launched an environmental approach, with the introduction of eco-design for all new products. Sophia Hislop, managing director of Uniclox Technologies, says there are many synergies between the two organisations. “Both companies have been in business for many years, starting out with the common thread of clock making. “In addition, both companies are familyowned and share similar values when it comes to staff, quality, innovation and customer service. At Uniclox we feel strongly that Bodet will add great value to our solutions offerings and vice versa.” The strategic partnership with Bodet enables Uniclox to continue to be responsive to its customer’s needs. “By aligning ourselves with Bodet, Uniclox is able to be at the forefront of international trends and technology development which we are able to pass onto our clients,” says Sophia. Uniclox offers their customers resource management, access control and building management with the use of their solutions across its 15 000 Southern African customers. Managing such basics as canteen meals in mines and factories via the use of simple RFID cards – one meal per employee – as well as materials control for cleaning and bathroom supplies, to job tracking and asset management, provides almost immediate benefits to medium to large enterprises. Workforce management may be applied across all sectors, specifically for South African organisations where large numbers of shift workers, casual staff and contractors, such as nursing staff, are in use. “The year 2015 is turning out to be quite a landmark 70th year for Uniclox. My father would have been proud to witness this agreement today. It is one step further in the vision that he and I still share.” While in South Africa, both sales and technical training of the Uniclox team will be conducted by the Bodet team, as well as various customer visits. n
CompanyNews
New appointments at Cash Connect Lauren Rayne was appointed in March 2015 to the position of general manager, sales for Cash Connect. Lauren comes from a background in the luxury goods industry, spanning more than 10 years. Her experience includes the management of Jewellers Network, a B2B trade publication and prior to joining Cash Connect, she took the sales and brand positioning of Citizen Watches South Africa to new heights in her role as brand manager. Lauren’s management style, entrepreneurial spirit and passion are the driving forces that has led her sales teams to their successes. In April 2015, Dale Hodgson joined Cash Connect in the position of regional sales manager, KZN territory. Dale comes from a background in travel, recruitment and security, spanning more than 20 years. Dale has served in various managerial roles during this time, and Cash Connect says it looks forward to the energy and leadership she will offer the team. n
Lauren Rayne
Dale Hodgson
Security Focus | Vol 33 No 5 2015
23
CompanyNews
Cameras ensure 45% accident reduction According to a survey by Intelligent Telematics, a global integrated camera tracking solution provider, vehicle cameras have shown a reduction in accident frequency of 45 per cent. These findings were taken from the analysis of 2 000 commercial vehicles using the company’s IT1000 camera solution over a six month period. Data showed the cost of those accidents that did occur were 27 per cent less as a result of instant intervention. Intelligent Telematics operations director Craig Lovell says they are seeing multiple benefits from using a 3G vehicle camera, which are helping fleets to operate more responsibly while at the same time reduce overheads. “The 3G cameras are not only preventing incidents and discouraging other road users from making fraudulent or inflated claims, but when an accident does happen, the footage is available from the scene within seconds so first notification of loss is helping achieve substantial insurance claim cost savings,” he explains. The analysis also found that 65 per cent of
Craig Lovell
By capturing footage of near misses and poor driving incidents, in addition to actual collisions, it is now possible to identify high risk employees and those that would benefit from driver training. Mr Lovell says vehicle cameras have historically offered a reactive solution, recording footage to an in-vehicle SD card in the event of an accident. “However, the introduction of 3G devices is enabling us to work closely with clients to implement a proactive and preventative solution that is achieving measurable improvements in terms of accident and cost reduction, while supporting ongoing duty of care strategies,” he concludes. n
the accidents recorded were, in fact, avoidable, highlighting a clear opportunity to improve fleet safety levels through improved and targeted driver engagement. With this in mind, companies are increasingly using the information provided by the vehicle cameras to pro-actively improve driver behaviour.
New appointment at Centurion Systems Johan Lessing, a man whose name has become synonymous with product knowledge, has just been appointed national sales manager for leading South African access automation manufacturer, Centurion Systems, a position which will see him manage the sales teams of the company’s eight local branches. Johan’s journey with Centurion Systems started when he was employed as site support technician back in 2002, and his incredible technical prowess, coupled with an encyclopedic knowledge of access automation, saw him take on the role of regional sales manager in 2006. Now exposed to an entirely new side of the industry, Johan quickly became the “go-to” person, with clients and staff alike seeking his advice on technical and sales matters. Voicing his excitement at once again being able to deal with clients, Johan commented: “Centurion’s customers are always encountering interesting challenges and I get a kick out of being able to help solve those challenges. It is a match made in heaven.” n
24
Security Focus | Vol 33 No 5 2015
VehiclesecurityUpdate
Hijackings costing economy and insurance industry billions
A
ccording to Cartrack, the incidence of hijacking across commercial and private vehicles has risen sharply in the last year. South Africa’s official crime statistics show a 12,3 per cent increase in carjacking to 11 221 reported cases in the last year, while truck hijackings have increased by 5,1 per cent from 943 incidences to 991. Trucks, in particular, are hijacked for various reasons. “Hijackers may be looking for a specific cargo, such as high-value electronic goods or grocery items, among others. On other occasions the actual vehicle or its trailers may be the target,” explains Jerry Pierce, operations manager at Cartrack. “Cargo items find their way back into the economy, the black market or are shipped cross border, while vehicles and trailers are stripped for parts, shipped cross border or are simply relicensed with the aid of corrupt officials and put back on our roads,” he adds. Truck hijackings and the subsequent loss of commercial vehicles and trailers in addition to valuable cargo costs the economy and insurance industry billions each year. Small fleet operators are particularly hard hit.
Jerry Pierce
“It is not so much having to replace the vehicle and its cargo, but the reputational damage that comes with it,” explains Jerry. There are many modus operandi that criminals employ. “We have, however, noticed an uptick in incidents involving notorious ‘blue light gangs’ that are operational in Gauteng at present. Another tactic is the ‘good Samaritan’
approach where a road user will indicate to a truck driver that there is a problem at the back of the truck and when the driver pulls over, they find themselves the victim of a hijacking,” explains Jerry. While every fleet owner and driver will undoubtedly make every effort to avoid a hijacking scenario, a life is more important. Following is some practical advice, in the event of a hijacking: • Be aware of what is happening around you. • It is important to realise that there is often nothing you can do other than to co-operate. • As difficult as it may sound, try and remain calm, as the hijacker will respond according to your reactions. • Acknowledge the hijacker’s presence. Don’t make eye contact and keep your hands visible. • At all times, let the hijacker(s) know what you are doing and don’t make any sudden moves. Cartrack provides these guidelines as a means to raise awareness and vigilance. “It is very important to know how hijackers operate, how to avoid being hijacked and what to do if you are confronted with a hijacking scenario. Be alert and stay safe out there,” concludes Jerry. n
Security Focus | Vol 33 No 5 2015
25
CyberSecurityupdate
Cyber security should be a top priority for CIOs By Shailendra Singh, Business Director, Africa, Wipro Ltd
T
he data explosion is a welldocumented phenomenon, and one that offers organisations numerous opportunities to deliver improved, tailored and enhanced experiences to their customers. However, along with the advantages of having access to a wealth of information, this data also opens organisations up to threats if not protected adequately. Cyber crime is a multi-million dollar industry, and the perpetrators of these attacks can cause significant damage and loss, both to organisations and their customers. It is also an industry that is highly sophisticated and thrives on always staying one step ahead of security technology, requiring a constant and consistent effort from organisations to protect their sensitive and valuable information. Cyber security should, therefore, be a top priority for CIOs, particularly when it comes to preventing attacks and ensuring data security. The number of high-profile data breaches has grown over the past few years, and cyber threats are an increasing concern with regard to securing data. The end goal of these attacks is to compromise personal data for financial gain. However, despite the increase in frequency and the detrimental effect these attacks can have, response to attacks is often inadequate. This is typically as a result of organisations under-estimating risk and failing to invest sufficiently in cyber threat intelligence solutions, particularly with regard to new and emerging
26
technology trends. BYOD and mobility have become key business drivers, and efficient security needs to incorporate these into policies, while balancing the need for data sharing and collaboration with the requirement for data privacy. In addition, cloud-based applications, social platforms and other megatrends must be catered for in an effective security solution. Cyber security challenges Instances of cyber breaches are on the increase, and as a result there is a growing focus on security measures. Key to effectively securing an organisation is an understanding not only of the implications of cyber security, but also the drivers for such solutions and the challenges involved. Identifying important information assets and evaluating the consequences of a breach is a critical first step. In addition, it is important for organisations to implement industry best practices in line with their own business processes, continuously monitor the relevance of cyber security approaches and business processes, and ensure compliance with legislation regarding cyber security and data protection. A proactive approach to security The typical approach to security uses technology based on past threats and vulnerabilities that have already been identified. However, in a world where cyber threats are increasingly sophisticated and constantly evolving, this is no longer sufficient.
Security Focus | Vol 33 No 5 2015
Organisations need to adopt a more proactive approach, with a complete view of cyber intelligence that helps to reveal possible vulnerabilities before a breach can occur. In addition, both internal and external sources of malware must be identified and correlated with other threats to predict where vulnerabilities may occur in the future. Effective cyber security should incorporate smart analytics tools and intelligence to ensure adequate security. Utilising analytics, organisations can identify existing breaches and use this information to build predictive platforms that will help to identify vulnerabilities and build strategies. In addition, these breaches can be prioritised according to their business impact, severity and criticality, so that they can be dealt with effectively. In addition, it is important to establish key performance indicators with regard to cyber security, so that progress in monitoring and control can be tracked and measured. It is also important to implement continuous monitoring to test for vulnerabilities and validate security strategy on an on-going basis, and automate security measures to ensure they are compliant, effective and adhere to cyber security processes and procedures. Exploiting data to deliver insight Effectively exploiting the large volumes of available data in most organisations can be used to deliver insight that can assist with the building of threat intelligence solutions, as opposed to reactive security measures.
CyberSecurityupdate
Measuring and monitoring factors such as the frequency of security events, categorising breaches and incidents according to their nature (such as spam, phishing, denial of service, hacking and more), categorising attackers themselves, and establishing the motivation behind attacks, are all essential in improving cyber security efforts. This offers a number of benefits beyond simply preventing unauthorised network, computer and data access. Adequate information security is essential in compliance with legislation as well as in preventing disruptions to business operations and recovering quickly. In addition, stringent security increases stakeholder confidence and enhances the credibility of the organisation. Cyber security is a business issue, not an IT problem In order to ensure cyber security strategy is robust and effective, it is essential to obtain
business buy-in from top-level executives. Ultimately, cyber security is no longer an IT problem, but a business problem that can negatively impact the entire organisation. As a result, it is essential to begin by identifying business processes or information assets that may be vulnerable to attack, rather than focusing on technological weaknesses. It is also important to conduct a cyber risk profile across the value chain to ensure vulnerabilities and security concerns can be effectively identified in all areas. The focus of cyber security today should be around securing sensitive data, as corporate information can now be accessed in so many ways, on so many different devices. In addition, given the constantly evolving nature of cyber threats, it is of the utmost importance that organisations frequently update their threat strategy and evaluating security measures.
In conclusion Data is currency in today’s digital world, and, as such, protecting sensitive and highly valuable corporate information should be a top priority for any business. Ensuring data is protected requires a comprehensive cyber security strategy that focuses on intelligently detecting and predicting vulnerabilities, as well as the continuous monitoring and updating of strategies and processes. In addition, it requires a shift in mindset to view cyber threats as a business problem and encourage C-level participation. Protecting an organisation’s most important asset is essential to business continuity, and this cyber security should be a top priority for CIOs, and for business as a whole. n
Security Focus | Vol 33 No 5 2015
27
BusinessAgainstCrime
Establishing policy for
dealing with White Collar Crime Dealing with White Collar Crime was published in 2011 by Contact Publications (Pty) Ltd, on behalf of the White Collar Crime KwaZulu-Natal Task Group. Topics covered include establishing an ethical culture; risk assessments; internal controls, fraud prevention, recovery of assets; prevention of banking related crime; computers and computer crime; preparing for trial; money laundering and much more. In this issue of Security Focus, the chapter on “Establishing Policy for Dealing with White Collar Crime” has been printed in its entirety to give readers an idea of the important information available to them when purchasing a copy of this valuable book.
A
By Basil Carlston
well thought out and carefully crafted security policy is an essential ingredient of an organisation’s approach to dealing with White Collar Crime. Moreover, it is particularly important for each employee within the organisation to be absolutely clear about their duty and responsibility within the security policy. It is vital that, in order to be truly effective, the policy is owned by management and that it is agreed by the board, or executive management committee, and that it is promulgated under the signature of the senior executive, owner or chairman of the organisation. Emphasis should be placed on the word “follow” as it is essential that management itself should lead the implementation of the policy. The aim of the policy should be to emphasise the organisation’s commitment to rooting out White Collar Crime, to lay down the organisational framework, guidelines and procedures for dealing with the crime as well as the measures necessary to prevent it. Large organisations might set up a committee to devise the strategy and draw up the policy but it is our belief that, once this is done, a board member or senior executive should be identified by post as being overall responsible for driving the policy. Individual responsibilities for White Collar Crime risk management should then be identified throughout the organisation. Irrespective of the size of the organisation, the following responsibilities need to be recognised and assigned: • Personnel management need to take responsibility for implementing an effective recruitment policy to prevent white collar
28
•
•
•
•
•
•
criminals entering the organisation. This will be in addition to their responsibility for establishing the necessary remuneration policy, employee rules, disciplinary processes and security of employment policies which will establish the required ethical culture of the organisation. The responsibility for monitoring the integrity of key operations such as creditors, debtors, lending, insurance, payments, etc, must be assumed by the line management concerned. Product design and systems managers will need to take responsibility for delivering secure (as well as attractive and efficient) new products and systems. Financial management will need to take responsibility for the broader stewardship of assets, and of course for control over financial accounting, the institution’s bank accounts, and the payment of suppliers. Branch and departmental management must take responsibility for the security of their own operations, and for White Collar Crime loss control through the normal setting and achieving of business objectives. Support services management must take responsibility for the integrity of their own departmental operations. If a special investigations/security department is justified, it must be given a clear mandate and a set of objectives as any other business function within the organisation. In particular, the relationships with other functions must be defined. A structure should be in place for the purpose of enabling all employees a confidential procedure to follow in order to report actual or suspected commercial/
Security Focus | Vol 33 No 5 2015
white collar crime. • As well as checking on systems, internal audit must take responsibility for independently checking and reporting upon the organisation’s compliance with, and the overall effectiveness of, the strategy. • As soon as commercial crime is identified or suspected, an urgent crime response procedure should be followed to investigate secure evidence and undertake internal disciplinary action, which will then be followed by recoveries of losses and criminal prosecution. The above list is not necessarily comprehensive but it illustrates the importance for the entire management structure of the organisation to be involved in the fight against White Collar Crime. The risk responsibilities should be reflected in job descriptions and in the setting and evaluation of annual objectives. Through such an empowered management structure, every member of the organisation must be encouraged to take individual responsibility for the combating of White Collar Crime. MAIN PLANKS OF THE POLICY In order to fulfil the aim of emphasising the organisational commitment to eradicate White Collar Crime the following areas of policy need to be clearly established: • The organisational framework for dealing with crime. • The reporting of crime. • The organisation’s approach to: – Investigation. – Reporting to the South African Police Services. – Internal disciplinary action. – Prosecution. – Recovery.
BusinessAgainstCrime
– Pension, accrued leave pay, bonus and other emoluments. • The education of staff as to their responsibilities and awareness in relation to White Collar Crime.
should be made with care. A post holder should be identified, not an individual. The post holder concerned should be expected to have the training, proven ability and corporate status to take charge of the situation immediately.
and does so without restricting the freedom of action of honest employees and business contacts. The threat of detection discriminates against criminals; it does not restrict innocent people.
ORGANISATIONAL FRAMEWORK We have already said that once the strategy and policy for dealing with White Collar Crime has been established, a board member or a senior executive should be identified to bear overall responsibility for driving the policy. In medium-sized and smaller organisations this person could be the managing director or chief executive officer. We advocate that this post is supported by an “Enquiry Controller”. The Enquiry Controller’s main functions should include: • The design and, when necessary, the activation of the organisation’s contingency plan. • Responsibility for the conduct of any investigation. • Co-ordination and liaison with outside agencies (SAPS, Asset Forfeiture Units, Government Departments, Forensic Auditors, Investigators, IT Specialists, etc). • Receiving reports of Commercial Crime. In a large organisation with an investigations department the Enquiry Controller could be the departmental head. In smaller organisations a predetermined senior manager should be selected. It should be noted that we do not advocate that the Enquiry Controller should be a trained investigator or have police experience. In essence the Enquiry Controller needs to know enough about White Collar Crime and have the necessary contacts to ensure that any White Collar Crime incident is dealt with efficiently, with dispatch and in accordance with organisational policy. Where an organisation operates from a number of sites, consideration should be given to the appointment of a Deputy Enquiry Controller at each site. The Enquiry Controller should identify and have on standby, a team of experts as part of the Contingency Plan. The resulting framework can be depicted diagrammatically as follows:
THE REPORTING OF CRIME The policy document should clearly state that the reporting of commercial crime, as well as suspected commercial crime, is expected and the procedures for doing so widely promulgated. The reporting policy should state the type of incidents that are to be reported. A climate of openness about mistakes and losses should be created. A manager, except in the most unusual circumstances, should not be treated too severely because a fraud has been detected in his area of operation, unless of course there is reason to believe that he is involved. He might not be blamed for the fact that fraud has occurred, but he should be dismissed or severely reprimanded for concealing any loss. Employees must be made aware of their responsibility for reporting commercial crime and the procedures for doing so. They should be confident that they will be protected, that their information will be investigated and treated with care, and that their actions will be appreciated. Obviously the reporting of incidents should not be confined to commercial crime. For example, robberies, burglaries, fraud, fires, sabotage and breaches of safety rules should all be specified in the policy. We recommend that initially a report should be made to the head of the department/section who should in turn immediately inform the nominated board member/CEO and the Enquiry Controller. It is essential that reports are kept secret and only disseminated on a strict need to know basis. Employees should be able to bypass the departmental section head if for any reason they feel that not doing so may compromise the report. A confidential telephone number, e-mail address or similar, monitored by the Enquiry Controller are recommended for this purpose. False alarms should be accepted graciously as a demonstration of conscientiousness and loyalty to the institution. Anonymous reporting should be discouraged, but investigated when it occurs.
REPORTING TO THE AUTHORITIES All commercial crime should be reported to the South African Police Services. In this respect it should be noted that the Prevention and Combating of Corrupt Activities Act 2004 requires any person who holds a position of authority and who knows or ought reasonably to have known or suspected that another person has committed an offence against the Act involving R100 000 or more must report the fact to the police and could be subjected to imprisonment of 10 years for failing to do so (see Chapter 9 for the detail). There should be no deviation from this general policy, even for minor criminal offences. We recognise however, that the initial priorities of the victim organisation and the investigating police officer are different. The victim’s prime concern is generally to recover funds and prevent recurrence, while the police officer’s focus is to arrest the offender and recover the best evidence. If the organisation has an effective and well trained investigation department, the need for immediate reporting to the police is less urgent, as the investigation department can take steps to preserve the evidence. However, the police have powers which are not available to in-house investigation departments. The arguments for reporting to the police are as follows: • It is society’s job to decide on the guilt or innocence of people suspected of criminal offences. It could be argued that organisations have no right to make society’s judgments. • It is society’s obligation to rehabilitate criminals. • Criminal courts can impose punishments in addition to restitution - and in so doing may deter others from crime. • Criminal prosecution should ensure a certainty and consistency of response. • The judgment given in a criminal court may be used as the authority for pursuing a civil claim or for enforcing a dismissal notice. • Failing to prosecute means that the offender’s record remains untarnished, w hich is unfair to subsequent employers and job applicants with whom he/she may compete. • Failure to report crimes covered by the Prevention and Combating of Corrupt
Board (Executive Management Committee) Responsibility Line Management All Staff
Policy & Crime Response Nominated Board Member (CEO in small orgs.) Enquiry Controller
The selection of the Enquiry Controller
Specialists as Required
INVESTIGATIONAL POLICY An investigation using the best and most appropriate resources available should be conducted into all commercial crime in the organisation. Detection serves as a deterrent,
Security Focus | Vol 33 No 5 2015
29
BusinessAgainstCrime
Activities Act 2004 will expose individuals within the organisation to punishment under the Act. The theory has been advanced that organisations often fail to report crime to the police for fear of adverse publicity. In contemporary South Africa it is more likely that the opposite is true, for such is the scale of commercial crime that there are few, if any, organisations which are not affected, and an organisation with a clean internal crime record is itself liable to speculation that it is soft on crime and therefore not protective of shareholders’ interests. The civil recovery procedures should, if possible, work hand in hand with the criminal prosecution, so that information is shared freely by the victim in order to assist the criminal prosecution and vice versa. INTERNAL DISCIPLINARY ACTION Criminal prosecution does not prevent the victim organisation from taking internal disciplinary action. Indeed it is our recommendation that this is done as soon as a case can be made against the employee on the balance of probability. The reasoning behind this is simple: why should an organisation continue to employ a criminal while the often long and tedious process of bringing him/her before the courts takes place? Timely internal disciplinary action is often necessary against white collar criminals. Invariably, once they realise that there is a case against them, they will resign hoping to avoid prosecution, as well as to secure any pension or leaving emoluments and to hide their ill-gotten gains. It is a sad fact that many organisations in South Africa actually prefer the resignation route as an easy means of divesting themselves of a known criminal. This is an extremely short sighted view, as it sends a very clear message to all employees that White Collar Crime is actually tolerated in the organisation and that such criminal activity pays. All commercial crime even that perpetrated at senior management level should be the subject of disciplinary action. PROSECUTION The fact that an organisation invariably prosecutes those who commit White Collar Crime against it has a high deterrent effect. We believe that every case should be prosecuted to the full extent of the law. The threat of imprisonment to a white collar or management criminal is a most effective deterrent. For him or her, prosecution and
30
imprisonment may be the equivalent of a life sentence in the destruction of his life style or family reputation. The certainty and consistency of response should be used to provide a deterrent; the position of the detected white collar criminal - one he usually deserves - should not be allowed to cloud decisions that are in the best interests of the organisation, its honest and loyal employees, customers and suppliers. It is always easy to take the simple course not to involve the police, not to mount a criminal prosecution, not to dismiss the dishonest employee, or cut off the criminal customer or supplier. Sympathy for the thief often overrides common sense and sound organisational strategy. The position of the offender is often considered in isolation and the broader issues ignored. We are of the view that lenient treatment of a suspected criminal will encourage others; set a precedent which will be difficult to vary; will be viewed by the criminal, his accomplices, and the general public as softness; and that it is inconsistent with responsible management and not in the best interests of the organisation. The prosecution, either in civil or criminal court, against dishonest customers or suppliers should not be ignored. An organisation which condones a customer’s or supplier’s fraud in the philosophy that “half a loaf is better than no loaf at all’, or on the grounds that volume and sales count for all, or on the assumption that the required service or expertise is not available elsewhere, is digging its own grave. Once one fraud is condoned, others spring up, and the problem escalates to uncontrollable proportions. RECOVERY It is clearly in the interests of the organisation to recover any losses that it may have suffered. There are a number of procedures for this which is discussed in the section which deals with the Crime Response Plan. Policy with regard to the following needs to be established: • The reporting and recovery relationship between the organisation and its insurers and the institution and its regulator. • The Human Resource procedures to be used for the recording of the culprit’s agreement to recovery being made from emoluments due and pensions. (Section 37D Pensions Act). • The procedure required by the relevant pension’s authority for recoveries to be made from pensions. • The route and authority required for
Security Focus | Vol 33 No 5 2015
dealing with the organisation’s lawyers in respect of initiating civil recovery action, urgent anti-dissipation orders and sequestrations. STAFF TRAINING AND MOTIVATION A loyal staff committed to White Collar Crime prevention and detection is the key to success. Clearly there are a number of routes to this goal. Procedure manuals are an important training tool, but the existence of comprehensively written manuals will not in themselves deliver the necessary training and will certainly not foster the necessary motivation. Organisations should consider the following: • White Collar Crime to be a regular topic for discussion at staff meetings. In this respect it is critical for companies to have effective policies for following up after experiencing or suspecting fraudulent behaviour – and these should include internal and external communication. • New employees to be given induction training and documentation which includes details on the organisation’s policy, approach and plans on White Collar Crime as well as the relevant employees responsibilities in this regard. • Fraud training should be provided to all relevant staff - training sessions should focus on individual products and services, and use as many practical case studies as possible. • Fraud risk and prevention should be included in staff training related to new products and services prior to launch. • Annual refresher training. • Publication of in-house newsletters on White Collar Crime which includes latest trends, latest cases and detection successes by the organisation in terms of beating the white collar criminal. • Appropriate rewards for staff that have prevented White Collar Crime. Despite the fact that prevention should be part of the employee’s job description anyway, the receipt of a box of chocolates or bottle of champagne from the departmental manager, or a special dinner for branch/departmental staff can have a considerable effect on morale and motivation. • Management should be made aware of the general thrust of the Prevention and Combating of Corrupt Activities Act 2004 and specifically their obligation to report to the police commercial crime and theft of R100 000 or more (see Chapter 9). n
White Collar Crime
South Africa’s biggest business scourge Billions of rands are being lost annually to the South African economy, and every single company needs to know how to combat this problem. Now, however, there’s help at hand. Dealing With White Collar Crime is a book that puts the spotlight on every single facet of this subject. Moreover, it is a book that every professional security practitioner needs to read and – more important – a book every single company in South Africa needs to have in its library as compulsory reading!
So, what’s included in this book? Here’s a table of contents ... • Establishing an Ethical Culture • Establishing Policy for Dealing with White Collar Crime
• Prevention and Combating of Corrupt Activities Act • Prevention of Banking Related Crime
• Risk Assessments
• Computers and Computer Crime
• Internal Controls
• Investigation
• Fraud Prevention
• Preparing for Trial
• The Crime Response Plan
• Money Laundering
• The Recovery of Assets
• A Disclosure Service: A Critical Component of a Risk Management Strategy
• A Practical Approach to the Prevention of Corruption
• Verification Services
PURCHASE ORDER To: Contact Publications (Pty) Ltd. Please send me ………. copies of Dealing with White Collar Crime at a total of R199 per copy inclusive of VAT, local postage and packaging. This order is being submitted via (tick relevant box): p POST at P O Box 414, Kloof 3640, KwaZulu-Natal, South Africa, along with a cheque made payable to Contact Publications (Pty) Ltd. p Fax at 031 764 6974, plus cheque to P O Box 414 as above or proof of EFT as below. p Email to accounts@contactpub.co.za plus cheque as above or proof of EFT made into FNB current account 50730106925, Kloof branch code 221526
Name................................................................... Position: .............................................................. Company:......................................................................................................................................... Address: .......................................................................................................................................... ............................................................................................................... Code: ............................... Tel: .......................................................................... Fax : ............................................................... Cell:..............................................................Email:.......................................................................... Contact Publications physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610, KwaZulu-Natal, South Africa. Telephone: +27 (0) 31 764-6977 For overseas postage rates and also bulk discounts for ten copies or more, contact Lynette Taylor at lynette@contactpub.co.za
InternationalNews
Hikvision releases
iVMS-5200 Professional Software
C
omprehensive video management system answers demands for enhanced and robust security, dramatically simplified operation and optimised security management through complete vertical-market solutions, smart features and open architecture. Hikvision, the global leader in video surveillance equipment, has announced the release of its iVMS-5200 Professional video management software. “The release of iVMS-5200 Professional reflects Hikvision’s commitment to providing complete security solutions for our partners and customers,” states Keen Yao, international marketing director at Hikvision. “Up to 1024 video devices can be connected and iVMS-5200 fully supports all Hikvision products, including DVRs, NVRs, cameras and speed domes. Third party products that conform to ONVIF standard can also be connected. This will allow any security needs to be addressed, regardless of the size, complexity or location of the installation.” iVMS-5200 Professional video management software introduces a complete smart, open, easyto-use and customisable solution for all users. Complete iVMS-5200 Professional software can be easily customised to suit the complete business needs of different vertical markets. For example, iVMS-5200 Professional includes a transact module and a business intelligence module, to better meet the demands of the retail sectors and Hikvision is integrating a licence plate recognition
32
module for transportation and parking systems and an access control module for building facilities management. Many more modules are planned and will be introduced in the future. The retail sector also benefits from a fullyintegrated POS system, which enables users to combine video and transaction data to assist loss prevention and provide evidence in case of customer disputes. Retailers, and supermarkets and chain stores in particular, can also take advantage of the advanced video analytics, such as face recognition, people counting and heat maps to monitor customer flow and preferences and employee performance. iVMS-5200 Professional generates a host of graphical reports to capture this valuable business intelligence and improve management efficiency. Smart iVMS-5200 Professional fully supports smart features from Hikvision products, including smart search, playback, smart detection, and smart application for people counting, heat map, interactive map and much more. It delivers a total smart solution and enhances management efficiency, allowing users to easily find a specific video clip or locate a suspicious target, etc. Open Besides integration with all types of leading CCTV equipment, iVMS-5200 Professional also easily interconnects with various types of security and business systems due to its
Security Focus | Vol 33 No 5 2015
open architecture design. This complete flexibility provides customers with greater operational possibilities and almost limitless adaptations. More importantly, the iVMS-5200 software allows operators to fully customise their own security system specifically tailored to meet each project’s individual needs. Besides the comprehensive benefits that Hikvision iVMS-5200 Professional brings through being open, smart and complete, users can also enjoy the easy-to-use functions in which it excels. iVMS-5200 Professional video management software ensures a simple and optimised experience for partners and end-users, such as supporting one step installation. With just a few clicks, users are able to easily install the software and avoid timeconsuming tasks, such as additional staff training. With efficient modular design, iVMS-5200 Professional is also capable of resolving potential system failure quickly by automatic detection and recovery. This ability enables shorter maintenance times and protects users’ investment. “I am very excited about this release and the possibilities it gives our customers. Whether it’s a new site installation or expanding an existing system, the iVMS-5200 professional software delivers a complete end-to end solution, a more seamless integration of system components, and a superior user experience for our customers worldwide,” concludes Mr Yao. n
InternationalNews
Sports stadium gets the Panomera treatment The video system at the Eintracht Stadium in Braunschweig, in Germany, has been completely modernised using exclusively equipment from Dallmeier. The heart of the installation, the unique Panomera multi-focal sensor technology, provides security for both the home and visiting fan areas. The Stadium can accommodate more than 25 000 spectators. The entire video system in place was to be updated to reflect stateof-the-art as part of the general stadium modernisation programme. For almost two-and-a-half years, the operating company of the Eintracht Stadium, the Stadthalle Braunschweig, conducted a thorough investigation on the subject and tested the systems offered by several different manufacturers. In the end, the Panomera multi-focal sensor technology from Dallmeier emerged as the leader and the company is now supplying the entire video system – from cameras to recording to management. In order to ensure security for the visiting and home fan areas, the Panomera multi-focal sensor technology is used. This unique camera technology, patented by Dallmeier, is unlike single sensor cameras in that it uses several lenses, each with a different focal length. “This makes it possible to monitor large expanses and distances from just a single
location – in real time and uniform picture resolution, excellent dynamic response and consistent depth of focus,” says Roland Meier, head of Panomera multi-focal sensor systems at Dallmeier, and also in charge of the project in Braunschweig. As security management soon realised, the Eintracht Stadium in Braunschweig posed a real challenge for cameras. Not only because the running track significantly increases distances to the spectators, but also because the light conditions made it practically impossible for conventional cameras to operate effectively. “There is a space between the stand and the roof, which allows light into the stadium, but creates a very difficult situation for many cameras, as we discovered in the course of our test,” explains Marcus Meyer, technical director of Stadthalle Braunschweig Betriebsgesellschaft mbH. However, with the Panomera system each sensor defines its own contrast, white balance and exposure. This, in turn, enables significantly more effective dynamic range and unrivalled picture quality over the entire scene – even with widely varying light conditions within the same image. Besides Panomera, other high resolution PTZ cameras by Dallmeier have also been installed, particularly to safeguard the areas around the outside of the stadium.
Video data is recorded on Dallmeier video IP appliances. These recording systems are well known for their quality and reliability. RAID 6 and redundant power supplies guarantee the highest possible level of recording availability. Image material from the system has received an LGC Forensics certification, which means that it can be used as evidence in court. For managing the system, operators can make use of multiple Panomera viewing clients and the Semsy management software with joystick. Semsy is a high-performance, futureoriented video management system designed with maximum operator convenience in mind. It offers an extensive suite of functions covering live image display, a wide variety of search functions in the recorded material, control of the PTZ cameras and even simple archiving of sequences of interest. Armin Gallus, a member of the crisis management team with the Braunschweig police, is enthusiastic about the system: “One of the most important features for us is that the entire scene is recorded without interruption. “This means that if something does happen, we can look for it in the recordings at any time. And the resolution of the cameras is really impressive, not only live but also in the recordings. That is critical for us, because it means we have evidence which we can use to identify and detain offenders.” n
Security Focus | Vol 33 No 5 2015
33
InternationalNews
Hikvision introduces all-in-one NVR stores, hotels and hospitals, etc, wherever the environment demands a neat and unobtrusive unit. All-in-One features The unit features a 22” surveillance-level LCD monitor, which offers maximum reliability with double the operational life span of traditional LCD units.
Hikvision All-in-One NVR integrates video viewing, recording, storage and display with monitor and NVR in one unit. Once set up, the NVR lets you keep an eye on what’s happening around you. Hikvision, a global leader in innovative video surveillance products and solutions, recently announced the availability of its latest NVR unit – the DS-7600NI-E1/A All-in-One NVR. With the appearance of a simple monitor, this NVR looks like no other, but retains abundant features and functionalities of Hikvision NVR. The DS-7600NI-E1/A integrates video recording, storage, and display in one compact unit, providing an ideal solution for the home surveillance and SMB sectors, such as retail
In addition, the All-in-One NVR includes a USB port so that users can import any advertising video and audio file for playback. The NVR even offers the added convenience of an internal hard drive slot at the rear, which frees users to install one manually. Ease-of-use Installation is made simple through the NVR’s plug and play feature. It automatically discovers Hikvision IP cameras and other ONVIF-compliant models on the network with no programming or configuration necessary. The small size of the combined unit also means users can easily set the unit on the tabletop or mount it on the wall for a more permanent solution by simply removing the base. n
The NVR supports up to eight network camera connections at resolution levels up to 6MP for synchronised video preview and playback. It also supports optional display of HDMI /VGA /internal NVR video sources with resolution at up to 1920x1080P; VGA output is also available when connected to another monitor.
Comelit to showcase ‘Mini’ at IFSEC 2015 Comelit has added to its market-leading access control range for apartment blocks and residential complexes with the “Mini” video door entry phone, which the company will be demonstrating at this year’s IFSEC in June at London’s Excel Centre. The “Mini” is an enhanced version of Comelit’s entry-level solution, which maximises security while remaining unobtrusive. The design enhances user convenience of the entry phone and display screen, while also minimising delays for legitimate visitors and protecting against unwanted callers and would-be intruders. The 4.3” 16:9 black and white or colour screen offers unrivalled brightness and contrast control that makes the unit clearly readable for users, even in unusual ambient light conditions. The aesthetic appeal of the “Mini” can be optimised with ringtone and melody customisation, and compact dimensions make the units discreet.
34
Users benefit from four touch-sensitive buttons for controlling lock release, as well as comprehensive privacy functions and options for auxiliary commands, such as calls to a switchboard. Installers will appreciate that Comelit’s “Simplebus Top” system uses analogue 2-wire technology. This allows external and internal units to be up to 1 200 metres apart, but still operate from the same riser line. At large apartment complexes with considerable distances between a building’s entrance panel and the central concierge, a 2-wire system with non-polarised cables makes scalable connectivity (using several building risers if necessary) a simple matter. The “Mini” video entry door phones are basic units within Comelit’s comprehensive catalogue, but still offer high performance. A deluxe option, finished in black, features softtouch on the handset and eight buttons as standard, with a door status indicator LED.
Security Focus | Vol 33 No 5 2015
Lock release is shown to the user by a backlit LED button. These video entry phones offer flexible mounting options with a range of backplates and finishing accessories that enables easy switch-over from legacy equipment supplied by other manufacturers. Francesca Boeris, sales director, Comelit UK, said: “The ‘Mini’ range underlines Comelit’s commitment to investing in new products while conducting extensive market research to ensure we develop offerings in line with the needs of users, installers and facility managers.” Francesca continued: “Sales of the ‘Mini’ are already high and it’s being specified across various residential sites where users are giving outstanding feedback on experiences with the product. “Comelit will be showcasing the ‘Mini’ at IFSEC (stand G900) and we invite the industry to a demonstration of our latest innovative monitor.” n
InternationalNews
Big future for Milestone’s smallest NVR The Milestone Husky™ M10 network video appliance is enhanced with advanced connectivity features enabling the appliance to be part of networked security solutions. Mobile phones can also be used to push video to the security system. Milestone Systems, the open platform company in IP video management software (VMS), recently announced new enhancements to its Milestone Husky M10, the smallest footprint in its series of Milestone Husky network video recorders (NVRs). The enhancements are the first step in the game plan for the Milestone Incubation Business Unit toward an interconnected and integrated world of intelligent security devices.The Milestone Husky M10 can be an edge-recording device in a network or a stand-alone device. This announcement is aligned with the new Milestone Husky series’ improvements announced recently, and is more proof of Milestone’s thought leadership in advanced visual business optimisation. An important feature for the Milestone Husky M10 is video push in the Milestone Mobile client.
This enables a smartphone or tablet running the Milestone Mobile client to act as a mobile security camera, pushing video to the Milestone Husky M10 network video appliance using a mobile or Wi-Fi network. This provides on-the-go video documentation and immediate awareness of incidents, and it requires no set-up – just download the phone application, connect to the Milestone Husky M10 and go. With the sharply rising demand for entrylevel monitoring solutions based on open platform technology, the sleek Milestone Husky M10 is designed to provide even more power in a small box, which can be a smart building block in a robust, connected security infrastructure. The Milestone Husky M10 now comes in configurations with four or eight channels and up to 2 TB storage, enabling the device to be used in solutions where long retention of recordings is needed. Additionally, the device supports more than 2 600 native camera drivers – giving the freedom to choose optimal camera devices for every installation.
The Milestone open platform technology in the Milestone Husky M10 enables the NVR to be an intelligent edge-recording device, which allows for distributed systems that point to a future where networked video systems will give unlimited scalability. The Milestone Husky M10, like the Milestone Husky M30 and the Milestone Husky M50, can use Milestone Interconnect to connect remote sites to XProtect® Corporate VMS for central command and control. This enables a site with a Milestone Husky M10 to be operated locally or remotely, which could be through a central control centre or by a service provided from a Milestone Partner. “I am truly excited about the possibilities that edge recording devices can bring to networked visual security solutions,” said Lars Nordenlund, vice-president, Incubation & Ventures at Milestone Systems. “We are building on the success of the Milestone Husky series of devices and the endless possibilities in our open platform technology. To us interconnectivity is a natural line of thought for product extensions. The best is yet to come.” n
GJD Manufacturing Limited, one of the world’s most innovative leaders in UK manufacturing, design and supply of CCTV LED illuminators and professional external detector equipment is continuing to set itself apart from its competitors, with the launch of its cuttingedge DTECT 2 IP detector. The new IP detector is perfect for both security and IT sectors, owing to the fact that security products are becoming significantly more integrated with IT and associated infrastructure. The new D-TECT 2 IP is a highly sophisticated IP-based detection device that harnesses the power of IP with PoE (Power over Ethernet) connectivity, advanced signal processing, quad pyro scanning and unique optical systems to provide state-of-the-art alarm capture. Mark Tibbenham, managing director at GJD commented: “For customers who want to make the transition to IP-based detection, the D-TECT 2 IP combines all the versatile benefits of the D-TECT 2 PIR coupled with IP connectivity, providing highly reliable IP-based security detection.”
The D-TECT 2 IP works in conjunction with a bespoke and user-friendly web-based user interface affording intuitive and quick online access. Another key benefit is that the user can change all the detector settings remotely via the interface. Some of the adjustable settings include the ability to alter the LUX level trigger, sensitivity and detection range, as well as setting activation for specific times. Detailed alarm information triggered by the D-TECT 2 IP can be used to monitor the precise movement of an intruder using two methods. One being direct IP, as all alarm signals can travel peer-to-peer to directly communicate and control cameras, LED Illuminators, alert guards, automatically send SMS messages or emails. Alternatively, signals can be sent directly via IP to video management software (VMS). VMS solutions are often required for large installations being the most effective way to monitor all cameras. By using PoE, the DTECT 2 IP supports most VMS and IP cameras including Milestone,
Mirasys, Bosch VMS, Griffid and SeeTec, to name a few. Equipped with a pan and tilt dual infrared scanner, the D-TECT 2 IP boasts a programmable beam range of up to 30 metres, which helps to avoid boundary overspill and offers truly exceptional resistance to false alarms. Also packed with engineer-friendly features, the IP detector is extremely quick and easy to install with simple and cost-effective service and maintenance. n
Intrusion detector a game changer
Security Focus | Vol 33 No 5 2015
35
InternationalNews
Iconic HK cruise terminal deploys AMG AMG Systems have completed the supply of the transmission solution for the security and surveillance project for the Kai Tak Cruise Terminal in Hong Kong. Designated as the “Design, Supply, Delivery, Install, Testing, Commissioning, Warranty and Maintenance of interconnected Closed Circuit Television (CCTV) System at Kai Tak Cruise Terminal, for Hong Kong’s Customs & Excise Department (C&ED,) Hong Kong Police Force (HKPF), Hong Kong Immigration Department (ImmD) and Tourist Commission (TC)”, the comprehensive security and surveillance solution was designed and implemented by Hong Kong-based Univision Engineering Ltd. The company is also listed in AIM UK. According to Univision project manager, Tony Man: “In order to minimise the project costs and to cut down on the number of cameras needed, the governing departments approached us with the task; suggesting the TC’s (total of 260) cameras would be shared by the three governing departments as mentioned above. “But it’s important the governing departments’ cameras were not to be shared with TC, as reversal favour. Therefore, we had to deploy servers to each of the governing departments and set the
right system privileges and install firewalls so the right camera(s), and the right users, can access the TC’s cameras at any time by all departments. “We also decided to use fibre optics for the backbone, as this allows for smooth transmission signals and the ability to send videos, as well as data signals, from the cameras for control of PTZ (pan tilt zoom) to the control room. “We decided to work with AMG Systems in the UK for the transmission solution, and deployed AMG’s award-winning 3700 product series for ring topology which has been designed specifically to provide for lowcost, multi-channel drop and insert video collection, together with associated Ethernet and low speed data and audio signals. “Although initially, the drop and insert feature was not implemented, this facility is available for future expansion. The timescales meant that we had to have all the outstation equipment installed within the first two months. “This meant speedy supply from the manufacturers in terms of cameras, cable, network devices, switches and last, but not least, the AMG transmitters. It was a very tight project indeed.”
In total, the Kai Tak Cruise Terminal CCTV solution has 620 cameras in a mixture of IP, analogue and 360 degree. Of those, 260 comprise the designated TC solution. The 620 cameras are split into 220 IP PTZ cameras, 240 analogue PTZ cameras and 158 fixed, as well as two 360 degree cameras, with panoramic views. The solution has intentionally been designed with the possibility for expansion, and this is significant, as there are plans for further berth extension to be completed by 2018. According to the sales director of Univision, Peter Chan: “We made the best choice of supplier by choosing AMG. Some of the optical links are installed in really difficult access areas. It would take a tremendous amount of man-power as well as effected ‘down-time’ hours to make repairs. “To sum up: by choosing AMG’s 3700 series with its very high documented meantime between failure (MTBF), we have cut the chances of repairs and re-occurring repairs. “Hhence we have minimised the possibility of down-time hours, and a very happy client. I am thrilled by the co-operative manner with which AMG approached the project, and their support is impressive and prompt. The equipment passed with flying colours.” n
Assa Abloy acquires Teamware Malaysia Assa Abloy has signed an agreement to acquire Teamware, the market leader in locks and hardware in the Malaysian market. “I am pleased that Teamware is joining the Assa Abloy group. Teamware is another major entry into the large and fast growing Malaysian market and will constitute another strategic move to grow market presence in the emerging markets”, says Johan Molin, president and chief executive officer of Assa Abloy.
36
“Teamware is a great addition to the Asia Pacific division. The acquisition adds complimentary business channels and products to our existing Malaysian business. Teamware will also give us access to the fire door market in Malaysia where we see synergies with our market leading Chinese activity,” says Magnus Kagevik, executive vice-president of Assa Abloy and head of division, Asia Pacific.
Security Focus | Vol 33 No 5 2015
Teamware, established in 1999, is headquartered in Kuala Lumpur, Malaysia and has some 120 employees. Sales for 2015 are expected to reach RM 100 M (approx SEK 240 M), with a good EBIT margin. The acquisition will be accretive to EPS from start. The transaction is subject to regulatory approval and is expected to close during the second quarter of 2015. n
Law&Security
Xenophobia and its impact
T
By Peter Bagshawe
he last article published touched on xenophobia and the recent incidents that occurred in South Africa. The article appears to have caused an unusual number of questions which revolved around three principal areas. The first of these was the economic impact of the instances of violence may have on South Africa; secondly, the causes (which from my perspective will be largely inferred) of the violence and, finally, the actions that are available from the side of the various governments to curtail further eruptions of violence and xenophobia. Due to space constraints, the following discussion will be somewhat brief and is targeted at the main points of the three areas. Looking at the economic impact, the first port of call would have to be the areas where the violence took place which, in the main, have lost the closest and, often, the cheapest option for purchasing basic foodstuffs and secondary necessities that would include items such as air time which is needed as a communication mechanism with family whether local or living in neighboring countries. Simultaneously, the spaza shop and small business owners (which would include panel beaters, garment traders and general dealers), have lost their livelihoods and, in some instances, may not be able (or want) to return to the area and start a business over again. A number of individuals have elected to be repatriated to their countries of origin rather than either stay in South Africa, or return to the communities where they had previously lived. On a macro basis, the impact of the South African economy may be wider than first anticipated, but this depends at least to an extent on the reaction of other African states that are trading partners with South Africa. The mining industry and tourism are two industries that rely on the free exchange of labour and tourists who voluntarily cross into South Africa. The former is likely to continue largely due to the economic situation in the countries that supply labour. South Africa’s tourism industry contributes in the order on 10 per cent of the local Gross Domestic Product and it is not generally known that, historically, some 60 per cent of tourists entering South Africa come from the African continent. Should anti-South African sentiments
arising from xenophobia in Africa remain high (as is the case currently in Nigeria and Mozambique), the number of incoming tourists will reduce and income similarly tapers off. The number of tourists from Asia, Europe and the Americas is not sufficient to take up the potential reduction and there has been adverse publicity in these countries that may flow over into investment and other economic areas. On a national basis, Mozambique has cancelled its official attendance at the Tourism Indaba scheduled for May 2015 in Durban and will not attend the scheduled meeting of tourism ministers. The causes of the attacks on foreign owned businesses and foreign citizens have been reviewed and commented on at length by religious leaders, journalists, commentators, bloggers and social media contributors as well as numerous Ministers and politicians. Despite political and national differences the actions of the mobs have been universally condemned and the associated criminality has been universally denounced by leaders including the Secretary General of the United Nations. There seems to be an element of political gamesmanship in the Nigerian reaction with some commentators labelling this as taking the opportunity to simultaneously settle political scores and deflect focus from internal problems including recent presidential elections and the campaign against Boko Haram. Turning to those that looted foreign owned shops and committed acts of violence the authorities have labelled their actions as opportunistic and criminal in nature rather than nationalistic with the probability that foreigners, who if illegal are unable to open banks accounts and consequently are known to keep large amounts of cash in their premises, being primary targets. Some analysts prefer to look at the violent behavior as a response and the only mechanism for expressing frustrations arising from having to absorb, on an ongoing basis, unfair and unjust treatment in respect of the provision of basic services, unemployment and marginalization of their communities. At the recent summit of the Southern African Development Community, President Zuma briefed regional leaders on the xenophobic violence and this led to Zimbabwean President Robert Mugabe, in his capacity as chairman
of the SADC calling for member states to stop migrating to South Africa to prevent violence against foreigners. Given that there are an estimated 1 000 000 Zimbabweans currently in South Africa, this call seems somewhat trite. Reaction from the South African government was initially to deploy the South African Police to hot spots and later to deploy the South African Defence Force to act in a supporting role to the police. The delay in deploying the Defence Force has been the subject of criticism. However, the cooperative deployment has led to a cessation of attacks and joint search operations at the Jeppe hostels and informal settlements have led to a number of arrests. Calls by government ministers and civil organisations for peace, as well as a number of marches to register disapproval of the violence, and supporting the right of foreigners to stay in a peaceful environment, have been an effective mechanism to register the views of the usually silent majority. A number of refugee camps have been established and these are, at best, a short terms solution. The successful re-integration of displaced foreign nationals into society and their return to the homes they were forced away from must be accompanied by an effective monitoring and support system for both the returning foreigners and the residents of the areas affected. The currently stagnant economy in South Africa and negative economic position in a number of African states whose citizens have, and will continue to come to South Africa, mean that there will be ongoing high levels of immigration, unemployment locally, jobs will continue to be a friction point and the ability of the Government to provide housing, grants, health services, electrification, water and sewage reticulation will be placed under increasing strain. Levels of dissatisfaction internally are likely to continue to be at a high level and service protests are also likely to increase, particularly with the forthcoming local elections. Unfortunately, protest, which may include possible further xenophobic incidents, remains likely and must be guarded against by the State. n
PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.
Security Focus | Vol 33 No 5 2015
37
Indexofadvertisers
Vol 33 No 5 Advertiser
Page No.
Website
Active Track
5
info@activetrack.co.za
www.activetrack.co.za
Centurion
11,13
Deggy SA
23
deggy@deggy.co.za
www.deggy.co.za
Elvey Security Technologies
1
info@elvey.co.za
www.elvey.co.za
Guard Track
7
info@guardtrack.co.za
www.guardtrack.co.za
Mutual Safe & Security
24
info@mutual.co.za
www.mutual.co.za
Paxton Access Lltd
15
Plaslope
39
glenda.aereboe@plaslope.com
www.plaslope.com
Powelltronics
IFC
marketing@powelltronics.com
www.p-tron.com
SASA
1
secassoc@global.co.za
www.sasecurity.co.za
Sparks & Ellis
27
Sunell
OBC
mj@sunellsecurity.com
www.sunellsecurity.com
Suprema
11
enquiry@suprema.co.za
www.suprema.co.za
www.CentSys.com
www.sparks.co.za
Subscribe to To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: jackie@contactpub.co.za p Yes, please, I would like to subscribe to Security Focus. (Cost: R525,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide. p Enclosed please find cheque to the amount of R............................... p Please start my subscription from the..........................................issue. Do you require a tax invoice p Yes p No (If yes, one will be sent to you on receipt of your payment.)
Banking Details: First National Bank, Kloof Branch Code: 221526 Account Number: 50730011968 Account Name: Security Publications SA (Pty) Ltd
NB: Please make cheques payable to Security Publications SA (Pty) Ltd Name:....................................................................................... Signature:................................................................................................... Date:............................................Company:.................................................................. Position:................................................................. Address....................................................................................................................................................................Code:........................... Tel:..........................................................................................................Fax:................................................................................................
38
Security Focus | Vol 33 No 5 2015
Calendar
Calendar of security conferences, events and exhibitions of interest to the security industry – both local and international LOCAL EVENTS: 2015 May 12-14: SECUREX 2015. Venue: Gallagher Convention Centre, Midrand, Johannesburg. More information: Joshua Louw. Tel: (011) 835-1565. E-mail: joshual@specialised.com September 6-9: CAMPROSA Annual Conference. Venue: Table Bay Hotel, Cape Town. More information: John Tunstall. Tel: (028) 313-1711. E-mail: jtunstall@iafrica. com. Website: www.camprosa.co.za
INTERNATIONAL EVENTS: 2015 June 8-13: Interschutz. Venue: Convention Centre (CC), Hannover, Germany. More information: Deutsche Messe. Tel: +49 511 89-31604. Fax: +49 511 89-34013. Website: www.interschutz.de July 14-16: Securexpo East Africa. Venue: Kenyatta International Conference Centre, Nairobi, Kenya. More information: Montgomery Eco. Tel: +44 (0) 207 886 3034. E-mail: alexander.angus@montex.co.uk. Website: www.SecurexpoEastAfrica.com September 22-24: Safety & Security Netherlands. Venue: Amsterdam RAI, Netherlands. More information: RAI Exhibitions. Tel: +31 (0) 341 253685. Fax: +31 (0)20 549 1843. E-mail: h.v.egdom@nai.nl. Website: www.rai.nl September 22-24: SecurityUser Expo 2015. Venue: Bella Centre, Copenhagen, Denmark. More information: AR Media International. Tel: +46 8 556 306 80. Fax: +46 8 19 10 11. E-mail: info@armedia.se. Website: www.armedia.se
October 5-7: Fire India 2015. Venue: PragatiMaidan. New Delhi, India. More information: Reed SI Exhibitions. Tel: +911145055500. E-mail: info@reedsi.com. Website: www.fire-india.com October 21-23: CAIPS 2015. 8th Central Asian International Protection, Security and Fire Safety Exhibition. Venue: Uzexpocentre, Tashkent, Uzbekistan. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@iteevents.com Website: www.ite-exhibitions.com November 2-5: Defence & Security 2015. Venue: IMPACT Exhibition Centre, Bangkok, Thailand. More information: Thailand Convention & Exhibition Bureau. Tel: +662 642 6911 Ext 121. E-mail: info@asiandefense.com. Website: www. asiandefense.com November 11-12: Sectech Sweden 2015. Venue: Rica Talk Hotel, Stockholm, Sweden. More information: AR Media International. Tel: +46 (0)8 556 306 80. Fax: +46 (0)8 19 10 11. E-mail: deniz.baykal@armedia.se. Website: www.sectech.nu
INTERNATIONAL EVENTS: 2016 February 24-27: SIPS South Russia 2016. 7th South Russian International Protection and Security Exhibition. Venue: Krasnodarexpo EC, Krasnodar, Russia. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@iteevents.com Website: www.ite-exhibitions.com
Tel: Fax: E-mail: Web:
+27 (0) 11 452-1115 +27 (0) 11 452-3609 glenda.aereboe@plaslope.com www.plaslope.com
TAMPER EVIDENT SECURITY BAGS l l l l l l
Reliable, permanent, special security closure to show evidence of tamper The closure system shows evidence of tamper by freezing, heat, aqua and solvent The bags are manufactured from high strength coextruded LDPE clear or opaque film Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available ) Bags have a unique sequential number or barcode For security purposes the bags are printed along the edge of the side seals
SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY
Under Licence to
DEBATIN Security Focus | Vol 33 No 5 2015
TM
39
Directory
SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) SASA OFFICE BEARERS
REGIONAL OFFICE BEARERS
ADMINISTRATION
Suite 147 Postnet X2, Helderkruin 1733
Gauteng: Christiaan Oelofse E-mail: coelofse@adt.co.za Cell: 082 339-3398
National Administrator: Tony Botes Cell: 083 272 1373 E-mail: info@sasecurity.co.za Fax: 0866 709 209
National President: Costa Diavastos Cell: 082 498-4749 E-mail: CostaD@servest.co.za National Chairman: Chris Laubscher Cell: 082 441-4092 E-mail: laubscherc@proteacoin.co.za National Deputy Chairman: Marchel Coetzee Cell: 084 440-0087 E-mail: marchel_coetzee@omegasol.com
KwaZulu-Natal: Gary Tintinger E-mail: garyt@enforce.co.za Cell: 084 429 4245 Western Cape: Koos van Rooyen E-mail: kvanrooyen@thorburn.co.za Cell: 082 891-2351
Accounts: Yolandi Evans Cell: 061 470-8736 E-mail: accounts@sasecurity.co.za Fax: 0862 124 142
OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA — Private Security Industry Regulatory Authority, Eco Park, Centurion. Tel: (012) 003 0500/1. Independent Hotline: 0800 220 918. E-mail: info@psira. co.za Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vicechairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member). APPISA – Association for Professional Private Investigators SA, Box 8064, Minnebron 1549. Cell: 073 371-7854 or 072 367-8207. Fax: 086 689-0166. E-mail: info@appelcryn.co.za. Website: www.appelcryn.co.za. President: Ken Appelcryn. Secretary: Dianne. ASIS International — Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060. Tel: (011) 652-2569. Website: http://www.asis155jhb.webs.com/ President/ Chairperson: Johan Hurter. Secretary: Chris Cray. ASIS International — Chapter 203: Cape Town – South African security professionals. President/Chairman: Yann A Mouret, CPP. Secretary: Eva Nolle. Tel: (021) 785-7093. Fax: (021) 785-5089. E-mail: info@aepn. co.za. Website: www.asis203.org.za bac — Business Against Crime, Box 784061, Sandton 2146. Chairman: James Fitzgerald. Tel: (011) 8830717. Fax: (011) 883-1679. E-mail: denise@bac.org. za. Eastern Cape: Box 40078, Walmer 6065. Tel: (041) 373-6401. Fax: (041) 373-6402. E-mail: info@bacec. co.za. Western Cape: 12th Floor Picbel Arcade, Strand Street. Tel: (021) 419-2044. Fax: (021) 419-2066. E-mail: jackie@bacwcape.co.za KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001. Tel: (031) 207-8273. Fax: (031) 207-3900. Provincial manager: Jody Nair, e-mail jody@backzn.co.za Mpumalanga: Box 430, White River 1240. Tel: David Pretorius (general manager) (013) 751-3188. Fax: (013) 744-3555. Cell: 083 2735515. E-mail: david@bac_mp.co.za; or Ed Coombes (chairperson) 082 807-3916, fax (013) 752-6002, e-mail: ed.coombes@worldonline.co.za. North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300; Charles Kendall (managing director) tel/fax: (014) 5923591, e-mail: charles.kendall@lonplats.com. Limpopo: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. Free State: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. CAMPROSA — Campus Protection Society of Southern Africa. President: Roland September. Tel: (021) 650-4858. E-mail: roland.september@uct.ac.za. Vice President: Derek Huebsch. Tel: (041) 504 2490. E-mail: derek. huebsch@nmmu.ac.za. Executive Secretary: John Tunstall. Tel: (028) 313 1711. E-mail: jtunstall@iafrica.com. Web: www.camprosa.co.za. CENSEC — Centre for the Study of Economic Crime. Director: Louis de Koker. Tel: (011) 489-2134. E-mail: ldekoker@uj.ac.za CISA — Cape Insurance Surveyors Association. Shahid Sonday (021) 402-8196. Fax: (021) 419-1844. E-mail: shahid.sonday@saeagle.co.za; or Mike Genard (021) 557-8414. E-mail: mikeg@yebo.co.za DRA — Disaster Recovery Association of Southern Africa, Box 405, Saxonwold 2132. Chairman: Grahame Wright, Tel. (011) 486-0677, Fax (011) 646-5587. Secretary/ Treasurer: Charles Lourens, Tel. (011) 639-2346, Fax (011) 834-6881. EFCMA — Electric Fencing and Components Manufacturers Association, Box 411164, Craighall 2024. Tel: (011) 326- 4157. Fax: (011) 493-6835. Chairperson: Cliff Cawood 083 744-
40
2159. Deputy chairperson: John Mostert 082 444-9759. Secretary: Andre Botha 083 680-8574. ESDA — Electronic Security Distributors Association, Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. Chairperson: Lee-Ann Andreka. Secretary: Shirley James. Website: www.esda.org.za ESIA — Electronic Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Fax: 086 570 8837. Cell: 082 773-9308. E-mail: sia@iburst.co.za or steveconradie@iburst.co.za. Web: www.securityalliance. co.za FDIA — Fire Detection Installers Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: 087 808 7527. Fax: 086 518 4376. E-mail: fdia@fdia.co.za. Website: www.fdia.co.za President/Chairperson: Matt Kielty. Secretary: Jolene van der Westhuizen. FFETA — The Fire Fighting Equipment Traders Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374/ (011) 455-4126. E-mail: ffeta@tiscali.co.za. Website: www.ffeta.co.za. Chairperson: Astrid Wright. Vicechairperson: Meshack Gabeni. FPASA — Fire Protection Association of Southern Africa, Box 15467, Impala Park 1472. Tel: (011) 397-1618. Fax: (011) 397-1160. E-mail: library@fpasa.co.za. Web: www.fpasa.co.za. General Manager: David Poxon. GFA—Gate&FenceAssociation,Box1338,Johannesburg 2000. Tel: (011) 298-9400. Fax: (011) 838-1522. Administrator: Theresa Botha. HCSA — Hotel & Casino Security Association, Box 91728, Auckland Park 2006. Chairman: Dick Glanville, Tel: (011) 447-2700, Fax: (011) 447-3276. Vice-chairman: Frans Joubert, Tel: (011) 898-7333. Secretary/Treasurer: Graham Bendell, Tel (011) 728-4405; Cell 082 699-2392. HSA — Helderberg Security Association, Box 12857, N1 City Parow 7463. Tel: (021) 511-5109. Fax: (021) 511-5277. E-mail: info@command.co.za. Website: www. command.co.za. Chairperson: Stephen van Diggele. IFE — Institution of Fire Engineers (SA). Treasurer: A.E. Greig, Box 1033, Houghton 2041. Tel/Fax: (011) 7884329. E-mail: adminstaff@ife.org.za Website: www.ife. org.za. President: John Khoza Mpiyakhe. Secretary: Lindi Mujugira. ISA — Insurance Surveyors Association, Box 405, Saxonwold 2132. Chairman: Graham Wright (011) 4860677. Vice-chairman: Alan Ventress. Secretary: Alex dos Santos. LASA — Locksmiths Association of South Africa, Box 4007, Randburg 2125. Tel: (011) 782-1404 Fax: (011) 782-3699. E-mail: lasa@global.co.za Website: www.lasa. co.za President/Chairman: Alan Jurrius. Secretary: Dora Ryan. NaFETI — National Firearms Education and Training Institute, Box 181067, Dalbridge 4014. Chairman: M.S. Mitten. Vice: Ken Rightford (033) 345-1669. Cell: 084 659-1142. NaFTA — The National Firearms Training Association of SA, Box 8723, Edenglen 1613. National Chairman: Peter Bagshawe.Tel: (011) 979-1200. Fax: (011) 979-1816. E-mail: nafta@lantic.net POLSA — Policing Association of Southern Africa. Tel: (012) 429-6003. Fax: (012) 429-6609. Chairperson: Anusha Govender, 082 655-8759. PSSPF — Private Security Sector Provident Fund. Contact: Jackson Simon. Cell: 072 356 6358. E-mail: jackson@psspfund.co.za. Website: www.psspfund.co.za SAESI — Southern African Emergency Services
Security Focus | Vol 33 No 5 2015
Institute, Box 613, Krugersdorp 1740. Tel: (011) 6605672. Fax: (011) 660-1887. President: DN Naidoo. Secretary: Mrs S.G. Moolman. E-mail:saesi@mweb. co.za SAIA — South African Insurance Association, Box 30619, Braamfontein 2017. Chief Executive: B. Scott. Tel: (011) 726-5381. Fax: (011) 726-5351. E-mail: faith@saia.co.za SAIDSA — South African Intruder Detection Services Association, Association House, P O Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. E-mail: saidsa@mweb.co.za Website: www.saidsa.co.za President/Chairman: Johan Booysen. Secretary: Cheryl Ogle. SAIS — South African Institute of Security, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157 or 0861 111 418. Fax: 086 518 4374/ (011) 455-4126. E-mail: SAIS@tiscali.co.za. Website: www.instituteofsecurity.co.za. Chairman: David Dodge. Vice-chairman: Mike Verster. Administrative Manager: Rosemary Cowan. SAN — Security Association of Namibia, Box 1926, Windhoek, Namibia. Administrator: André van Zyl. Tel: +264 61 205 2264. Fax: +264 61 205 2350. E-mail: pagvz@nampower.com.na SANSEA — South African National Security Employers’ Association, Box 9553, Edenglen 1613. Administrators: SIA, Box 62346, Marshalltown 2107. Tel: (011) 498-7468. Fax: (011) 498-7287. E-mail: sia@iburst.co.za. SAPFED — Southern African Polygraph Federation. President: Ben Lombaard 083 793-1152. Secretary: Amelia Griesel 082 786-3347. E-mail: info@sapfed.org. Website: www.sapfed.org SAQCC FIRE — South African Qualification Certification Committee, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374. E-mail: saqccfire@tiscali.co.za. Website: www.saqccfire. co.za Management Committee: Chairman: Brett Jones. Vice-Chairman: Duncan Boyes. SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer. Vice-Chairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty. Vice-Chairperson: Laura Swart. SARPA — South African Revenue Protection Association, Box 868, Ferndale 2160. Tel: (011) 7891384. Fax: (011) 789-1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co. SDOA — Service Dog Operators Association, Box 49554, Hercules 0030. Tel: (012) 376-2152/3. Fax: (012) 376-2359. E-mail: company@ppscanine.co.za Chairperson: Mr F. van Kraayenburg. Tel: (012) 376-2266. SIA — Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Chief Executive Officer: Steve Conradie. Website: www.securityalliance. co.za SKZNSA—SouthernKwaZulu-NatalSecurityAssociation. Tel: (039) 315-7448. Fax: (039) 315-7324. Chairman: Anton Verster – 082 371-0820. VESA — Vehicle Security Association of South Africa, Box 1468, Halfway House 1685. Tel: (011) 3153588/3655. Fax: (011) 315-3617. General Manager: Niresh Reddy. VIPPASA — VIP Protection Association of SA, Box 41669, Craighall 2024. Tel: 082 749-0063. Fax: 086 625-1192. E-mail: info@vippasa.co.za. Website: www.vippasa.co.za. Enquiries: Chris Rootman. Cell: 082 749 0063.E-mail: vippasa@protectour.co.za
Security Focus The official industry journal for professional risk practitioners: Security, Safety, Health, Environment, and Quality Assurance.
Is your business security related? Then you need to be advertising in Security Focus magazine For more information on how Security Focus can assist you, contact Bernadette Fenton on 082 443 8931 or bernadette@secpub.co.za
www.securityfocus.co.za